From ca02c1c9140db91b857e1540df682dbbf12387e1 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Tue, 19 Mar 2024 17:34:42 +0200 Subject: [PATCH 01/33] Add AWS remote auth login --- api/swagger.yml | 42 +- clients/java-legacy/.openapi-generator/FILES | 3 + clients/java-legacy/README.md | 11 + clients/java-legacy/api/openapi.yaml | 54 +++ clients/java-legacy/docs/ActionsApi.md | 28 +- clients/java-legacy/docs/AuthApi.md | 302 ++++++++++++-- clients/java-legacy/docs/BranchesApi.md | 56 ++- clients/java-legacy/docs/CommitsApi.md | 14 +- clients/java-legacy/docs/ConfigApi.md | 7 +- clients/java-legacy/docs/ExperimentalApi.md | 56 ++- clients/java-legacy/docs/ExternalApi.md | 28 +- .../docs/ExternalLoginInformation.md | 13 + clients/java-legacy/docs/ImportApi.md | 21 +- clients/java-legacy/docs/InternalApi.md | 161 ++++++-- clients/java-legacy/docs/MetadataApi.md | 14 +- clients/java-legacy/docs/ObjectsApi.md | 63 ++- clients/java-legacy/docs/RefsApi.md | 28 +- clients/java-legacy/docs/RepositoriesApi.md | 98 ++++- clients/java-legacy/docs/StagingApi.md | 14 +- clients/java-legacy/docs/TagsApi.md | 28 +- .../io/lakefs/clients/api/ActionsApi.java | 8 +- .../java/io/lakefs/clients/api/ApiClient.java | 2 + .../java/io/lakefs/clients/api/AuthApi.java | 187 +++++++-- .../io/lakefs/clients/api/BranchesApi.java | 16 +- .../io/lakefs/clients/api/CommitsApi.java | 4 +- .../java/io/lakefs/clients/api/ConfigApi.java | 2 +- .../lakefs/clients/api/ExperimentalApi.java | 16 +- .../io/lakefs/clients/api/ExternalApi.java | 8 +- .../java/io/lakefs/clients/api/ImportApi.java | 6 +- .../io/lakefs/clients/api/InternalApi.java | 46 +-- .../io/lakefs/clients/api/MetadataApi.java | 4 +- .../io/lakefs/clients/api/ObjectsApi.java | 18 +- .../java/io/lakefs/clients/api/RefsApi.java | 8 +- .../lakefs/clients/api/RepositoriesApi.java | 28 +- .../io/lakefs/clients/api/StagingApi.java | 4 +- .../java/io/lakefs/clients/api/TagsApi.java | 8 +- .../api/model/ExternalLoginInformation.java | 98 +++++ .../io/lakefs/clients/api/AuthApiTest.java | 16 + .../model/ExternalLoginInformationTest.java | 51 +++ clients/java/README.md | 12 + clients/java/api/openapi.yaml | 54 +++ clients/java/docs/ActionsApi.md | 28 +- clients/java/docs/AuthApi.md | 304 ++++++++++++-- clients/java/docs/BranchesApi.md | 56 ++- clients/java/docs/CommitsApi.md | 14 +- clients/java/docs/ConfigApi.md | 7 +- clients/java/docs/ExperimentalApi.md | 56 ++- clients/java/docs/ExternalApi.md | 28 +- clients/java/docs/ExternalLoginInformation.md | 13 + clients/java/docs/ImportApi.md | 21 +- clients/java/docs/InternalApi.md | 161 ++++++-- clients/java/docs/MetadataApi.md | 14 +- clients/java/docs/ObjectsApi.md | 63 ++- clients/java/docs/RefsApi.md | 28 +- clients/java/docs/RepositoriesApi.md | 98 ++++- clients/java/docs/StagingApi.md | 14 +- clients/java/docs/TagsApi.md | 28 +- .../io/lakefs/clients/sdk/ActionsApi.java | 8 +- .../java/io/lakefs/clients/sdk/ApiClient.java | 2 + .../java/io/lakefs/clients/sdk/AuthApi.java | 239 +++++++++-- .../io/lakefs/clients/sdk/BranchesApi.java | 16 +- .../io/lakefs/clients/sdk/CommitsApi.java | 4 +- .../java/io/lakefs/clients/sdk/ConfigApi.java | 2 +- .../lakefs/clients/sdk/ExperimentalApi.java | 16 +- .../io/lakefs/clients/sdk/ExternalApi.java | 8 +- .../java/io/lakefs/clients/sdk/ImportApi.java | 6 +- .../io/lakefs/clients/sdk/InternalApi.java | 46 +-- .../main/java/io/lakefs/clients/sdk/JSON.java | 1 + .../io/lakefs/clients/sdk/MetadataApi.java | 4 +- .../io/lakefs/clients/sdk/ObjectsApi.java | 18 +- .../java/io/lakefs/clients/sdk/RefsApi.java | 8 +- .../lakefs/clients/sdk/RepositoriesApi.java | 28 +- .../io/lakefs/clients/sdk/StagingApi.java | 4 +- .../java/io/lakefs/clients/sdk/TagsApi.java | 8 +- .../sdk/model/ExternalLoginInformation.java | 293 ++++++++++++++ .../io/lakefs/clients/sdk/AuthApiTest.java | 15 + .../model/ExternalLoginInformationTest.java | 48 +++ .../python-legacy/.openapi-generator/FILES | 3 + clients/python-legacy/README.md | 13 + clients/python-legacy/docs/ActionsApi.md | 36 +- clients/python-legacy/docs/AuthApi.md | 380 ++++++++++++++++-- clients/python-legacy/docs/BranchesApi.md | 72 +++- clients/python-legacy/docs/CommitsApi.md | 18 +- clients/python-legacy/docs/ConfigApi.md | 9 +- clients/python-legacy/docs/ExperimentalApi.md | 72 +++- clients/python-legacy/docs/ExternalApi.md | 36 +- .../docs/ExternalLoginInformation.md | 12 + clients/python-legacy/docs/ImportApi.md | 27 +- clients/python-legacy/docs/InternalApi.md | 207 ++++++++-- clients/python-legacy/docs/MetadataApi.md | 18 +- clients/python-legacy/docs/ObjectsApi.md | 81 +++- clients/python-legacy/docs/RefsApi.md | 36 +- clients/python-legacy/docs/RepositoriesApi.md | 126 +++++- clients/python-legacy/docs/StagingApi.md | 18 +- clients/python-legacy/docs/TagsApi.md | 36 +- .../lakefs_client/api/actions_api.py | 4 + .../lakefs_client/api/auth_api.py | 144 +++++++ .../lakefs_client/api/branches_api.py | 8 + .../lakefs_client/api/commits_api.py | 2 + .../lakefs_client/api/config_api.py | 1 + .../lakefs_client/api/experimental_api.py | 8 + .../lakefs_client/api/external_api.py | 4 + .../lakefs_client/api/import_api.py | 3 + .../lakefs_client/api/internal_api.py | 23 ++ .../lakefs_client/api/metadata_api.py | 2 + .../lakefs_client/api/objects_api.py | 9 + .../lakefs_client/api/refs_api.py | 4 + .../lakefs_client/api/repositories_api.py | 14 + .../lakefs_client/api/staging_api.py | 2 + .../lakefs_client/api/tags_api.py | 4 + .../lakefs_client/configuration.py | 7 + .../model/external_login_information.py | 262 ++++++++++++ .../lakefs_client/models/__init__.py | 1 + clients/python-legacy/test/test_auth_api.py | 7 + .../test/test_external_login_information.py | 36 ++ clients/python/.openapi-generator/FILES | 3 + clients/python/README.md | 13 + clients/python/docs/ActionsApi.md | 36 +- clients/python/docs/AuthApi.md | 379 +++++++++++++++-- clients/python/docs/BranchesApi.md | 72 +++- clients/python/docs/CommitsApi.md | 18 +- clients/python/docs/ConfigApi.md | 9 +- clients/python/docs/ExperimentalApi.md | 72 +++- clients/python/docs/ExternalApi.md | 36 +- .../python/docs/ExternalLoginInformation.md | 29 ++ clients/python/docs/ImportApi.md | 27 +- clients/python/docs/InternalApi.md | 207 ++++++++-- clients/python/docs/MetadataApi.md | 18 +- clients/python/docs/ObjectsApi.md | 81 +++- clients/python/docs/RefsApi.md | 36 +- clients/python/docs/RepositoriesApi.md | 126 +++++- clients/python/docs/StagingApi.md | 18 +- clients/python/docs/TagsApi.md | 36 +- clients/python/lakefs_sdk/__init__.py | 1 + clients/python/lakefs_sdk/api/actions_api.py | 8 +- clients/python/lakefs_sdk/api/auth_api.py | 215 ++++++++-- clients/python/lakefs_sdk/api/branches_api.py | 16 +- clients/python/lakefs_sdk/api/commits_api.py | 4 +- clients/python/lakefs_sdk/api/config_api.py | 2 +- .../python/lakefs_sdk/api/experimental_api.py | 16 +- clients/python/lakefs_sdk/api/external_api.py | 8 +- clients/python/lakefs_sdk/api/import_api.py | 6 +- clients/python/lakefs_sdk/api/internal_api.py | 46 +-- clients/python/lakefs_sdk/api/metadata_api.py | 4 +- clients/python/lakefs_sdk/api/objects_api.py | 18 +- clients/python/lakefs_sdk/api/refs_api.py | 8 +- .../python/lakefs_sdk/api/repositories_api.py | 28 +- clients/python/lakefs_sdk/api/staging_api.py | 4 +- clients/python/lakefs_sdk/api/tags_api.py | 8 +- clients/python/lakefs_sdk/configuration.py | 7 + clients/python/lakefs_sdk/models/__init__.py | 1 + .../models/external_login_information.py | 72 ++++ clients/python/test/test_auth_api.py | 7 + .../test/test_external_login_information.py | 56 +++ docs/assets/js/swagger.yml | 42 +- pkg/api/controller.go | 42 ++ pkg/auth/service.go | 21 + 157 files changed, 6089 insertions(+), 856 deletions(-) create mode 100644 clients/java-legacy/docs/ExternalLoginInformation.md create mode 100644 clients/java-legacy/src/main/java/io/lakefs/clients/api/model/ExternalLoginInformation.java create mode 100644 clients/java-legacy/src/test/java/io/lakefs/clients/api/model/ExternalLoginInformationTest.java create mode 100644 clients/java/docs/ExternalLoginInformation.md create mode 100644 clients/java/src/main/java/io/lakefs/clients/sdk/model/ExternalLoginInformation.java create mode 100644 clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java create mode 100644 clients/python-legacy/docs/ExternalLoginInformation.md create mode 100644 clients/python-legacy/lakefs_client/model/external_login_information.py create mode 100644 clients/python-legacy/test/test_external_login_information.py create mode 100644 clients/python/docs/ExternalLoginInformation.md create mode 100644 clients/python/lakefs_sdk/models/external_login_information.py create mode 100644 clients/python/test/test_external_login_information.py diff --git a/api/swagger.yml b/api/swagger.yml index 81f8a2db461..d5950c3374a 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -17,6 +17,7 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] + - external_auth: [] components: securitySchemes: basic_auth: @@ -38,6 +39,9 @@ components: type: apiKey in: cookie name: saml_auth_session + external_auth: + type: http + scheme: basic parameters: PaginationPrefix: in: query @@ -1050,6 +1054,14 @@ components: secret_access_key: type: string + ExternalLoginInformation: + type: object + required: + - presigned_url + properties: + presigned_url: + type: string + AuthenticationToken: type: object required: @@ -1803,7 +1815,35 @@ paths: default: $ref: "#/components/responses/ServerError" - + /auth/external/login: + post: + tags: + - auth + operationId: externalLogin + summary: perform a login using an external authenticator + security: [] + requestBody: + content: + application/json: + schema: + $ref: "#/components/schemas/ExternalLoginInformation" + responses: + 200: + description: successful login + headers: + Set-Cookie: + schema: + type: string + content: + application/json: + schema: + $ref: "#/components/schemas/AuthenticationToken" + 401: + $ref: "#/components/responses/Unauthorized" + 420: + description: too many requests + default: + $ref: "#/components/responses/ServerError" /auth/capabilities: get: diff --git a/clients/java-legacy/.openapi-generator/FILES b/clients/java-legacy/.openapi-generator/FILES index 2daced71191..114c2594fd0 100644 --- a/clients/java-legacy/.openapi-generator/FILES +++ b/clients/java-legacy/.openapi-generator/FILES @@ -37,6 +37,7 @@ docs/Error.md docs/ErrorNoACL.md docs/ExperimentalApi.md docs/ExternalApi.md +docs/ExternalLoginInformation.md docs/ExternalPrincipal.md docs/ExternalPrincipalCreation.md docs/ExternalPrincipalList.md @@ -185,6 +186,7 @@ src/main/java/io/lakefs/clients/api/model/Diff.java src/main/java/io/lakefs/clients/api/model/DiffList.java src/main/java/io/lakefs/clients/api/model/Error.java src/main/java/io/lakefs/clients/api/model/ErrorNoACL.java +src/main/java/io/lakefs/clients/api/model/ExternalLoginInformation.java src/main/java/io/lakefs/clients/api/model/ExternalPrincipal.java src/main/java/io/lakefs/clients/api/model/ExternalPrincipalCreation.java src/main/java/io/lakefs/clients/api/model/ExternalPrincipalList.java @@ -298,6 +300,7 @@ src/test/java/io/lakefs/clients/api/model/DiffListTest.java src/test/java/io/lakefs/clients/api/model/DiffTest.java src/test/java/io/lakefs/clients/api/model/ErrorNoACLTest.java src/test/java/io/lakefs/clients/api/model/ErrorTest.java +src/test/java/io/lakefs/clients/api/model/ExternalLoginInformationTest.java src/test/java/io/lakefs/clients/api/model/ExternalPrincipalCreationTest.java src/test/java/io/lakefs/clients/api/model/ExternalPrincipalListTest.java src/test/java/io/lakefs/clients/api/model/ExternalPrincipalTest.java diff --git a/clients/java-legacy/README.md b/clients/java-legacy/README.md index 6db84d0389b..914260ae14c 100644 --- a/clients/java-legacy/README.md +++ b/clients/java-legacy/README.md @@ -95,6 +95,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -155,6 +160,7 @@ Class | Method | HTTP request | Description *AuthApi* | [**deleteUserExternalPrincipal**](docs/AuthApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user *AuthApi* | [**detachPolicyFromGroup**](docs/AuthApi.md#detachPolicyFromGroup) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group *AuthApi* | [**detachPolicyFromUser**](docs/AuthApi.md#detachPolicyFromUser) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +*AuthApi* | [**externalLogin**](docs/AuthApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator *AuthApi* | [**getCredentials**](docs/AuthApi.md#getCredentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials *AuthApi* | [**getCurrentUser**](docs/AuthApi.md#getCurrentUser) | **GET** /user | get current user *AuthApi* | [**getExternalPrincipal**](docs/AuthApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id @@ -292,6 +298,7 @@ Class | Method | HTTP request | Description - [DiffList](docs/DiffList.md) - [Error](docs/Error.md) - [ErrorNoACL](docs/ErrorNoACL.md) + - [ExternalLoginInformation](docs/ExternalLoginInformation.md) - [ExternalPrincipal](docs/ExternalPrincipal.md) - [ExternalPrincipalCreation](docs/ExternalPrincipalCreation.md) - [ExternalPrincipalList](docs/ExternalPrincipalList.md) @@ -379,6 +386,10 @@ Authentication schemes defined for the API: - **API key parameter name**: internal_auth_session - **Location**: +### external_auth + +- **Type**: HTTP basic authentication + ### jwt_token - **Type**: HTTP basic authentication diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index 712a89d3d9c..b2d6e79fa65 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -15,6 +15,7 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] +- external_auth: [] paths: /setup_comm_prefs: post: @@ -174,6 +175,47 @@ paths: - auth x-contentType: application/json x-accepts: application/json + /auth/external/login: + post: + operationId: externalLogin + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/ExternalLoginInformation' + responses: + "200": + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticationToken' + description: successful login + headers: + Set-Cookie: + explode: false + schema: + type: string + style: simple + "401": + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + description: Unauthorized + "420": + description: too many requests + default: + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + description: Internal Server Error + security: [] + summary: perform a login using an external authenticator + tags: + - auth + x-contentType: application/json + x-accepts: application/json /auth/capabilities: get: operationId: getAuthCapabilities @@ -8140,6 +8182,15 @@ components: - access_key_id - secret_access_key type: object + ExternalLoginInformation: + example: + presigned_url: presigned_url + properties: + presigned_url: + type: string + required: + - presigned_url + type: object AuthenticationToken: example: token_expiration: 0 @@ -9059,4 +9110,7 @@ components: in: cookie name: saml_auth_session type: apiKey + external_auth: + scheme: basic + type: http diff --git a/clients/java-legacy/docs/ActionsApi.md b/clients/java-legacy/docs/ActionsApi.md index 76e04a9bd9f..726300dc465 100644 --- a/clients/java-legacy/docs/ActionsApi.md +++ b/clients/java-legacy/docs/ActionsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -88,7 +93,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -136,6 +141,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -184,7 +194,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -232,6 +242,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -284,7 +299,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -332,6 +347,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -382,7 +402,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/AuthApi.md b/clients/java-legacy/docs/AuthApi.md index b6308ae3dd4..47d52258b69 100644 --- a/clients/java-legacy/docs/AuthApi.md +++ b/clients/java-legacy/docs/AuthApi.md @@ -20,6 +20,7 @@ Method | HTTP request | Description [**deleteUserExternalPrincipal**](AuthApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user [**detachPolicyFromGroup**](AuthApi.md#detachPolicyFromGroup) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group [**detachPolicyFromUser**](AuthApi.md#detachPolicyFromUser) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +[**externalLogin**](AuthApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator [**getCredentials**](AuthApi.md#getCredentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials [**getCurrentUser**](AuthApi.md#getCurrentUser) | **GET** /user | get current user [**getExternalPrincipal**](AuthApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id @@ -73,6 +74,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -118,7 +124,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -166,6 +172,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -211,7 +222,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -259,6 +270,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -304,7 +320,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -352,6 +368,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -396,7 +417,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -444,6 +465,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -488,7 +514,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -536,6 +562,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -580,7 +611,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -629,6 +660,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -673,7 +709,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -722,6 +758,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -769,7 +810,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -818,6 +859,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -863,7 +909,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -911,6 +957,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -954,7 +1005,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1002,6 +1053,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1047,7 +1103,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1095,6 +1151,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1138,7 +1199,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1186,6 +1247,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1229,7 +1295,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1277,6 +1343,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1322,7 +1393,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1370,6 +1441,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1415,7 +1491,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1463,6 +1539,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1508,7 +1589,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1524,6 +1605,69 @@ null (empty response body) **420** | too many requests | - | **0** | Internal Server Error | - | + +# **externalLogin** +> AuthenticationToken externalLogin(externalLoginInformation) + +perform a login using an external authenticator + +### Example +```java +// Import classes: +import io.lakefs.clients.api.ApiClient; +import io.lakefs.clients.api.ApiException; +import io.lakefs.clients.api.Configuration; +import io.lakefs.clients.api.models.*; +import io.lakefs.clients.api.AuthApi; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("http://localhost/api/v1"); + + AuthApi apiInstance = new AuthApi(defaultClient); + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + try { + AuthenticationToken result = apiInstance.externalLogin(externalLoginInformation); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling AuthApi#externalLogin"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful login | * Set-Cookie -
| +**401** | Unauthorized | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + # **getCredentials** > Credentials getCredentials(userId, accessKeyId) @@ -1556,6 +1700,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1602,7 +1751,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1650,6 +1799,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1690,7 +1844,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1734,6 +1888,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1778,7 +1937,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1826,6 +1985,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1870,7 +2034,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1918,6 +2082,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1962,7 +2131,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2010,6 +2179,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2054,7 +2228,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2102,6 +2276,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2146,7 +2325,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2194,6 +2373,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2244,7 +2428,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2291,6 +2475,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2341,7 +2530,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2389,6 +2578,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2437,7 +2631,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2484,6 +2678,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2532,7 +2731,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2579,6 +2778,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2629,7 +2833,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2677,6 +2881,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2727,7 +2936,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2775,6 +2984,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2825,7 +3039,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2873,6 +3087,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2925,7 +3144,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2973,6 +3192,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3021,7 +3245,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3131,6 +3355,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3176,7 +3405,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3224,6 +3453,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3270,7 +3504,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/BranchesApi.md b/clients/java-legacy/docs/BranchesApi.md index c1a1fc02597..5a0d52c2970 100644 --- a/clients/java-legacy/docs/BranchesApi.md +++ b/clients/java-legacy/docs/BranchesApi.md @@ -46,6 +46,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -94,7 +99,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -145,6 +150,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -191,7 +201,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -242,6 +252,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -289,7 +304,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -338,6 +353,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -392,7 +412,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -440,6 +460,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -486,7 +511,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -534,6 +559,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -584,7 +614,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -632,6 +662,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -679,7 +714,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -729,6 +764,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -776,7 +816,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/CommitsApi.md b/clients/java-legacy/docs/CommitsApi.md index 904969f3f78..8c0ca61a9aa 100644 --- a/clients/java-legacy/docs/CommitsApi.md +++ b/clients/java-legacy/docs/CommitsApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -90,7 +95,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -142,6 +147,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -188,7 +198,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ConfigApi.md b/clients/java-legacy/docs/ConfigApi.md index df872aca7ca..fe09a955ca2 100644 --- a/clients/java-legacy/docs/ConfigApi.md +++ b/clients/java-legacy/docs/ConfigApi.md @@ -41,6 +41,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -81,7 +86,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ExperimentalApi.md b/clients/java-legacy/docs/ExperimentalApi.md index 827ebcf07c1..31ded2daf52 100644 --- a/clients/java-legacy/docs/ExperimentalApi.md +++ b/clients/java-legacy/docs/ExperimentalApi.md @@ -48,6 +48,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -99,7 +104,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -150,6 +155,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -202,7 +212,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -254,6 +264,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -304,7 +319,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -353,6 +368,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -400,7 +420,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -449,6 +469,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -494,7 +519,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -542,6 +567,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -586,7 +616,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -636,6 +666,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -685,7 +720,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -735,6 +770,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -785,7 +825,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ExternalApi.md b/clients/java-legacy/docs/ExternalApi.md index 889c53a83f4..d0576e50037 100644 --- a/clients/java-legacy/docs/ExternalApi.md +++ b/clients/java-legacy/docs/ExternalApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -89,7 +94,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -138,6 +143,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -183,7 +193,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -231,6 +241,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -275,7 +290,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -323,6 +338,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -373,7 +393,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ExternalLoginInformation.md b/clients/java-legacy/docs/ExternalLoginInformation.md new file mode 100644 index 00000000000..e1f49f42df3 --- /dev/null +++ b/clients/java-legacy/docs/ExternalLoginInformation.md @@ -0,0 +1,13 @@ + + +# ExternalLoginInformation + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**presignedUrl** | **String** | | + + + diff --git a/clients/java-legacy/docs/ImportApi.md b/clients/java-legacy/docs/ImportApi.md index 89e2170feef..8af8426b06b 100644 --- a/clients/java-legacy/docs/ImportApi.md +++ b/clients/java-legacy/docs/ImportApi.md @@ -41,6 +41,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -88,7 +93,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -138,6 +143,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -186,7 +196,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -236,6 +246,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -284,7 +299,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/InternalApi.md b/clients/java-legacy/docs/InternalApi.md index fce1503b632..5bb12bca642 100644 --- a/clients/java-legacy/docs/InternalApi.md +++ b/clients/java-legacy/docs/InternalApi.md @@ -65,6 +65,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -108,7 +113,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -157,6 +162,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -202,7 +212,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -252,6 +262,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -300,7 +315,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -350,6 +365,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -395,7 +415,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -442,6 +462,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -486,7 +511,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -595,6 +620,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -635,7 +665,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -682,6 +712,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -722,7 +757,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -827,6 +862,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -867,7 +907,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -912,6 +952,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -952,7 +997,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1001,6 +1046,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1046,7 +1096,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1094,6 +1144,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1139,7 +1194,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1187,6 +1242,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1230,7 +1290,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1278,6 +1338,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1322,7 +1387,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1370,6 +1435,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1414,7 +1484,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1462,6 +1532,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1507,7 +1582,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1555,6 +1630,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1598,7 +1678,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1646,6 +1726,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1690,7 +1775,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1739,6 +1824,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1785,7 +1875,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1835,6 +1925,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1880,7 +1975,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1929,6 +2024,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1972,7 +2072,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2022,6 +2122,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2067,7 +2172,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2242,6 +2347,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2292,7 +2402,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2342,6 +2452,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2389,7 +2504,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/MetadataApi.md b/clients/java-legacy/docs/MetadataApi.md index 77e7a4d2445..1d0fbd9b1bc 100644 --- a/clients/java-legacy/docs/MetadataApi.md +++ b/clients/java-legacy/docs/MetadataApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -86,7 +91,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -134,6 +139,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -180,7 +190,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ObjectsApi.md b/clients/java-legacy/docs/ObjectsApi.md index 763634236bc..98a58a5766e 100644 --- a/clients/java-legacy/docs/ObjectsApi.md +++ b/clients/java-legacy/docs/ObjectsApi.md @@ -47,6 +47,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -97,7 +102,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -147,6 +152,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -196,7 +206,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -245,6 +255,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -295,7 +310,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -344,6 +359,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -398,7 +418,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -451,6 +471,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -499,7 +524,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -547,6 +572,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -596,7 +626,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -647,6 +677,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -705,7 +740,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -753,6 +788,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -805,7 +845,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -855,6 +895,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -911,7 +956,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/RefsApi.md b/clients/java-legacy/docs/RefsApi.md index 944f4b55ee3..71103ec7415 100644 --- a/clients/java-legacy/docs/RefsApi.md +++ b/clients/java-legacy/docs/RefsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -100,7 +105,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -148,6 +153,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -196,7 +206,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -245,6 +255,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -307,7 +322,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -355,6 +370,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -405,7 +425,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/RepositoriesApi.md b/clients/java-legacy/docs/RepositoriesApi.md index c34ec869b6d..53242d7cf58 100644 --- a/clients/java-legacy/docs/RepositoriesApi.md +++ b/clients/java-legacy/docs/RepositoriesApi.md @@ -52,6 +52,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -98,7 +103,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -147,6 +152,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -190,7 +200,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -239,6 +249,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -284,7 +299,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -332,6 +347,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -378,7 +398,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -427,6 +447,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -471,7 +496,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -519,6 +544,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -563,7 +593,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -611,6 +641,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -655,7 +690,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -703,6 +738,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -747,7 +787,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -795,6 +835,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -839,7 +884,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -887,6 +932,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -935,7 +985,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -982,6 +1032,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1028,7 +1083,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1077,6 +1132,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1123,7 +1183,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1172,6 +1232,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1219,7 +1284,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1270,6 +1335,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1315,7 +1385,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/StagingApi.md b/clients/java-legacy/docs/StagingApi.md index 6aa4318f66c..92326ebd310 100644 --- a/clients/java-legacy/docs/StagingApi.md +++ b/clients/java-legacy/docs/StagingApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -90,7 +95,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -140,6 +145,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -192,7 +202,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/TagsApi.md b/clients/java-legacy/docs/TagsApi.md index 97b0228b8d7..22517d33cdf 100644 --- a/clients/java-legacy/docs/TagsApi.md +++ b/clients/java-legacy/docs/TagsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -88,7 +93,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -139,6 +144,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -186,7 +196,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -235,6 +245,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -281,7 +296,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -329,6 +344,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -379,7 +399,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java index 5162d6e42a7..a95e043aef6 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java @@ -103,7 +103,7 @@ public okhttp3.Call getRunCall(String repository, String runId, final ApiCallbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -243,7 +243,7 @@ public okhttp3.Call getRunHookOutputCall(String repository, String runId, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -407,7 +407,7 @@ public okhttp3.Call listRepositoryRunsCall(String repository, String after, Inte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -559,7 +559,7 @@ public okhttp3.Call listRunHooksCall(String repository, String runId, String aft final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java index d469b38e79c..79855c2c184 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java @@ -88,6 +88,7 @@ public ApiClient() { // Setup authentications (key: authentication name, value: authentication). authentications.put("basic_auth", new HttpBasicAuth()); authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); + authentications.put("external_auth", new HttpBasicAuth()); authentications.put("jwt_token", new HttpBearerAuth("bearer")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); @@ -106,6 +107,7 @@ public ApiClient(OkHttpClient client) { // Setup authentications (key: authentication name, value: authentication). authentications.put("basic_auth", new HttpBasicAuth()); authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); + authentications.put("external_auth", new HttpBasicAuth()); authentications.put("jwt_token", new HttpBearerAuth("bearer")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java index f17d4f8483c..e1cc6c665e4 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java @@ -35,6 +35,7 @@ import io.lakefs.clients.api.model.CurrentUser; import io.lakefs.clients.api.model.Error; import io.lakefs.clients.api.model.ErrorNoACL; +import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -118,7 +119,7 @@ public okhttp3.Call addGroupMembershipCall(String groupId, String userId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -252,7 +253,7 @@ public okhttp3.Call attachPolicyToGroupCall(String groupId, String policyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -386,7 +387,7 @@ public okhttp3.Call attachPolicyToUserCall(String userId, String policyId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -518,7 +519,7 @@ public okhttp3.Call createCredentialsCall(String userId, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -645,7 +646,7 @@ public okhttp3.Call createGroupCall(GroupCreation groupCreation, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -768,7 +769,7 @@ public okhttp3.Call createPolicyCall(Policy policy, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -899,7 +900,7 @@ public okhttp3.Call createUserCall(UserCreation userCreation, final ApiCallback final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1032,7 +1033,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1172,7 +1173,7 @@ public okhttp3.Call deleteCredentialsCall(String userId, String accessKeyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1304,7 +1305,7 @@ public okhttp3.Call deleteGroupCall(String groupId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1430,7 +1431,7 @@ public okhttp3.Call deleteGroupMembershipCall(String groupId, String userId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1562,7 +1563,7 @@ public okhttp3.Call deletePolicyCall(String policyId, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1686,7 +1687,7 @@ public okhttp3.Call deleteUserCall(String userId, final ApiCallback _callback) t final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1815,7 +1816,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1949,7 +1950,7 @@ public okhttp3.Call detachPolicyFromGroupCall(String groupId, String policyId, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2083,7 +2084,7 @@ public okhttp3.Call detachPolicyFromUserCall(String userId, String policyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2172,6 +2173,124 @@ public okhttp3.Call detachPolicyFromUserAsync(String userId, String policyId, fi localVarApiClient.executeAsync(localVarCall, _callback); return localVarCall; } + /** + * Build call for externalLogin + * @param externalLoginInformation (optional) + * @param _callback Callback for upload/download progress + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + Object localVarPostBody = externalLoginInformation; + + // create path and map variables + String localVarPath = "/auth/external/login"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + localVarHeaderParams.put("Content-Type", localVarContentType); + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + + okhttp3.Call localVarCall = externalLoginCall(externalLoginInformation, _callback); + return localVarCall; + + } + + /** + * perform a login using an external authenticator + * + * @param externalLoginInformation (optional) + * @return AuthenticationToken + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginInformation) throws ApiException { + ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + return localVarResp.getData(); + } + + /** + * perform a login using an external authenticator + * + * @param externalLoginInformation (optional) + * @return ApiResponse<AuthenticationToken> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * perform a login using an external authenticator (asynchronously) + * + * @param externalLoginInformation (optional) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for getCredentials * @param userId (required) @@ -2217,7 +2336,7 @@ public okhttp3.Call getCredentialsCall(String userId, String accessKeyId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2347,7 +2466,7 @@ public okhttp3.Call getCurrentUserCall(final ApiCallback _callback) throws ApiEx final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2458,7 +2577,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2586,7 +2705,7 @@ public okhttp3.Call getGroupCall(String groupId, final ApiCallback _callback) th final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2714,7 +2833,7 @@ public okhttp3.Call getGroupACLCall(String groupId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2842,7 +2961,7 @@ public okhttp3.Call getPolicyCall(String policyId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2970,7 +3089,7 @@ public okhttp3.Call getUserCall(String userId, final ApiCallback _callback) thro final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3112,7 +3231,7 @@ public okhttp3.Call listGroupMembersCall(String groupId, String prefix, String a final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3261,7 +3380,7 @@ public okhttp3.Call listGroupPoliciesCall(String groupId, String prefix, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3410,7 +3529,7 @@ public okhttp3.Call listGroupsCall(String prefix, String after, Integer amount, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3548,7 +3667,7 @@ public okhttp3.Call listPoliciesCall(String prefix, String after, Integer amount final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3689,7 +3808,7 @@ public okhttp3.Call listUserCredentialsCall(String userId, String prefix, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3841,7 +3960,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3993,7 +4112,7 @@ public okhttp3.Call listUserGroupsCall(String userId, String prefix, String afte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4150,7 +4269,7 @@ public okhttp3.Call listUserPoliciesCall(String userId, String prefix, String af final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4302,7 +4421,7 @@ public okhttp3.Call listUsersCall(String prefix, String after, Integer amount, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4547,7 +4666,7 @@ public okhttp3.Call setGroupACLCall(String groupId, ACL ACL, final ApiCallback _ final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4681,7 +4800,7 @@ public okhttp3.Call updatePolicyCall(String policyId, Policy policy, final ApiCa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java index a72c0b7cf50..fc8ae5809ef 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java @@ -111,7 +111,7 @@ public okhttp3.Call cherryPickCall(String repository, String branch, CherryPickC final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -268,7 +268,7 @@ public okhttp3.Call createBranchCall(String repository, BranchCreation branchCre final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -421,7 +421,7 @@ public okhttp3.Call deleteBranchCall(String repository, String branch, Boolean f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -581,7 +581,7 @@ public okhttp3.Call diffBranchCall(String repository, String branch, String afte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -731,7 +731,7 @@ public okhttp3.Call getBranchCall(String repository, String branch, final ApiCal final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -882,7 +882,7 @@ public okhttp3.Call listBranchesCall(String repository, String prefix, String af final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1024,7 +1024,7 @@ public okhttp3.Call resetBranchCall(String repository, String branch, ResetCreat final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1176,7 +1176,7 @@ public okhttp3.Call revertBranchCall(String repository, String branch, RevertCre final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java index 23f464975fe..81e2441bea5 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java @@ -111,7 +111,7 @@ public okhttp3.Call commitCall(String repository, String branch, CommitCreation final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -272,7 +272,7 @@ public okhttp3.Call getCommitCall(String repository, String commitId, final ApiC final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java index db1b298eed7..ce12a7223e0 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java @@ -93,7 +93,7 @@ public okhttp3.Call getConfigCall(final ApiCallback _callback) throws ApiExcepti final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java index 7296a72cd64..168c5b4f9e6 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java @@ -116,7 +116,7 @@ public okhttp3.Call abortPresignMultipartUploadCall(String repository, String br final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -282,7 +282,7 @@ public okhttp3.Call completePresignMultipartUploadCall(String repository, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -456,7 +456,7 @@ public okhttp3.Call createPresignMultipartUploadCall(String repository, String b final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -613,7 +613,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -756,7 +756,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -891,7 +891,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1033,7 +1033,7 @@ public okhttp3.Call hardResetBranchCall(String repository, String branch, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1197,7 +1197,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java index d55305caf94..912084f15da 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java @@ -107,7 +107,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -250,7 +250,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -385,7 +385,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -528,7 +528,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java index 1116f52effa..28a1367ed49 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java @@ -109,7 +109,7 @@ public okhttp3.Call importCancelCall(String repository, String branch, String id final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -260,7 +260,7 @@ public okhttp3.Call importStartCall(String repository, String branch, ImportCrea final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -417,7 +417,7 @@ public okhttp3.Call importStatusCall(String repository, String branch, String id final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java index d041c92b55d..1397b85d503 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java @@ -122,7 +122,7 @@ public okhttp3.Call createBranchProtectionRulePreflightCall(String repository, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -252,7 +252,7 @@ public okhttp3.Call createCommitRecordCall(String repository, CommitRecordCreati final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -397,7 +397,7 @@ public okhttp3.Call createSymlinkFileCall(String repository, String branch, Stri final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -536,7 +536,7 @@ public okhttp3.Call deleteRepositoryMetadataCall(String repository, RepositoryMe final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -666,7 +666,7 @@ public okhttp3.Call dumpRefsCall(String repository, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -902,7 +902,7 @@ public okhttp3.Call getGarbageCollectionConfigCall(final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1010,7 +1010,7 @@ public okhttp3.Call getLakeFSVersionCall(final ApiCallback _callback) throws Api final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1235,7 +1235,7 @@ public okhttp3.Call getStorageConfigCall(final ApiCallback _callback) throws Api final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1352,7 +1352,7 @@ public okhttp3.Call getUsageReportSummaryCall(final ApiCallback _callback) throw final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1478,7 +1478,7 @@ public okhttp3.Call internalCreateBranchProtectionRuleCall(String repository, Br final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1620,7 +1620,7 @@ public okhttp3.Call internalDeleteBranchProtectionRuleCall(String repository, In final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1761,7 +1761,7 @@ public okhttp3.Call internalDeleteGarbageCollectionRulesCall(String repository, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1894,7 +1894,7 @@ public okhttp3.Call internalGetBranchProtectionRulesCall(String repository, fina final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2031,7 +2031,7 @@ public okhttp3.Call internalGetGarbageCollectionRulesCall(String repository, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2169,7 +2169,7 @@ public okhttp3.Call internalSetGarbageCollectionRulesCall(String repository, Gar final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2307,7 +2307,7 @@ public okhttp3.Call postStatsEventsCall(StatsEventsList statsEventsList, final A final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2432,7 +2432,7 @@ public okhttp3.Call prepareGarbageCollectionCommitsCall(String repository, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2566,7 +2566,7 @@ public okhttp3.Call prepareGarbageCollectionUncommittedCall(String repository, P final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2705,7 +2705,7 @@ public okhttp3.Call restoreRefsCall(String repository, RefsRestore refsRestore, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2840,7 +2840,7 @@ public okhttp3.Call setGarbageCollectionRulesPreflightCall(String repository, fi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2965,7 +2965,7 @@ public okhttp3.Call setRepositoryMetadataCall(String repository, RepositoryMetad final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3359,7 +3359,7 @@ public okhttp3.Call stageObjectCall(String repository, String branch, String pat final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3532,7 +3532,7 @@ public okhttp3.Call uploadObjectPreflightCall(String repository, String branch, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java index 86315a5d54f..526d9c08ef9 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java @@ -100,7 +100,7 @@ public okhttp3.Call getMetaRangeCall(String repository, String metaRange, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -238,7 +238,7 @@ public okhttp3.Call getRangeCall(String repository, String range, final ApiCallb final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java index 1c3ae1d2a52..c391522decd 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java @@ -114,7 +114,7 @@ public okhttp3.Call copyObjectCall(String repository, String branch, String dest final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -285,7 +285,7 @@ public okhttp3.Call deleteObjectCall(String repository, String branch, String pa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -440,7 +440,7 @@ public okhttp3.Call deleteObjectsCall(String repository, String branch, PathList final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -617,7 +617,7 @@ public okhttp3.Call getObjectCall(String repository, String ref, String path, St final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -792,7 +792,7 @@ public okhttp3.Call getUnderlyingPropertiesCall(String repository, String ref, S final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -951,7 +951,7 @@ public okhttp3.Call headObjectCall(String repository, String ref, String path, S final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "HEAD", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1135,7 +1135,7 @@ public okhttp3.Call listObjectsCall(String repository, String ref, Boolean userM final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1308,7 +1308,7 @@ public okhttp3.Call statObjectCall(String repository, String ref, String path, B final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1494,7 +1494,7 @@ public okhttp3.Call uploadObjectCall(String repository, String branch, String pa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java index 026a3bb1b74..67396ac0994 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java @@ -132,7 +132,7 @@ public okhttp3.Call diffRefsCall(String repository, String leftRef, String right final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -296,7 +296,7 @@ public okhttp3.Call findMergeBaseCall(String repository, String sourceRef, Strin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -485,7 +485,7 @@ public okhttp3.Call logCommitsCall(String repository, String ref, String after, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -654,7 +654,7 @@ public okhttp3.Call mergeIntoBranchCall(String repository, String sourceRef, Str final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java index a2c19552453..18263469246 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java @@ -111,7 +111,7 @@ public okhttp3.Call createRepositoryCall(RepositoryCreation repositoryCreation, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -246,7 +246,7 @@ public okhttp3.Call deleteGCRulesCall(String repository, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -378,7 +378,7 @@ public okhttp3.Call deleteRepositoryCall(String repository, Boolean force, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -511,7 +511,7 @@ public okhttp3.Call dumpStatusCall(String repository, String taskId, final ApiCa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -650,7 +650,7 @@ public okhttp3.Call dumpSubmitCall(String repository, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -778,7 +778,7 @@ public okhttp3.Call getBranchProtectionRulesCall(String repository, final ApiCal final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -906,7 +906,7 @@ public okhttp3.Call getGCRulesCall(String repository, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1034,7 +1034,7 @@ public okhttp3.Call getRepositoryCall(String repository, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1162,7 +1162,7 @@ public okhttp3.Call getRepositoryMetadataCall(String repository, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1302,7 +1302,7 @@ public okhttp3.Call listRepositoriesCall(String prefix, String after, Integer am final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1434,7 +1434,7 @@ public okhttp3.Call restoreStatusCall(String repository, String taskId, final Ap final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1575,7 +1575,7 @@ public okhttp3.Call restoreSubmitCall(String repository, RefsRestore refsRestore final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1723,7 +1723,7 @@ public okhttp3.Call setBranchProtectionRulesCall(String repository, List +### external_auth + +- **Type**: HTTP basic authentication + ## Recommendation diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index 3de387aa77b..0e7c11bee79 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -15,6 +15,7 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] +- external_auth: [] paths: /setup_comm_prefs: post: @@ -174,6 +175,47 @@ paths: - auth x-content-type: application/json x-accepts: application/json + /auth/external/login: + post: + operationId: externalLogin + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/ExternalLoginInformation' + responses: + "200": + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticationToken' + description: successful login + headers: + Set-Cookie: + explode: false + schema: + type: string + style: simple + "401": + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + description: Unauthorized + "420": + description: too many requests + default: + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + description: Internal Server Error + security: [] + summary: perform a login using an external authenticator + tags: + - auth + x-content-type: application/json + x-accepts: application/json /auth/capabilities: get: operationId: getAuthCapabilities @@ -8114,6 +8156,15 @@ components: - access_key_id - secret_access_key type: object + ExternalLoginInformation: + example: + presigned_url: presigned_url + properties: + presigned_url: + type: string + required: + - presigned_url + type: object AuthenticationToken: example: token_expiration: 0 @@ -9034,4 +9085,7 @@ components: in: cookie name: saml_auth_session type: apiKey + external_auth: + scheme: basic + type: http diff --git a/clients/java/docs/ActionsApi.md b/clients/java/docs/ActionsApi.md index 7e7b850c96f..4999927c8a0 100644 --- a/clients/java/docs/ActionsApi.md +++ b/clients/java/docs/ActionsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -89,7 +94,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -137,6 +142,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -186,7 +196,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -234,6 +244,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -291,7 +306,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -339,6 +354,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -392,7 +412,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/AuthApi.md b/clients/java/docs/AuthApi.md index febab38cd46..e5659b16cfe 100644 --- a/clients/java/docs/AuthApi.md +++ b/clients/java/docs/AuthApi.md @@ -20,6 +20,7 @@ All URIs are relative to */api/v1* | [**deleteUserExternalPrincipal**](AuthApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user | | [**detachPolicyFromGroup**](AuthApi.md#detachPolicyFromGroup) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group | | [**detachPolicyFromUser**](AuthApi.md#detachPolicyFromUser) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user | +| [**externalLogin**](AuthApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator | | [**getCredentials**](AuthApi.md#getCredentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials | | [**getCurrentUser**](AuthApi.md#getCurrentUser) | **GET** /user | get current user | | [**getExternalPrincipal**](AuthApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id | @@ -73,6 +74,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -119,7 +125,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -167,6 +173,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -213,7 +224,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -261,6 +272,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -307,7 +323,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -355,6 +371,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -400,7 +421,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -448,6 +469,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -494,7 +520,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -542,6 +568,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -587,7 +618,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -636,6 +667,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -682,7 +718,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -731,6 +767,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -780,7 +821,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -829,6 +870,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -875,7 +921,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -923,6 +969,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -967,7 +1018,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1015,6 +1066,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1061,7 +1117,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1109,6 +1165,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1153,7 +1214,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1201,6 +1262,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1245,7 +1311,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1293,6 +1359,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1339,7 +1410,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1387,6 +1458,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1433,7 +1509,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1481,6 +1557,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1527,7 +1608,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1543,6 +1624,71 @@ null (empty response body) | **420** | too many requests | - | | **0** | Internal Server Error | - | + +# **externalLogin** +> AuthenticationToken externalLogin().externalLoginInformation(externalLoginInformation).execute(); + +perform a login using an external authenticator + +### Example +```java +// Import classes: +import io.lakefs.clients.sdk.ApiClient; +import io.lakefs.clients.sdk.ApiException; +import io.lakefs.clients.sdk.Configuration; +import io.lakefs.clients.sdk.models.*; +import io.lakefs.clients.sdk.AuthApi; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("/api/v1"); + + AuthApi apiInstance = new AuthApi(defaultClient); + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + try { + AuthenticationToken result = apiInstance.externalLogin() + .externalLoginInformation(externalLoginInformation) + .execute(); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling AuthApi#externalLogin"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +| Name | Type | Description | Notes | +|------------- | ------------- | ------------- | -------------| +| **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] | + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +| **200** | successful login | * Set-Cookie -
| +| **401** | Unauthorized | - | +| **420** | too many requests | - | +| **0** | Internal Server Error | - | + # **getCredentials** > Credentials getCredentials(userId, accessKeyId).execute(); @@ -1575,6 +1721,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1622,7 +1773,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1670,6 +1821,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1711,7 +1867,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1755,6 +1911,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1800,7 +1961,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1848,6 +2009,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1893,7 +2059,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1941,6 +2107,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1986,7 +2157,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2034,6 +2205,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2079,7 +2255,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2127,6 +2303,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2172,7 +2353,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2220,6 +2401,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2274,7 +2460,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2321,6 +2507,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2375,7 +2566,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2423,6 +2614,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2475,7 +2671,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2522,6 +2718,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2574,7 +2775,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2621,6 +2822,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2675,7 +2881,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2723,6 +2929,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2777,7 +2988,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2825,6 +3036,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2879,7 +3095,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2927,6 +3143,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2984,7 +3205,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3032,6 +3253,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3084,7 +3310,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3196,6 +3422,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3242,7 +3473,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3290,6 +3521,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3337,7 +3573,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/BranchesApi.md b/clients/java/docs/BranchesApi.md index 7f46857e87b..dc939c30521 100644 --- a/clients/java/docs/BranchesApi.md +++ b/clients/java/docs/BranchesApi.md @@ -46,6 +46,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -95,7 +100,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -146,6 +151,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -193,7 +203,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -244,6 +254,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -293,7 +308,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -342,6 +357,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -401,7 +421,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -449,6 +469,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -496,7 +521,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -544,6 +569,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -598,7 +628,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -646,6 +676,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -694,7 +729,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -744,6 +779,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -792,7 +832,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/CommitsApi.md b/clients/java/docs/CommitsApi.md index a60dae05893..4b6beda5ce9 100644 --- a/clients/java/docs/CommitsApi.md +++ b/clients/java/docs/CommitsApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -92,7 +97,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -144,6 +149,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -191,7 +201,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ConfigApi.md b/clients/java/docs/ConfigApi.md index e629af1eb17..43497bd9217 100644 --- a/clients/java/docs/ConfigApi.md +++ b/clients/java/docs/ConfigApi.md @@ -41,6 +41,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -82,7 +87,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ExperimentalApi.md b/clients/java/docs/ExperimentalApi.md index 16607db1ad9..75d379e989f 100644 --- a/clients/java/docs/ExperimentalApi.md +++ b/clients/java/docs/ExperimentalApi.md @@ -48,6 +48,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -101,7 +106,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -152,6 +157,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -206,7 +216,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -258,6 +268,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -310,7 +325,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -359,6 +374,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -408,7 +428,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -457,6 +477,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -503,7 +528,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -551,6 +576,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -596,7 +626,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -646,6 +676,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -697,7 +732,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -747,6 +782,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -801,7 +841,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ExternalApi.md b/clients/java/docs/ExternalApi.md index 7c18c871b5d..970723ffeaf 100644 --- a/clients/java/docs/ExternalApi.md +++ b/clients/java/docs/ExternalApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -91,7 +96,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -140,6 +145,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -186,7 +196,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -234,6 +244,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -279,7 +294,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -327,6 +342,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -381,7 +401,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ExternalLoginInformation.md b/clients/java/docs/ExternalLoginInformation.md new file mode 100644 index 00000000000..eecddca1925 --- /dev/null +++ b/clients/java/docs/ExternalLoginInformation.md @@ -0,0 +1,13 @@ + + +# ExternalLoginInformation + + +## Properties + +| Name | Type | Description | Notes | +|------------ | ------------- | ------------- | -------------| +|**presignedUrl** | **String** | | | + + + diff --git a/clients/java/docs/ImportApi.md b/clients/java/docs/ImportApi.md index 625bcd954ca..c1c79fda81d 100644 --- a/clients/java/docs/ImportApi.md +++ b/clients/java/docs/ImportApi.md @@ -41,6 +41,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -89,7 +94,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -139,6 +144,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -188,7 +198,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -238,6 +248,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -287,7 +302,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/InternalApi.md b/clients/java/docs/InternalApi.md index 2298ca6a769..06f90ffc466 100644 --- a/clients/java/docs/InternalApi.md +++ b/clients/java/docs/InternalApi.md @@ -65,6 +65,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -109,7 +114,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -158,6 +163,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -204,7 +214,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -254,6 +264,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -304,7 +319,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -354,6 +369,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -400,7 +420,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -447,6 +467,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -492,7 +517,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -602,6 +627,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -643,7 +673,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -690,6 +720,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -731,7 +766,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -837,6 +872,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -878,7 +918,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -923,6 +963,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -964,7 +1009,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1013,6 +1058,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1059,7 +1109,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1107,6 +1157,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1153,7 +1208,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1201,6 +1256,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1245,7 +1305,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1293,6 +1353,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1338,7 +1403,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1386,6 +1451,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1431,7 +1501,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1479,6 +1549,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1525,7 +1600,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1573,6 +1648,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1617,7 +1697,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1665,6 +1745,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1710,7 +1795,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1759,6 +1844,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1807,7 +1897,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1857,6 +1947,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1903,7 +1998,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1952,6 +2047,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1996,7 +2096,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2046,6 +2146,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2092,7 +2197,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2269,6 +2374,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2320,7 +2430,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2370,6 +2480,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2418,7 +2533,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/MetadataApi.md b/clients/java/docs/MetadataApi.md index 07a12c74861..490ae7f07a0 100644 --- a/clients/java/docs/MetadataApi.md +++ b/clients/java/docs/MetadataApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -87,7 +92,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -135,6 +140,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -182,7 +192,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ObjectsApi.md b/clients/java/docs/ObjectsApi.md index d441235e74e..8b03c9a24e1 100644 --- a/clients/java/docs/ObjectsApi.md +++ b/clients/java/docs/ObjectsApi.md @@ -47,6 +47,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -98,7 +103,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -148,6 +153,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -199,7 +209,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -248,6 +258,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -300,7 +315,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -349,6 +364,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -407,7 +427,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -460,6 +480,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -509,7 +534,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -557,6 +582,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -608,7 +638,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -659,6 +689,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -724,7 +759,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -772,6 +807,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -827,7 +867,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -877,6 +917,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -938,7 +983,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/RefsApi.md b/clients/java/docs/RefsApi.md index 36100c42bf4..65da1b9e973 100644 --- a/clients/java/docs/RefsApi.md +++ b/clients/java/docs/RefsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -106,7 +111,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -154,6 +159,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -203,7 +213,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -252,6 +262,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -323,7 +338,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -371,6 +386,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -423,7 +443,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/RepositoriesApi.md b/clients/java/docs/RepositoriesApi.md index 664fcc4ef43..cb8559cf7db 100644 --- a/clients/java/docs/RepositoriesApi.md +++ b/clients/java/docs/RepositoriesApi.md @@ -52,6 +52,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -100,7 +105,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -149,6 +154,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -193,7 +203,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -242,6 +252,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -289,7 +304,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -337,6 +352,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -384,7 +404,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -433,6 +453,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -478,7 +503,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -526,6 +551,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -571,7 +601,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -619,6 +649,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -664,7 +699,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -712,6 +747,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -757,7 +797,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -805,6 +845,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -850,7 +895,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -898,6 +943,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -950,7 +1000,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -997,6 +1047,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1044,7 +1099,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1093,6 +1148,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1140,7 +1200,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1189,6 +1249,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1238,7 +1303,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1289,6 +1354,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1335,7 +1405,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/StagingApi.md b/clients/java/docs/StagingApi.md index 922fab5d459..ff9c5c864b0 100644 --- a/clients/java/docs/StagingApi.md +++ b/clients/java/docs/StagingApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -92,7 +97,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -142,6 +147,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -196,7 +206,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/TagsApi.md b/clients/java/docs/TagsApi.md index 0fb60d7a48f..0129047289b 100644 --- a/clients/java/docs/TagsApi.md +++ b/clients/java/docs/TagsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -89,7 +94,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -140,6 +145,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -189,7 +199,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -238,6 +248,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -285,7 +300,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -333,6 +348,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -387,7 +407,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java index 3dba7a7a802..a912a91f951 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java @@ -118,7 +118,7 @@ private okhttp3.Call getRunCall(String repository, String runId, final ApiCallba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -301,7 +301,7 @@ private okhttp3.Call getRunHookOutputCall(String repository, String runId, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -505,7 +505,7 @@ private okhttp3.Call listRepositoryRunsCall(String repository, String after, Int localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -730,7 +730,7 @@ private okhttp3.Call listRunHooksCall(String repository, String runId, String af localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java index 38fd1cbfcd2..f9b3e2e6cc6 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java @@ -104,6 +104,7 @@ public ApiClient() { authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); + authentications.put("external_auth", new HttpBasicAuth()); // Prevent the authentications from being modified. authentications = Collections.unmodifiableMap(authentications); } @@ -124,6 +125,7 @@ public ApiClient(OkHttpClient client) { authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); + authentications.put("external_auth", new HttpBasicAuth()); // Prevent the authentications from being modified. authentications = Collections.unmodifiableMap(authentications); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java index 87deaed69fc..9475c4e37bb 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java @@ -35,6 +35,7 @@ import io.lakefs.clients.sdk.model.CurrentUser; import io.lakefs.clients.sdk.model.Error; import io.lakefs.clients.sdk.model.ErrorNoACL; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -133,7 +134,7 @@ private okhttp3.Call addGroupMembershipCall(String groupId, String userId, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -310,7 +311,7 @@ private okhttp3.Call attachPolicyToGroupCall(String groupId, String policyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -487,7 +488,7 @@ private okhttp3.Call attachPolicyToUserCall(String userId, String policyId, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -663,7 +664,7 @@ private okhttp3.Call createCredentialsCall(String userId, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -835,7 +836,7 @@ private okhttp3.Call createGroupCall(GroupCreation groupCreation, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1010,7 +1011,7 @@ private okhttp3.Call createPolicyCall(Policy policy, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1187,7 +1188,7 @@ private okhttp3.Call createUserCall(UserCreation userCreation, final ApiCallback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1372,7 +1373,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1565,7 +1566,7 @@ private okhttp3.Call deleteCredentialsCall(String userId, String accessKeyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1741,7 +1742,7 @@ private okhttp3.Call deleteGroupCall(String groupId, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1910,7 +1911,7 @@ private okhttp3.Call deleteGroupMembershipCall(String groupId, String userId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2086,7 +2087,7 @@ private okhttp3.Call deletePolicyCall(String policyId, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2254,7 +2255,7 @@ private okhttp3.Call deleteUserCall(String userId, final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2426,7 +2427,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2603,7 +2604,7 @@ private okhttp3.Call detachPolicyFromGroupCall(String groupId, String policyId, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2780,7 +2781,7 @@ private okhttp3.Call detachPolicyFromUserCall(String userId, String policyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2915,6 +2916,176 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdetachPolicyFromUserRequest detachPolicyFromUser(String userId, String policyId) { return new APIdetachPolicyFromUserRequest(userId, policyId); } + private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + String basePath = null; + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = externalLoginInformation; + + // create path and map variables + String localVarPath = "/auth/external/login"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + return externalLoginCall(externalLoginInformation, _callback); + + } + + + private ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + private okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } + + public class APIexternalLoginRequest { + private ExternalLoginInformation externalLoginInformation; + + private APIexternalLoginRequest() { + } + + /** + * Set externalLoginInformation + * @param externalLoginInformation (optional) + * @return APIexternalLoginRequest + */ + public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation externalLoginInformation) { + this.externalLoginInformation = externalLoginInformation; + return this; + } + + /** + * Build call for externalLogin + * @param _callback ApiCallback API callback + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { + return externalLoginCall(externalLoginInformation, _callback); + } + + /** + * Execute externalLogin request + * @return AuthenticationToken + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public AuthenticationToken execute() throws ApiException { + ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + return localVarResp.getData(); + } + + /** + * Execute externalLogin request with HTTP info returned + * @return ApiResponse<AuthenticationToken> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public ApiResponse executeWithHttpInfo() throws ApiException { + return externalLoginWithHttpInfo(externalLoginInformation); + } + + /** + * Execute externalLogin request (asynchronously) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { + return externalLoginAsync(externalLoginInformation, _callback); + } + } + + /** + * perform a login using an external authenticator + * + * @return APIexternalLoginRequest + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public APIexternalLoginRequest externalLogin() { + return new APIexternalLoginRequest(); + } private okhttp3.Call getCredentialsCall(String userId, String accessKeyId, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers @@ -2957,7 +3128,7 @@ private okhttp3.Call getCredentialsCall(String userId, String accessKeyId, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3136,7 +3307,7 @@ private okhttp3.Call getCurrentUserCall(final ApiCallback _callback) throws ApiE localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3283,7 +3454,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3455,7 +3626,7 @@ private okhttp3.Call getGroupCall(String groupId, final ApiCallback _callback) t localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3627,7 +3798,7 @@ private okhttp3.Call getGroupACLCall(String groupId, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3799,7 +3970,7 @@ private okhttp3.Call getPolicyCall(String policyId, final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3971,7 +4142,7 @@ private okhttp3.Call getUserCall(String userId, final ApiCallback _callback) thr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4155,7 +4326,7 @@ private okhttp3.Call listGroupMembersCall(String groupId, String prefix, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4367,7 +4538,7 @@ private okhttp3.Call listGroupPoliciesCall(String groupId, String prefix, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4583,7 +4754,7 @@ private okhttp3.Call listGroupsCall(String prefix, String after, Integer amount, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4786,7 +4957,7 @@ private okhttp3.Call listPoliciesCall(String prefix, String after, Integer amoun localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4990,7 +5161,7 @@ private okhttp3.Call listUserCredentialsCall(String userId, String prefix, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5207,7 +5378,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5424,7 +5595,7 @@ private okhttp3.Call listUserGroupsCall(String userId, String prefix, String aft localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5645,7 +5816,7 @@ private okhttp3.Call listUserPoliciesCall(String userId, String prefix, String a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5872,7 +6043,7 @@ private okhttp3.Call listUsersCall(String prefix, String after, Integer amount, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -6235,7 +6406,7 @@ private okhttp3.Call setGroupACLCall(String groupId, ACL ACL, final ApiCallback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -6412,7 +6583,7 @@ private okhttp3.Call updatePolicyCall(String policyId, Policy policy, final ApiC localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java index 4a78a796eca..4cbfe887f27 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java @@ -123,7 +123,7 @@ private okhttp3.Call cherryPickCall(String repository, String branch, CherryPick localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -328,7 +328,7 @@ private okhttp3.Call createBranchCall(String repository, BranchCreation branchCr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -528,7 +528,7 @@ private okhttp3.Call deleteBranchCall(String repository, String branch, Boolean localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -737,7 +737,7 @@ private okhttp3.Call diffBranchCall(String repository, String branch, String aft localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -962,7 +962,7 @@ private okhttp3.Call getBranchCall(String repository, String branch, final ApiCa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1154,7 +1154,7 @@ private okhttp3.Call listBranchesCall(String repository, String prefix, String a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1361,7 +1361,7 @@ private okhttp3.Call resetBranchCall(String repository, String branch, ResetCrea localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1557,7 +1557,7 @@ private okhttp3.Call revertBranchCall(String repository, String branch, RevertCr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java index b051276275a..81cc5f97ead 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java @@ -121,7 +121,7 @@ private okhttp3.Call commitCall(String repository, String branch, CommitCreation localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -341,7 +341,7 @@ private okhttp3.Call getCommitCall(String repository, String commitId, final Api localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java index 6964e235fe2..3d654431023 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java @@ -113,7 +113,7 @@ private okhttp3.Call getConfigCall(final ApiCallback _callback) throws ApiExcept localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java index 33e31fcf763..870f523362d 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java @@ -128,7 +128,7 @@ private okhttp3.Call abortPresignMultipartUploadCall(String repository, String b localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -343,7 +343,7 @@ private okhttp3.Call completePresignMultipartUploadCall(String repository, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -569,7 +569,7 @@ private okhttp3.Call createPresignMultipartUploadCall(String repository, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -778,7 +778,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -974,7 +974,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1153,7 +1153,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1334,7 +1334,7 @@ private okhttp3.Call hardResetBranchCall(String repository, String branch, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1551,7 +1551,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java index 9ca35228673..0535d9a3449 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java @@ -121,7 +121,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -317,7 +317,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -496,7 +496,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -680,7 +680,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java index 098f0258595..b0f4d6607a2 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java @@ -121,7 +121,7 @@ private okhttp3.Call importCancelCall(String repository, String branch, String i localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -317,7 +317,7 @@ private okhttp3.Call importStartCall(String repository, String branch, ImportCre localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -520,7 +520,7 @@ private okhttp3.Call importStatusCall(String repository, String branch, String i localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java index f31b348964b..f419eb2f3e6 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java @@ -137,7 +137,7 @@ private okhttp3.Call createBranchProtectionRulePreflightCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -311,7 +311,7 @@ private okhttp3.Call createCommitRecordCall(String repository, CommitRecordCreat localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -502,7 +502,7 @@ private okhttp3.Call createSymlinkFileCall(String repository, String branch, Str localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -694,7 +694,7 @@ private okhttp3.Call deleteRepositoryMetadataCall(String repository, RepositoryM localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -865,7 +865,7 @@ private okhttp3.Call dumpRefsCall(String repository, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1194,7 +1194,7 @@ private okhttp3.Call getGarbageCollectionConfigCall(final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1342,7 +1342,7 @@ private okhttp3.Call getLakeFSVersionCall(final ApiCallback _callback) throws Ap localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1654,7 +1654,7 @@ private okhttp3.Call getStorageConfigCall(final ApiCallback _callback) throws Ap localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1814,7 +1814,7 @@ private okhttp3.Call getUsageReportSummaryCall(final ApiCallback _callback) thro localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1984,7 +1984,7 @@ private okhttp3.Call internalCreateBranchProtectionRuleCall(String repository, B localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2172,7 +2172,7 @@ private okhttp3.Call internalDeleteBranchProtectionRuleCall(String repository, I localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2359,7 +2359,7 @@ private okhttp3.Call internalDeleteGarbageCollectionRulesCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2538,7 +2538,7 @@ private okhttp3.Call internalGetBranchProtectionRulesCall(String repository, fin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2721,7 +2721,7 @@ private okhttp3.Call internalGetGarbageCollectionRulesCall(String repository, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2905,7 +2905,7 @@ private okhttp3.Call internalSetGarbageCollectionRulesCall(String repository, Ga localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3092,7 +3092,7 @@ private okhttp3.Call postStatsEventsCall(StatsEventsList statsEventsList, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3260,7 +3260,7 @@ private okhttp3.Call prepareGarbageCollectionCommitsCall(String repository, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3438,7 +3438,7 @@ private okhttp3.Call prepareGarbageCollectionUncommittedCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3632,7 +3632,7 @@ private okhttp3.Call restoreRefsCall(String repository, RefsRestore refsRestore, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3813,7 +3813,7 @@ private okhttp3.Call setGarbageCollectionRulesPreflightCall(String repository, f localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3982,7 +3982,7 @@ private okhttp3.Call setRepositoryMetadataCall(String repository, RepositoryMeta localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4504,7 +4504,7 @@ private okhttp3.Call stageObjectCall(String repository, String branch, String pa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4726,7 +4726,7 @@ private okhttp3.Call uploadObjectPreflightCall(String repository, String branch, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java b/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java index b0b1f6dea02..753267e0a6c 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java @@ -118,6 +118,7 @@ private static Class getClassByDiscriminator(Map classByDiscriminatorValue, Stri gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.DiffList.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.Error.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ErrorNoACL.CustomTypeAdapterFactory()); + gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalLoginInformation.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalPrincipal.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalPrincipalCreation.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalPrincipalList.CustomTypeAdapterFactory()); diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java index 8d8e51f62fa..b72d096e83a 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java @@ -115,7 +115,7 @@ private okhttp3.Call getMetaRangeCall(String repository, String metaRange, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -296,7 +296,7 @@ private okhttp3.Call getRangeCall(String repository, String range, final ApiCall localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java index 8f2ea7cc92d..a45c23100e4 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java @@ -126,7 +126,7 @@ private okhttp3.Call copyObjectCall(String repository, String branch, String des localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -341,7 +341,7 @@ private okhttp3.Call deleteObjectCall(String repository, String branch, String p localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -547,7 +547,7 @@ private okhttp3.Call deleteObjectsCall(String repository, String branch, PathLis localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -769,7 +769,7 @@ private okhttp3.Call getObjectCall(String repository, String ref, String path, S localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1020,7 +1020,7 @@ private okhttp3.Call getUnderlyingPropertiesCall(String repository, String ref, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1216,7 +1216,7 @@ private okhttp3.Call headObjectCall(String repository, String ref, String path, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "HEAD", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1451,7 +1451,7 @@ private okhttp3.Call listObjectsCall(String repository, String ref, Boolean user localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1710,7 +1710,7 @@ private okhttp3.Call statObjectCall(String repository, String ref, String path, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1953,7 +1953,7 @@ private okhttp3.Call uploadObjectCall(String repository, String branch, String p localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java index e266e9d9cd4..23892e0a897 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java @@ -141,7 +141,7 @@ private okhttp3.Call diffRefsCall(String repository, String leftRef, String righ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -386,7 +386,7 @@ private okhttp3.Call findMergeBaseCall(String repository, String sourceRef, Stri localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -612,7 +612,7 @@ private okhttp3.Call logCommitsCall(String repository, String ref, String after, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -883,7 +883,7 @@ private okhttp3.Call mergeIntoBranchCall(String repository, String sourceRef, St localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java index 2b45a54a744..d1b4d94a3c0 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java @@ -126,7 +126,7 @@ private okhttp3.Call createRepositoryCall(RepositoryCreation repositoryCreation, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -314,7 +314,7 @@ private okhttp3.Call deleteGCRulesCall(String repository, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -491,7 +491,7 @@ private okhttp3.Call deleteRepositoryCall(String repository, Boolean force, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -674,7 +674,7 @@ private okhttp3.Call dumpStatusCall(String repository, String taskId, final ApiC localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -859,7 +859,7 @@ private okhttp3.Call dumpSubmitCall(String repository, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1031,7 +1031,7 @@ private okhttp3.Call getBranchProtectionRulesCall(String repository, final ApiCa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1203,7 +1203,7 @@ private okhttp3.Call getGCRulesCall(String repository, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1375,7 +1375,7 @@ private okhttp3.Call getRepositoryCall(String repository, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1547,7 +1547,7 @@ private okhttp3.Call getRepositoryMetadataCall(String repository, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1730,7 +1730,7 @@ private okhttp3.Call listRepositoriesCall(String prefix, String after, Integer a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1926,7 +1926,7 @@ private okhttp3.Call restoreStatusCall(String repository, String taskId, final A localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2112,7 +2112,7 @@ private okhttp3.Call restoreSubmitCall(String repository, RefsRestore refsRestor localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2302,7 +2302,7 @@ private okhttp3.Call setBranchProtectionRulesCall(String repository, List additionalProperties; + + /** + * Set the additional (undeclared) property with the specified name and value. + * If the property does not already exist, create it otherwise replace it. + * + * @param key name of the property + * @param value value of the property + * @return the ExternalLoginInformation instance itself + */ + public ExternalLoginInformation putAdditionalProperty(String key, Object value) { + if (this.additionalProperties == null) { + this.additionalProperties = new HashMap(); + } + this.additionalProperties.put(key, value); + return this; + } + + /** + * Return the additional (undeclared) property. + * + * @return a map of objects + */ + public Map getAdditionalProperties() { + return additionalProperties; + } + + /** + * Return the additional (undeclared) property with the specified name. + * + * @param key name of the property + * @return an object + */ + public Object getAdditionalProperty(String key) { + if (this.additionalProperties == null) { + return null; + } + return this.additionalProperties.get(key); + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + ExternalLoginInformation externalLoginInformation = (ExternalLoginInformation) o; + return Objects.equals(this.presignedUrl, externalLoginInformation.presignedUrl)&& + Objects.equals(this.additionalProperties, externalLoginInformation.additionalProperties); + } + + @Override + public int hashCode() { + return Objects.hash(presignedUrl, additionalProperties); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class ExternalLoginInformation {\n"); + sb.append(" presignedUrl: ").append(toIndentedString(presignedUrl)).append("\n"); + sb.append(" additionalProperties: ").append(toIndentedString(additionalProperties)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + + + public static HashSet openapiFields; + public static HashSet openapiRequiredFields; + + static { + // a set of all properties/fields (JSON key names) + openapiFields = new HashSet(); + openapiFields.add("presigned_url"); + + // a set of required properties/fields (JSON key names) + openapiRequiredFields = new HashSet(); + openapiRequiredFields.add("presigned_url"); + } + + /** + * Validates the JSON Element and throws an exception if issues found + * + * @param jsonElement JSON Element + * @throws IOException if the JSON Element is invalid with respect to ExternalLoginInformation + */ + public static void validateJsonElement(JsonElement jsonElement) throws IOException { + if (jsonElement == null) { + if (!ExternalLoginInformation.openapiRequiredFields.isEmpty()) { // has required fields but JSON element is null + throw new IllegalArgumentException(String.format("The required field(s) %s in ExternalLoginInformation is not found in the empty JSON string", ExternalLoginInformation.openapiRequiredFields.toString())); + } + } + + // check to make sure all required properties/fields are present in the JSON string + for (String requiredField : ExternalLoginInformation.openapiRequiredFields) { + if (jsonElement.getAsJsonObject().get(requiredField) == null) { + throw new IllegalArgumentException(String.format("The required field `%s` is not found in the JSON string: %s", requiredField, jsonElement.toString())); + } + } + JsonObject jsonObj = jsonElement.getAsJsonObject(); + if (!jsonObj.get("presigned_url").isJsonPrimitive()) { + throw new IllegalArgumentException(String.format("Expected the field `presigned_url` to be a primitive type in the JSON string but got `%s`", jsonObj.get("presigned_url").toString())); + } + } + + public static class CustomTypeAdapterFactory implements TypeAdapterFactory { + @SuppressWarnings("unchecked") + @Override + public TypeAdapter create(Gson gson, TypeToken type) { + if (!ExternalLoginInformation.class.isAssignableFrom(type.getRawType())) { + return null; // this class only serializes 'ExternalLoginInformation' and its subtypes + } + final TypeAdapter elementAdapter = gson.getAdapter(JsonElement.class); + final TypeAdapter thisAdapter + = gson.getDelegateAdapter(this, TypeToken.get(ExternalLoginInformation.class)); + + return (TypeAdapter) new TypeAdapter() { + @Override + public void write(JsonWriter out, ExternalLoginInformation value) throws IOException { + JsonObject obj = thisAdapter.toJsonTree(value).getAsJsonObject(); + obj.remove("additionalProperties"); + // serialize additional properties + if (value.getAdditionalProperties() != null) { + for (Map.Entry entry : value.getAdditionalProperties().entrySet()) { + if (entry.getValue() instanceof String) + obj.addProperty(entry.getKey(), (String) entry.getValue()); + else if (entry.getValue() instanceof Number) + obj.addProperty(entry.getKey(), (Number) entry.getValue()); + else if (entry.getValue() instanceof Boolean) + obj.addProperty(entry.getKey(), (Boolean) entry.getValue()); + else if (entry.getValue() instanceof Character) + obj.addProperty(entry.getKey(), (Character) entry.getValue()); + else { + obj.add(entry.getKey(), gson.toJsonTree(entry.getValue()).getAsJsonObject()); + } + } + } + elementAdapter.write(out, obj); + } + + @Override + public ExternalLoginInformation read(JsonReader in) throws IOException { + JsonElement jsonElement = elementAdapter.read(in); + validateJsonElement(jsonElement); + JsonObject jsonObj = jsonElement.getAsJsonObject(); + // store additional fields in the deserialized instance + ExternalLoginInformation instance = thisAdapter.fromJsonTree(jsonObj); + for (Map.Entry entry : jsonObj.entrySet()) { + if (!openapiFields.contains(entry.getKey())) { + if (entry.getValue().isJsonPrimitive()) { // primitive type + if (entry.getValue().getAsJsonPrimitive().isString()) + instance.putAdditionalProperty(entry.getKey(), entry.getValue().getAsString()); + else if (entry.getValue().getAsJsonPrimitive().isNumber()) + instance.putAdditionalProperty(entry.getKey(), entry.getValue().getAsNumber()); + else if (entry.getValue().getAsJsonPrimitive().isBoolean()) + instance.putAdditionalProperty(entry.getKey(), entry.getValue().getAsBoolean()); + else + throw new IllegalArgumentException(String.format("The field `%s` has unknown primitive type. Value: %s", entry.getKey(), entry.getValue().toString())); + } else if (entry.getValue().isJsonArray()) { + instance.putAdditionalProperty(entry.getKey(), gson.fromJson(entry.getValue(), List.class)); + } else { // JSON object + instance.putAdditionalProperty(entry.getKey(), gson.fromJson(entry.getValue(), HashMap.class)); + } + } + } + return instance; + } + + }.nullSafe(); + } + } + + /** + * Create an instance of ExternalLoginInformation given an JSON string + * + * @param jsonString JSON string + * @return An instance of ExternalLoginInformation + * @throws IOException if the JSON string is invalid with respect to ExternalLoginInformation + */ + public static ExternalLoginInformation fromJson(String jsonString) throws IOException { + return JSON.getGson().fromJson(jsonString, ExternalLoginInformation.class); + } + + /** + * Convert an instance of ExternalLoginInformation to an JSON string + * + * @return JSON string + */ + public String toJson() { + return JSON.getGson().toJson(this); + } +} + diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java index f9d84601df9..734633761f9 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java @@ -22,6 +22,7 @@ import io.lakefs.clients.sdk.model.CurrentUser; import io.lakefs.clients.sdk.model.Error; import io.lakefs.clients.sdk.model.ErrorNoACL; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -271,6 +272,20 @@ public void detachPolicyFromUserTest() throws ApiException { // TODO: test validations } + /** + * perform a login using an external authenticator + * + * @throws ApiException if the Api call fails + */ + @Test + public void externalLoginTest() throws ApiException { + ExternalLoginInformation externalLoginInformation = null; + AuthenticationToken response = api.externalLogin() + .externalLoginInformation(externalLoginInformation) + .execute(); + // TODO: test validations + } + /** * get credentials * diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java new file mode 100644 index 00000000000..e31664cb104 --- /dev/null +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java @@ -0,0 +1,48 @@ +/* + * lakeFS API + * lakeFS HTTP API + * + * The version of the OpenAPI document: 1.0.0 + * + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.lakefs.clients.sdk.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import java.io.IOException; +import java.util.Arrays; +import org.junit.jupiter.api.Disabled; +import org.junit.jupiter.api.Test; + +/** + * Model tests for ExternalLoginInformation + */ +public class ExternalLoginInformationTest { + private final ExternalLoginInformation model = new ExternalLoginInformation(); + + /** + * Model tests for ExternalLoginInformation + */ + @Test + public void testExternalLoginInformation() { + // TODO: test ExternalLoginInformation + } + + /** + * Test the property 'presignedUrl' + */ + @Test + public void presignedUrlTest() { + // TODO: test presignedUrl + } + +} diff --git a/clients/python-legacy/.openapi-generator/FILES b/clients/python-legacy/.openapi-generator/FILES index e80cce0a23f..28b715a94e3 100644 --- a/clients/python-legacy/.openapi-generator/FILES +++ b/clients/python-legacy/.openapi-generator/FILES @@ -34,6 +34,7 @@ docs/Error.md docs/ErrorNoACL.md docs/ExperimentalApi.md docs/ExternalApi.md +docs/ExternalLoginInformation.md docs/ExternalPrincipal.md docs/ExternalPrincipalCreation.md docs/ExternalPrincipalList.md @@ -168,6 +169,7 @@ lakefs_client/model/diff.py lakefs_client/model/diff_list.py lakefs_client/model/error.py lakefs_client/model/error_no_acl.py +lakefs_client/model/external_login_information.py lakefs_client/model/external_principal.py lakefs_client/model/external_principal_creation.py lakefs_client/model/external_principal_list.py @@ -283,6 +285,7 @@ test/test_error.py test/test_error_no_acl.py test/test_experimental_api.py test/test_external_api.py +test/test_external_login_information.py test/test_external_principal.py test/test_external_principal_creation.py test/test_external_principal_list.py diff --git a/clients/python-legacy/README.md b/clients/python-legacy/README.md index ae4e3c3cab1..32cc15f1d03 100644 --- a/clients/python-legacy/README.md +++ b/clients/python-legacy/README.md @@ -77,6 +77,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -136,6 +142,7 @@ Class | Method | HTTP request | Description *AuthApi* | [**delete_user_external_principal**](docs/AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user *AuthApi* | [**detach_policy_from_group**](docs/AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group *AuthApi* | [**detach_policy_from_user**](docs/AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +*AuthApi* | [**external_login**](docs/AuthApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator *AuthApi* | [**get_credentials**](docs/AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials *AuthApi* | [**get_current_user**](docs/AuthApi.md#get_current_user) | **GET** /user | get current user *AuthApi* | [**get_external_principal**](docs/AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id @@ -273,6 +280,7 @@ Class | Method | HTTP request | Description - [DiffList](docs/DiffList.md) - [Error](docs/Error.md) - [ErrorNoACL](docs/ErrorNoACL.md) + - [ExternalLoginInformation](docs/ExternalLoginInformation.md) - [ExternalPrincipal](docs/ExternalPrincipal.md) - [ExternalPrincipalCreation](docs/ExternalPrincipalCreation.md) - [ExternalPrincipalList](docs/ExternalPrincipalList.md) @@ -365,6 +373,11 @@ Class | Method | HTTP request | Description - **Location**: +## external_auth + +- **Type**: HTTP basic authentication + + ## jwt_token - **Type**: Bearer authentication (JWT) diff --git a/clients/python-legacy/docs/ActionsApi.md b/clients/python-legacy/docs/ActionsApi.md index d31d3f25d47..b4793486d81 100644 --- a/clients/python-legacy/docs/ActionsApi.md +++ b/clients/python-legacy/docs/ActionsApi.md @@ -19,6 +19,7 @@ get a run * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -53,6 +54,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -100,7 +107,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -129,6 +136,7 @@ get run hook output * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -162,6 +170,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -211,7 +225,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -240,6 +254,7 @@ list runs * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -274,6 +289,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -336,7 +357,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -365,6 +386,7 @@ list run hooks * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -399,6 +421,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -459,7 +487,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/AuthApi.md b/clients/python-legacy/docs/AuthApi.md index d80931429c1..7ccf094a0a2 100644 --- a/clients/python-legacy/docs/AuthApi.md +++ b/clients/python-legacy/docs/AuthApi.md @@ -20,6 +20,7 @@ Method | HTTP request | Description [**delete_user_external_principal**](AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user [**detach_policy_from_group**](AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group [**detach_policy_from_user**](AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +[**external_login**](AuthApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_credentials**](AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials [**get_current_user**](AuthApi.md#get_current_user) | **GET** /user | get current user [**get_external_principal**](AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id @@ -50,6 +51,7 @@ add group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -83,6 +85,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -129,7 +137,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -158,6 +166,7 @@ attach policy to group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -191,6 +200,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -237,7 +252,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -266,6 +281,7 @@ attach policy to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -299,6 +315,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -345,7 +367,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -374,6 +396,7 @@ create credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -408,6 +431,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -453,7 +482,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -482,6 +511,7 @@ create group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -517,6 +547,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -565,7 +601,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -594,6 +630,7 @@ create policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -628,6 +665,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -685,7 +728,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -715,6 +758,7 @@ create user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -750,6 +794,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -799,7 +849,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -829,6 +879,7 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -863,6 +914,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -925,7 +982,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -955,6 +1012,7 @@ delete credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -988,6 +1046,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1034,7 +1098,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1063,6 +1127,7 @@ delete group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1096,6 +1161,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1140,7 +1211,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1169,6 +1240,7 @@ delete group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1202,6 +1274,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1248,7 +1326,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1277,6 +1355,7 @@ delete policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1310,6 +1389,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1354,7 +1439,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1383,6 +1468,7 @@ delete user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1416,6 +1502,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1460,7 +1552,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1489,6 +1581,7 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1522,6 +1615,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1568,7 +1667,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1597,6 +1696,7 @@ detach policy from group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1630,6 +1730,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1676,7 +1782,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1705,6 +1811,7 @@ detach policy from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1738,6 +1845,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1784,7 +1897,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1804,6 +1917,79 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **external_login** +> AuthenticationToken external_login() + +perform a login using an external authenticator + +### Example + + +```python +import time +import lakefs_client +from lakefs_client.api import auth_api +from lakefs_client.model.authentication_token import AuthenticationToken +from lakefs_client.model.external_login_information import ExternalLoginInformation +from lakefs_client.model.error import Error +from pprint import pprint +# Defining the host is optional and defaults to http://localhost/api/v1 +# See configuration.py for a list of all supported configuration parameters. +configuration = lakefs_client.Configuration( + host = "http://localhost/api/v1" +) + + +# Enter a context with an instance of the API client +with lakefs_client.ApiClient() as api_client: + # Create an instance of the API class + api_instance = auth_api.AuthApi(api_client) + external_login_information = ExternalLoginInformation( + presigned_url="presigned_url_example", + ) # ExternalLoginInformation | (optional) + + # example passing only required values which don't have defaults set + # and optional values + try: + # perform a login using an external authenticator + api_response = api_instance.external_login(external_login_information=external_login_information) + pprint(api_response) + except lakefs_client.ApiException as e: + print("Exception when calling AuthApi->external_login: %s\n" % e) +``` + + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful login | * Set-Cookie -
| +**401** | Unauthorized | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **get_credentials** > Credentials get_credentials(user_id, access_key_id) @@ -1813,6 +1999,7 @@ get credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1847,6 +2034,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1894,7 +2087,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1923,6 +2116,7 @@ get current user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1956,6 +2150,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1997,7 +2197,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2022,6 +2222,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2056,6 +2257,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2101,7 +2308,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2130,6 +2337,7 @@ get group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2164,6 +2372,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2209,7 +2423,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2238,6 +2452,7 @@ get ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2273,6 +2488,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2318,7 +2539,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2347,6 +2568,7 @@ get policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2381,6 +2603,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2426,7 +2654,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2455,6 +2683,7 @@ get user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2489,6 +2718,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2534,7 +2769,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2563,6 +2798,7 @@ list group members * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2597,6 +2833,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2657,7 +2899,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2685,6 +2927,7 @@ list group policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2719,6 +2962,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2779,7 +3028,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2808,6 +3057,7 @@ list groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2842,6 +3092,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2892,7 +3148,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2920,6 +3176,7 @@ list policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2954,6 +3211,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3004,7 +3267,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3032,6 +3295,7 @@ list user credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3066,6 +3330,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3126,7 +3396,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3155,6 +3425,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3189,6 +3460,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3249,7 +3526,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3278,6 +3555,7 @@ list user groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3312,6 +3590,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3372,7 +3656,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3401,6 +3685,7 @@ list user policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3435,6 +3720,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3497,7 +3788,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3526,6 +3817,7 @@ list users * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3560,6 +3852,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3610,7 +3908,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3712,6 +4010,7 @@ set ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3746,6 +4045,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3794,7 +4099,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3823,6 +4128,7 @@ update policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3857,6 +4163,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3916,7 +4228,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/BranchesApi.md b/clients/python-legacy/docs/BranchesApi.md index 3cfc39c1b24..72c241149cb 100644 --- a/clients/python-legacy/docs/BranchesApi.md +++ b/clients/python-legacy/docs/BranchesApi.md @@ -23,6 +23,7 @@ Replay the changes from the given commit on the branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -58,6 +59,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -111,7 +118,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -143,6 +150,7 @@ create branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -177,6 +185,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -228,7 +242,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -260,6 +274,7 @@ delete branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -293,6 +308,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -349,7 +370,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -379,6 +400,7 @@ diff branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -413,6 +435,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -477,7 +505,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -506,6 +534,7 @@ get branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -540,6 +569,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -587,7 +622,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -616,6 +651,7 @@ list branches * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -650,6 +686,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -710,7 +752,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -739,6 +781,7 @@ reset branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -773,6 +816,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -825,7 +874,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -856,6 +905,7 @@ revert * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -890,6 +940,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -943,7 +999,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/CommitsApi.md b/clients/python-legacy/docs/CommitsApi.md index 85fa23f1a64..1aca799f978 100644 --- a/clients/python-legacy/docs/CommitsApi.md +++ b/clients/python-legacy/docs/CommitsApi.md @@ -17,6 +17,7 @@ create commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -52,6 +53,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -120,7 +127,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -153,6 +160,7 @@ get commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -187,6 +195,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -234,7 +248,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ConfigApi.md b/clients/python-legacy/docs/ConfigApi.md index dd037b3ae89..572ebb14bb1 100644 --- a/clients/python-legacy/docs/ConfigApi.md +++ b/clients/python-legacy/docs/ConfigApi.md @@ -18,6 +18,7 @@ retrieve lakeFS configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -52,6 +53,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -92,7 +99,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ExperimentalApi.md b/clients/python-legacy/docs/ExperimentalApi.md index a9b48f81543..04723c2af1a 100644 --- a/clients/python-legacy/docs/ExperimentalApi.md +++ b/clients/python-legacy/docs/ExperimentalApi.md @@ -25,6 +25,7 @@ Aborts a presign multipart upload. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -59,6 +60,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -121,7 +128,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -153,6 +160,7 @@ Completes a presign multipart upload by assembling the uploaded parts. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -189,6 +197,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -263,7 +277,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -296,6 +310,7 @@ Initiates a multipart upload and returns an upload ID with presigned URLs for ea * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -330,6 +345,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -390,7 +411,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -420,6 +441,7 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -454,6 +476,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -516,7 +544,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -546,6 +574,7 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -579,6 +608,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -625,7 +660,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -654,6 +689,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -688,6 +724,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -733,7 +775,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -764,6 +806,7 @@ Relocate branch to refer to ref. Branch must not contain uncommitted data. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -797,6 +840,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -855,7 +904,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -886,6 +935,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -920,6 +970,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -980,7 +1036,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ExternalApi.md b/clients/python-legacy/docs/ExternalApi.md index 2f213f74f0e..fad6f9dd9fc 100644 --- a/clients/python-legacy/docs/ExternalApi.md +++ b/clients/python-legacy/docs/ExternalApi.md @@ -19,6 +19,7 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -53,6 +54,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -115,7 +122,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -145,6 +152,7 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -178,6 +186,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -224,7 +238,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -253,6 +267,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -287,6 +302,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -332,7 +353,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -361,6 +382,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -395,6 +417,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -455,7 +483,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ExternalLoginInformation.md b/clients/python-legacy/docs/ExternalLoginInformation.md new file mode 100644 index 00000000000..ded5ae9c6ca --- /dev/null +++ b/clients/python-legacy/docs/ExternalLoginInformation.md @@ -0,0 +1,12 @@ +# ExternalLoginInformation + + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**presigned_url** | **str** | | +**any string name** | **bool, date, datetime, dict, float, int, list, str, none_type** | any string name can be used but the value must be the correct type | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/clients/python-legacy/docs/ImportApi.md b/clients/python-legacy/docs/ImportApi.md index 8e693aa4e4a..ae2e9977f92 100644 --- a/clients/python-legacy/docs/ImportApi.md +++ b/clients/python-legacy/docs/ImportApi.md @@ -18,6 +18,7 @@ cancel ongoing import * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -51,6 +52,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -99,7 +106,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -130,6 +137,7 @@ import data from object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -165,6 +173,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -232,7 +246,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -263,6 +277,7 @@ get import status * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -297,6 +312,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -346,7 +367,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/InternalApi.md b/clients/python-legacy/docs/InternalApi.md index e191241d951..2989fa1fb75 100644 --- a/clients/python-legacy/docs/InternalApi.md +++ b/clients/python-legacy/docs/InternalApi.md @@ -42,6 +42,7 @@ Method | HTTP request | Description * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -75,6 +76,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -118,7 +125,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -148,6 +155,7 @@ create commit record * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -182,6 +190,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -243,7 +257,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -274,6 +288,7 @@ creates symlink files corresponding to the given directory * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -308,6 +323,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -366,7 +387,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -397,6 +418,7 @@ Delete specified keys from the repository's metadata. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -431,6 +453,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -481,7 +509,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -509,6 +537,7 @@ Dump repository refs (tags, commits, branches) to object store Deprecated: a new * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -543,6 +572,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -588,7 +623,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -684,6 +719,7 @@ get information of gc settings * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -718,6 +754,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -758,7 +800,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -786,6 +828,7 @@ get version of lakeFS server * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -820,6 +863,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -860,7 +909,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -952,6 +1001,7 @@ retrieve lakeFS storage configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -986,6 +1036,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1026,7 +1082,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1052,6 +1108,7 @@ get usage report summary * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1086,6 +1143,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1127,7 +1190,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1157,6 +1220,7 @@ This endpoint does not need any parameter. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1191,6 +1255,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1238,7 +1308,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1267,6 +1337,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1301,6 +1372,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1348,7 +1425,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1377,6 +1454,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1410,6 +1488,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1453,7 +1537,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1482,6 +1566,7 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1516,6 +1601,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1561,7 +1652,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1590,6 +1681,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1624,6 +1716,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1668,7 +1766,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1697,6 +1795,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1731,6 +1830,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1784,7 +1889,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1813,6 +1918,7 @@ post stats events, this endpoint is meant for internal use only * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1847,6 +1953,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1899,7 +2011,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1928,6 +2040,7 @@ save lists of active commits for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1962,6 +2075,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2007,7 +2126,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2037,6 +2156,7 @@ save repository uncommitted metadata for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2072,6 +2192,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2130,7 +2256,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2161,6 +2287,7 @@ Restore repository refs (tags, commits, branches) from object store. Deprecated: * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2195,6 +2322,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2246,7 +2379,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2276,6 +2409,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2309,6 +2443,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2352,7 +2492,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2383,6 +2523,7 @@ Set repository metadata. This will only add or update the provided keys, and wil * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2417,6 +2558,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2467,7 +2614,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2646,6 +2793,7 @@ stage an object's metadata for the given branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2681,6 +2829,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2742,7 +2896,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2773,6 +2927,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2806,6 +2961,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2853,7 +3014,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/MetadataApi.md b/clients/python-legacy/docs/MetadataApi.md index 9b443620338..37b4dfbc2a2 100644 --- a/clients/python-legacy/docs/MetadataApi.md +++ b/clients/python-legacy/docs/MetadataApi.md @@ -17,6 +17,7 @@ return URI to a meta-range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -51,6 +52,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -98,7 +105,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -127,6 +134,7 @@ return URI to a range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -161,6 +169,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -208,7 +222,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ObjectsApi.md b/clients/python-legacy/docs/ObjectsApi.md index e84269d94c9..8509add8cb8 100644 --- a/clients/python-legacy/docs/ObjectsApi.md +++ b/clients/python-legacy/docs/ObjectsApi.md @@ -24,6 +24,7 @@ create a copy of an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -59,6 +60,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -114,7 +121,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -145,6 +152,7 @@ delete object. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -178,6 +186,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -236,7 +250,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -266,6 +280,7 @@ delete objects. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -301,6 +316,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -365,7 +386,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -395,6 +416,7 @@ get object content * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -428,6 +450,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -492,7 +520,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -526,6 +554,7 @@ get object properties on underlying storage * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -560,6 +589,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -609,7 +644,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -638,6 +673,7 @@ check if object exists * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -670,6 +706,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -728,7 +770,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -760,6 +802,7 @@ list objects under a given prefix * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -794,6 +837,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -862,7 +911,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -891,6 +940,7 @@ get object metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -925,6 +975,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -987,7 +1043,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1018,6 +1074,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1052,6 +1109,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1116,7 +1179,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/RefsApi.md b/clients/python-legacy/docs/RefsApi.md index b66a3d0afa8..73df34a2325 100644 --- a/clients/python-legacy/docs/RefsApi.md +++ b/clients/python-legacy/docs/RefsApi.md @@ -19,6 +19,7 @@ diff references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -53,6 +54,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -121,7 +128,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -150,6 +157,7 @@ find the merge base for 2 references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -184,6 +192,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -233,7 +247,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -263,6 +277,7 @@ get commit log from ref. If both objects and prefixes are empty, return all comm * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -297,6 +312,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -373,7 +394,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -402,6 +423,7 @@ merge references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -437,6 +459,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -504,7 +532,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/RepositoriesApi.md b/clients/python-legacy/docs/RepositoriesApi.md index 55c47f970df..cff989d7d17 100644 --- a/clients/python-legacy/docs/RepositoriesApi.md +++ b/clients/python-legacy/docs/RepositoriesApi.md @@ -29,6 +29,7 @@ create repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -64,6 +65,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -126,7 +133,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -156,6 +163,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -189,6 +197,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -232,7 +246,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -262,6 +276,7 @@ delete repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -295,6 +310,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -349,7 +370,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -378,6 +399,7 @@ Status of a repository dump task * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -412,6 +434,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -459,7 +487,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -489,6 +517,7 @@ Backup the repository metadata (tags, commits, branches) and save the backup to * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -523,6 +552,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -568,7 +603,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -597,6 +632,7 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -631,6 +667,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -676,7 +718,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -705,6 +747,7 @@ get repository GC rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -739,6 +782,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -784,7 +833,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -813,6 +862,7 @@ get repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -847,6 +897,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -892,7 +948,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -921,6 +977,7 @@ get repository metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -955,6 +1012,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1000,7 +1063,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1029,6 +1092,7 @@ list repositories * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1063,6 +1127,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1113,7 +1183,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1141,6 +1211,7 @@ Status of a restore request * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1175,6 +1246,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1222,7 +1299,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1252,6 +1329,7 @@ Restore repository from a dump in the object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1287,6 +1365,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1339,7 +1423,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1369,6 +1453,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1403,6 +1488,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1461,7 +1552,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1493,6 +1584,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1527,6 +1619,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1580,7 +1678,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/StagingApi.md b/clients/python-legacy/docs/StagingApi.md index 4049f989555..beea3d69b80 100644 --- a/clients/python-legacy/docs/StagingApi.md +++ b/clients/python-legacy/docs/StagingApi.md @@ -17,6 +17,7 @@ generate an address to which the client can upload an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -51,6 +52,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -111,7 +118,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -142,6 +149,7 @@ Link the physical address with the path in lakeFS, creating an uncommitted chang * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -178,6 +186,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -253,7 +267,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/TagsApi.md b/clients/python-legacy/docs/TagsApi.md index 35dcada5852..f29449edd29 100644 --- a/clients/python-legacy/docs/TagsApi.md +++ b/clients/python-legacy/docs/TagsApi.md @@ -19,6 +19,7 @@ create tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -54,6 +55,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -105,7 +112,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -137,6 +144,7 @@ delete tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -170,6 +178,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -226,7 +240,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -256,6 +270,7 @@ get tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -290,6 +305,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -337,7 +358,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -366,6 +387,7 @@ list tags * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -400,6 +422,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -460,7 +488,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/lakefs_client/api/actions_api.py b/clients/python-legacy/lakefs_client/api/actions_api.py index 1d64126e2fd..5d6b95e4161 100644 --- a/clients/python-legacy/lakefs_client/api/actions_api.py +++ b/clients/python-legacy/lakefs_client/api/actions_api.py @@ -45,6 +45,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -106,6 +107,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -174,6 +176,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -255,6 +258,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/auth_api.py b/clients/python-legacy/lakefs_client/api/auth_api.py index 62d7e032a2f..39a79d71e3d 100644 --- a/clients/python-legacy/lakefs_client/api/auth_api.py +++ b/clients/python-legacy/lakefs_client/api/auth_api.py @@ -30,6 +30,7 @@ from lakefs_client.model.current_user import CurrentUser from lakefs_client.model.error import Error from lakefs_client.model.error_no_acl import ErrorNoACL +from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList @@ -61,6 +62,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -122,6 +124,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -183,6 +186,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -244,6 +248,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -299,6 +304,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -353,6 +359,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -409,6 +416,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -463,6 +471,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -530,6 +539,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -591,6 +601,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -646,6 +657,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -707,6 +719,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -762,6 +775,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -817,6 +831,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -878,6 +893,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -939,6 +955,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -994,12 +1011,61 @@ def __init__(self, api_client=None): }, api_client=api_client ) + self.external_login_endpoint = _Endpoint( + settings={ + 'response_type': (AuthenticationToken,), + 'auth': [], + 'endpoint_path': '/auth/external/login', + 'operation_id': 'external_login', + 'http_method': 'POST', + 'servers': None, + }, + params_map={ + 'all': [ + 'external_login_information', + ], + 'required': [], + 'nullable': [ + ], + 'enum': [ + ], + 'validation': [ + ] + }, + root_map={ + 'validations': { + }, + 'allowed_values': { + }, + 'openapi_types': { + 'external_login_information': + (ExternalLoginInformation,), + }, + 'attribute_map': { + }, + 'location_map': { + 'external_login_information': 'body', + }, + 'collection_format_map': { + } + }, + headers_map={ + 'accept': [ + 'application/json' + ], + 'content_type': [ + 'application/json' + ] + }, + api_client=api_client + ) self.get_credentials_endpoint = _Endpoint( settings={ 'response_type': (Credentials,), 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1061,6 +1127,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1109,6 +1176,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1164,6 +1232,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1219,6 +1288,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1274,6 +1344,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1329,6 +1400,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1384,6 +1456,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1460,6 +1533,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1536,6 +1610,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1605,6 +1680,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1674,6 +1750,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1750,6 +1827,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1826,6 +1904,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1902,6 +1981,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1983,6 +2063,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -2100,6 +2181,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -2162,6 +2244,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -3288,6 +3371,67 @@ def detach_policy_from_user( policy_id return self.detach_policy_from_user_endpoint.call_with_http_info(**kwargs) + def external_login( + self, + **kwargs + ): + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_login(async_req=True) + >>> result = thread.get() + + + Keyword Args: + external_login_information (ExternalLoginInformation): [optional] + _return_http_data_only (bool): response data without head status + code and headers. Default is True. + _preload_content (bool): if False, the urllib3.HTTPResponse object + will be returned without reading/decoding response data. + Default is True. + _request_timeout (int/float/tuple): timeout setting for this request. If + one number provided, it will be total request timeout. It can also + be a pair (tuple) of (connection, read) timeouts. + Default is None. + _check_input_type (bool): specifies if type checking + should be done one the data sent to the server. + Default is True. + _check_return_type (bool): specifies if type checking + should be done one the data received from the server. + Default is True. + _host_index (int/None): specifies the index of the server + that we want to use. + Default is read from the configuration. + async_req (bool): execute request asynchronously + + Returns: + AuthenticationToken + If the method is called asynchronously, returns the request + thread. + """ + kwargs['async_req'] = kwargs.get( + 'async_req', False + ) + kwargs['_return_http_data_only'] = kwargs.get( + '_return_http_data_only', True + ) + kwargs['_preload_content'] = kwargs.get( + '_preload_content', True + ) + kwargs['_request_timeout'] = kwargs.get( + '_request_timeout', None + ) + kwargs['_check_input_type'] = kwargs.get( + '_check_input_type', True + ) + kwargs['_check_return_type'] = kwargs.get( + '_check_return_type', True + ) + kwargs['_host_index'] = kwargs.get('_host_index') + return self.external_login_endpoint.call_with_http_info(**kwargs) + def get_credentials( self, user_id, diff --git a/clients/python-legacy/lakefs_client/api/branches_api.py b/clients/python-legacy/lakefs_client/api/branches_api.py index aa2a208efd5..34d4149ac0d 100644 --- a/clients/python-legacy/lakefs_client/api/branches_api.py +++ b/clients/python-legacy/lakefs_client/api/branches_api.py @@ -50,6 +50,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -118,6 +119,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -181,6 +183,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -247,6 +250,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -334,6 +338,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -395,6 +400,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -471,6 +477,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -539,6 +546,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/commits_api.py b/clients/python-legacy/lakefs_client/api/commits_api.py index 25012848d0b..9b831a15f0c 100644 --- a/clients/python-legacy/lakefs_client/api/commits_api.py +++ b/clients/python-legacy/lakefs_client/api/commits_api.py @@ -44,6 +44,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -117,6 +118,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/config_api.py b/clients/python-legacy/lakefs_client/api/config_api.py index 5fd9bfc6eaa..a2fa0ef7f86 100644 --- a/clients/python-legacy/lakefs_client/api/config_api.py +++ b/clients/python-legacy/lakefs_client/api/config_api.py @@ -43,6 +43,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/experimental_api.py b/clients/python-legacy/lakefs_client/api/experimental_api.py index 1323e6b37fa..262052ec018 100644 --- a/clients/python-legacy/lakefs_client/api/experimental_api.py +++ b/clients/python-legacy/lakefs_client/api/experimental_api.py @@ -50,6 +50,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -129,6 +130,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -208,6 +210,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -280,6 +283,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -347,6 +351,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -408,6 +413,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -463,6 +469,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -535,6 +542,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/external_api.py b/clients/python-legacy/lakefs_client/api/external_api.py index 692f2b0fc30..63f2c0bf055 100644 --- a/clients/python-legacy/lakefs_client/api/external_api.py +++ b/clients/python-legacy/lakefs_client/api/external_api.py @@ -45,6 +45,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -112,6 +113,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -173,6 +175,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -228,6 +231,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/import_api.py b/clients/python-legacy/lakefs_client/api/import_api.py index e53cc50f152..d858de45773 100644 --- a/clients/python-legacy/lakefs_client/api/import_api.py +++ b/clients/python-legacy/lakefs_client/api/import_api.py @@ -45,6 +45,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -112,6 +113,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -180,6 +182,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/internal_api.py b/clients/python-legacy/lakefs_client/api/internal_api.py index dee2ff16cc4..272c0fcf49a 100644 --- a/clients/python-legacy/lakefs_client/api/internal_api.py +++ b/clients/python-legacy/lakefs_client/api/internal_api.py @@ -66,6 +66,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -121,6 +122,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -183,6 +185,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -249,6 +252,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -311,6 +315,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -408,6 +413,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -456,6 +462,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -546,6 +553,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -594,6 +602,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -643,6 +652,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -705,6 +715,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -767,6 +778,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -822,6 +834,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -877,6 +890,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -932,6 +946,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -994,6 +1009,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1050,6 +1066,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1105,6 +1122,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1166,6 +1184,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1228,6 +1247,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1283,6 +1303,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1445,6 +1466,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1519,6 +1541,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/metadata_api.py b/clients/python-legacy/lakefs_client/api/metadata_api.py index 849c5493623..e790581922a 100644 --- a/clients/python-legacy/lakefs_client/api/metadata_api.py +++ b/clients/python-legacy/lakefs_client/api/metadata_api.py @@ -43,6 +43,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -104,6 +105,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/objects_api.py b/clients/python-legacy/lakefs_client/api/objects_api.py index 5941b74039c..1308d59e9d4 100644 --- a/clients/python-legacy/lakefs_client/api/objects_api.py +++ b/clients/python-legacy/lakefs_client/api/objects_api.py @@ -48,6 +48,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -122,6 +123,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -194,6 +196,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -267,6 +270,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -357,6 +361,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -424,6 +429,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -501,6 +507,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -598,6 +605,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -675,6 +683,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/refs_api.py b/clients/python-legacy/lakefs_client/api/refs_api.py index 1b6549c4c77..0e466922df6 100644 --- a/clients/python-legacy/lakefs_client/api/refs_api.py +++ b/clients/python-legacy/lakefs_client/api/refs_api.py @@ -47,6 +47,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -151,6 +152,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -218,6 +220,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -327,6 +330,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/repositories_api.py b/clients/python-legacy/lakefs_client/api/repositories_api.py index 0f8b582acdd..62c4345021f 100644 --- a/clients/python-legacy/lakefs_client/api/repositories_api.py +++ b/clients/python-legacy/lakefs_client/api/repositories_api.py @@ -52,6 +52,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -113,6 +114,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -168,6 +170,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -228,6 +231,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -289,6 +293,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -344,6 +349,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -399,6 +405,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -454,6 +461,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -509,6 +517,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -564,6 +573,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -633,6 +643,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -694,6 +705,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -756,6 +768,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -823,6 +836,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/staging_api.py b/clients/python-legacy/lakefs_client/api/staging_api.py index f2e3e3c4d51..29095e52235 100644 --- a/clients/python-legacy/lakefs_client/api/staging_api.py +++ b/clients/python-legacy/lakefs_client/api/staging_api.py @@ -45,6 +45,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -117,6 +118,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/tags_api.py b/clients/python-legacy/lakefs_client/api/tags_api.py index 3ef623ce6e8..6c3cb65fe96 100644 --- a/clients/python-legacy/lakefs_client/api/tags_api.py +++ b/clients/python-legacy/lakefs_client/api/tags_api.py @@ -45,6 +45,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -107,6 +108,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -173,6 +175,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -234,6 +237,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/configuration.py b/clients/python-legacy/lakefs_client/configuration.py index 2dfcc040680..803c8596028 100644 --- a/clients/python-legacy/lakefs_client/configuration.py +++ b/clients/python-legacy/lakefs_client/configuration.py @@ -419,6 +419,13 @@ def auth_settings(self): 'cookie_auth', ), } + if self.username is not None and self.password is not None: + auth['external_auth'] = { + 'type': 'basic', + 'in': 'header', + 'key': 'Authorization', + 'value': self.get_basic_auth_token() + } if self.access_token is not None: auth['jwt_token'] = { 'type': 'bearer', diff --git a/clients/python-legacy/lakefs_client/model/external_login_information.py b/clients/python-legacy/lakefs_client/model/external_login_information.py new file mode 100644 index 00000000000..88c096c408b --- /dev/null +++ b/clients/python-legacy/lakefs_client/model/external_login_information.py @@ -0,0 +1,262 @@ +""" + lakeFS API + + lakeFS HTTP API # noqa: E501 + + The version of the OpenAPI document: 1.0.0 + Contact: services@treeverse.io + Generated by: https://openapi-generator.tech +""" + + +import re # noqa: F401 +import sys # noqa: F401 + +from lakefs_client.model_utils import ( # noqa: F401 + ApiTypeError, + ModelComposed, + ModelNormal, + ModelSimple, + cached_property, + change_keys_js_to_python, + convert_js_args_to_python_args, + date, + datetime, + file_type, + none_type, + validate_get_composed_info, +) +from ..model_utils import OpenApiModel +from lakefs_client.exceptions import ApiAttributeError + + + +class ExternalLoginInformation(ModelNormal): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + + Attributes: + allowed_values (dict): The key is the tuple path to the attribute + and the for var_name this is (var_name,). The value is a dict + with a capitalized key describing the allowed value and an allowed + value. These dicts store the allowed enum values. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + discriminator_value_class_map (dict): A dict to go from the discriminator + variable value to the discriminator class name. + validations (dict): The key is the tuple path to the attribute + and the for var_name this is (var_name,). The value is a dict + that stores validations for max_length, min_length, max_items, + min_items, exclusive_maximum, inclusive_maximum, exclusive_minimum, + inclusive_minimum, and regex. + additional_properties_type (tuple): A tuple of classes accepted + as additional properties values. + """ + + allowed_values = { + } + + validations = { + } + + @cached_property + def additional_properties_type(): + """ + This must be a method because a model may have properties that are + of type self, this must run after the class is loaded + """ + return (bool, date, datetime, dict, float, int, list, str, none_type,) # noqa: E501 + + _nullable = False + + @cached_property + def openapi_types(): + """ + This must be a method because a model may have properties that are + of type self, this must run after the class is loaded + + Returns + openapi_types (dict): The key is attribute name + and the value is attribute type. + """ + return { + 'presigned_url': (str,), # noqa: E501 + } + + @cached_property + def discriminator(): + return None + + + attribute_map = { + 'presigned_url': 'presigned_url', # noqa: E501 + } + + read_only_vars = { + } + + _composed_schemas = {} + + @classmethod + @convert_js_args_to_python_args + def _from_openapi_data(cls, presigned_url, *args, **kwargs): # noqa: E501 + """ExternalLoginInformation - a model defined in OpenAPI + + Args: + presigned_url (str): + + Keyword Args: + _check_type (bool): if True, values for parameters in openapi_types + will be type checked and a TypeError will be + raised if the wrong type is input. + Defaults to True + _path_to_item (tuple/list): This is a list of keys or values to + drill down to the model in received_data + when deserializing a response + _spec_property_naming (bool): True if the variable names in the input data + are serialized names, as specified in the OpenAPI document. + False if the variable names in the input data + are pythonic names, e.g. snake case (default) + _configuration (Configuration): the instance to use when + deserializing a file_type parameter. + If passed, type conversion is attempted + If omitted no type conversion is done. + _visited_composed_classes (tuple): This stores a tuple of + classes that we have traveled through so that + if we see that class again we will not use its + discriminator again. + When traveling through a discriminator, the + composed schema that is + is traveled through is added to this set. + For example if Animal has a discriminator + petType and we pass in "Dog", and the class Dog + allOf includes Animal, we move through Animal + once using the discriminator, and pick Dog. + Then in Dog, we will make an instance of the + Animal class but this time we won't travel + through its discriminator because we passed in + _visited_composed_classes = (Animal,) + """ + + _check_type = kwargs.pop('_check_type', True) + _spec_property_naming = kwargs.pop('_spec_property_naming', False) + _path_to_item = kwargs.pop('_path_to_item', ()) + _configuration = kwargs.pop('_configuration', None) + _visited_composed_classes = kwargs.pop('_visited_composed_classes', ()) + + self = super(OpenApiModel, cls).__new__(cls) + + if args: + raise ApiTypeError( + "Invalid positional arguments=%s passed to %s. Remove those invalid positional arguments." % ( + args, + self.__class__.__name__, + ), + path_to_item=_path_to_item, + valid_classes=(self.__class__,), + ) + + self._data_store = {} + self._check_type = _check_type + self._spec_property_naming = _spec_property_naming + self._path_to_item = _path_to_item + self._configuration = _configuration + self._visited_composed_classes = _visited_composed_classes + (self.__class__,) + + self.presigned_url = presigned_url + for var_name, var_value in kwargs.items(): + if var_name not in self.attribute_map and \ + self._configuration is not None and \ + self._configuration.discard_unknown_keys and \ + self.additional_properties_type is None: + # discard variable. + continue + setattr(self, var_name, var_value) + return self + + required_properties = set([ + '_data_store', + '_check_type', + '_spec_property_naming', + '_path_to_item', + '_configuration', + '_visited_composed_classes', + ]) + + @convert_js_args_to_python_args + def __init__(self, presigned_url, *args, **kwargs): # noqa: E501 + """ExternalLoginInformation - a model defined in OpenAPI + + Args: + presigned_url (str): + + Keyword Args: + _check_type (bool): if True, values for parameters in openapi_types + will be type checked and a TypeError will be + raised if the wrong type is input. + Defaults to True + _path_to_item (tuple/list): This is a list of keys or values to + drill down to the model in received_data + when deserializing a response + _spec_property_naming (bool): True if the variable names in the input data + are serialized names, as specified in the OpenAPI document. + False if the variable names in the input data + are pythonic names, e.g. snake case (default) + _configuration (Configuration): the instance to use when + deserializing a file_type parameter. + If passed, type conversion is attempted + If omitted no type conversion is done. + _visited_composed_classes (tuple): This stores a tuple of + classes that we have traveled through so that + if we see that class again we will not use its + discriminator again. + When traveling through a discriminator, the + composed schema that is + is traveled through is added to this set. + For example if Animal has a discriminator + petType and we pass in "Dog", and the class Dog + allOf includes Animal, we move through Animal + once using the discriminator, and pick Dog. + Then in Dog, we will make an instance of the + Animal class but this time we won't travel + through its discriminator because we passed in + _visited_composed_classes = (Animal,) + """ + + _check_type = kwargs.pop('_check_type', True) + _spec_property_naming = kwargs.pop('_spec_property_naming', False) + _path_to_item = kwargs.pop('_path_to_item', ()) + _configuration = kwargs.pop('_configuration', None) + _visited_composed_classes = kwargs.pop('_visited_composed_classes', ()) + + if args: + raise ApiTypeError( + "Invalid positional arguments=%s passed to %s. Remove those invalid positional arguments." % ( + args, + self.__class__.__name__, + ), + path_to_item=_path_to_item, + valid_classes=(self.__class__,), + ) + + self._data_store = {} + self._check_type = _check_type + self._spec_property_naming = _spec_property_naming + self._path_to_item = _path_to_item + self._configuration = _configuration + self._visited_composed_classes = _visited_composed_classes + (self.__class__,) + + self.presigned_url = presigned_url + for var_name, var_value in kwargs.items(): + if var_name not in self.attribute_map and \ + self._configuration is not None and \ + self._configuration.discard_unknown_keys and \ + self.additional_properties_type is None: + # discard variable. + continue + setattr(self, var_name, var_value) + if var_name in self.read_only_vars: + raise ApiAttributeError(f"`{var_name}` is a read-only attribute. Use `from_openapi_data` to instantiate " + f"class with read only attributes.") diff --git a/clients/python-legacy/lakefs_client/models/__init__.py b/clients/python-legacy/lakefs_client/models/__init__.py index a75a5e24e39..15bb55c34d6 100644 --- a/clients/python-legacy/lakefs_client/models/__init__.py +++ b/clients/python-legacy/lakefs_client/models/__init__.py @@ -34,6 +34,7 @@ from lakefs_client.model.diff_list import DiffList from lakefs_client.model.error import Error from lakefs_client.model.error_no_acl import ErrorNoACL +from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList diff --git a/clients/python-legacy/test/test_auth_api.py b/clients/python-legacy/test/test_auth_api.py index 82ad0a11214..4df013a04e3 100644 --- a/clients/python-legacy/test/test_auth_api.py +++ b/clients/python-legacy/test/test_auth_api.py @@ -136,6 +136,13 @@ def test_detach_policy_from_user(self): """ pass + def test_external_login(self): + """Test case for external_login + + perform a login using an external authenticator # noqa: E501 + """ + pass + def test_get_credentials(self): """Test case for get_credentials diff --git a/clients/python-legacy/test/test_external_login_information.py b/clients/python-legacy/test/test_external_login_information.py new file mode 100644 index 00000000000..2660def38f1 --- /dev/null +++ b/clients/python-legacy/test/test_external_login_information.py @@ -0,0 +1,36 @@ +""" + lakeFS API + + lakeFS HTTP API # noqa: E501 + + The version of the OpenAPI document: 1.0.0 + Contact: services@treeverse.io + Generated by: https://openapi-generator.tech +""" + + +import sys +import unittest + +import lakefs_client +from lakefs_client.model.external_login_information import ExternalLoginInformation + + +class TestExternalLoginInformation(unittest.TestCase): + """ExternalLoginInformation unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def testExternalLoginInformation(self): + """Test ExternalLoginInformation""" + # FIXME: construct object with mandatory attributes with example values + # model = ExternalLoginInformation() # noqa: E501 + pass + + +if __name__ == '__main__': + unittest.main() diff --git a/clients/python/.openapi-generator/FILES b/clients/python/.openapi-generator/FILES index 96d21e6a69e..44b67709ea4 100644 --- a/clients/python/.openapi-generator/FILES +++ b/clients/python/.openapi-generator/FILES @@ -32,6 +32,7 @@ docs/Error.md docs/ErrorNoACL.md docs/ExperimentalApi.md docs/ExternalApi.md +docs/ExternalLoginInformation.md docs/ExternalPrincipal.md docs/ExternalPrincipalCreation.md docs/ExternalPrincipalList.md @@ -161,6 +162,7 @@ lakefs_sdk/models/diff.py lakefs_sdk/models/diff_list.py lakefs_sdk/models/error.py lakefs_sdk/models/error_no_acl.py +lakefs_sdk/models/external_login_information.py lakefs_sdk/models/external_principal.py lakefs_sdk/models/external_principal_creation.py lakefs_sdk/models/external_principal_list.py @@ -272,6 +274,7 @@ test/test_error.py test/test_error_no_acl.py test/test_experimental_api.py test/test_external_api.py +test/test_external_login_information.py test/test_external_principal.py test/test_external_principal_creation.py test/test_external_principal_list.py diff --git a/clients/python/README.md b/clients/python/README.md index 0719e4c1a7f..d5a79644b1a 100644 --- a/clients/python/README.md +++ b/clients/python/README.md @@ -78,6 +78,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -139,6 +145,7 @@ Class | Method | HTTP request | Description *AuthApi* | [**delete_user_external_principal**](docs/AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user *AuthApi* | [**detach_policy_from_group**](docs/AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group *AuthApi* | [**detach_policy_from_user**](docs/AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +*AuthApi* | [**external_login**](docs/AuthApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator *AuthApi* | [**get_credentials**](docs/AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials *AuthApi* | [**get_current_user**](docs/AuthApi.md#get_current_user) | **GET** /user | get current user *AuthApi* | [**get_external_principal**](docs/AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id @@ -276,6 +283,7 @@ Class | Method | HTTP request | Description - [DiffList](docs/DiffList.md) - [Error](docs/Error.md) - [ErrorNoACL](docs/ErrorNoACL.md) + - [ExternalLoginInformation](docs/ExternalLoginInformation.md) - [ExternalPrincipal](docs/ExternalPrincipal.md) - [ExternalPrincipalCreation](docs/ExternalPrincipalCreation.md) - [ExternalPrincipalList](docs/ExternalPrincipalList.md) @@ -385,6 +393,11 @@ Authentication schemes defined for the API: - **API key parameter name**: saml_auth_session - **Location**: + +### external_auth + +- **Type**: HTTP basic authentication + ## Author diff --git a/clients/python/docs/ActionsApi.md b/clients/python/docs/ActionsApi.md index a35752995f8..0be0301241f 100644 --- a/clients/python/docs/ActionsApi.md +++ b/clients/python/docs/ActionsApi.md @@ -19,6 +19,7 @@ get a run * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -54,6 +55,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -103,7 +110,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -131,6 +138,7 @@ get run hook output * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -165,6 +173,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -216,7 +230,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -244,6 +258,7 @@ list runs * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -279,6 +294,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -334,7 +355,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -362,6 +383,7 @@ list run hooks * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -397,6 +419,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -450,7 +478,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/AuthApi.md b/clients/python/docs/AuthApi.md index bd9416ecbfd..674654803b6 100644 --- a/clients/python/docs/AuthApi.md +++ b/clients/python/docs/AuthApi.md @@ -20,6 +20,7 @@ Method | HTTP request | Description [**delete_user_external_principal**](AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user [**detach_policy_from_group**](AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group [**detach_policy_from_user**](AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +[**external_login**](AuthApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_credentials**](AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials [**get_current_user**](AuthApi.md#get_current_user) | **GET** /user | get current user [**get_external_principal**](AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id @@ -50,6 +51,7 @@ add group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -84,6 +86,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -131,7 +139,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -159,6 +167,7 @@ attach policy to group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -193,6 +202,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -240,7 +255,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -268,6 +283,7 @@ attach policy to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -302,6 +318,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -349,7 +371,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -377,6 +399,7 @@ create credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -412,6 +435,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -459,7 +488,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -487,6 +516,7 @@ create group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -523,6 +553,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -570,7 +606,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -598,6 +634,7 @@ create policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -633,6 +670,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -680,7 +723,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -709,6 +752,7 @@ create user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -745,6 +789,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -792,7 +842,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -821,6 +871,7 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -856,6 +907,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -905,7 +962,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -934,6 +991,7 @@ delete credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -968,6 +1026,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1015,7 +1079,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1043,6 +1107,7 @@ delete group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1077,6 +1142,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1122,7 +1193,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1150,6 +1221,7 @@ delete group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1184,6 +1256,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1231,7 +1309,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1259,6 +1337,7 @@ delete policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1293,6 +1372,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1338,7 +1423,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1366,6 +1451,7 @@ delete user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1400,6 +1486,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1445,7 +1537,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1473,6 +1565,7 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1507,6 +1600,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1554,7 +1653,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1582,6 +1681,7 @@ detach policy from group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1616,6 +1716,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1663,7 +1769,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1691,6 +1797,7 @@ detach policy from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1725,6 +1832,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1772,7 +1885,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1791,6 +1904,78 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **external_login** +> AuthenticationToken external_login(external_login_information=external_login_information) + +perform a login using an external authenticator + +### Example + + +```python +import time +import os +import lakefs_sdk +from lakefs_sdk.models.authentication_token import AuthenticationToken +from lakefs_sdk.models.external_login_information import ExternalLoginInformation +from lakefs_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to /api/v1 +# See configuration.py for a list of all supported configuration parameters. +configuration = lakefs_sdk.Configuration( + host = "/api/v1" +) + + +# Enter a context with an instance of the API client +with lakefs_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = lakefs_sdk.AuthApi(api_client) + external_login_information = lakefs_sdk.ExternalLoginInformation() # ExternalLoginInformation | (optional) + + try: + # perform a login using an external authenticator + api_response = api_instance.external_login(external_login_information=external_login_information) + print("The response of AuthApi->external_login:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling AuthApi->external_login: %s\n" % e) +``` + + + +### Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful login | * Set-Cookie -
| +**401** | Unauthorized | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **get_credentials** > Credentials get_credentials(user_id, access_key_id) @@ -1800,6 +1985,7 @@ get credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1835,6 +2021,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1884,7 +2076,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1912,6 +2104,7 @@ get current user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1947,6 +2140,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1990,7 +2189,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2014,6 +2213,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2049,6 +2249,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2096,7 +2302,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2124,6 +2330,7 @@ get group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2159,6 +2366,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2206,7 +2419,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2234,6 +2447,7 @@ get ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2269,6 +2483,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2316,7 +2536,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2344,6 +2564,7 @@ get policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2379,6 +2600,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2426,7 +2653,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2454,6 +2681,7 @@ get user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2489,6 +2717,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2536,7 +2770,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2564,6 +2798,7 @@ list group members * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2599,6 +2834,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2652,7 +2893,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2679,6 +2920,7 @@ list group policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2714,6 +2956,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2767,7 +3015,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2795,6 +3043,7 @@ list groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2830,6 +3079,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2881,7 +3136,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2908,6 +3163,7 @@ list policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2943,6 +3199,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2994,7 +3256,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3021,6 +3283,7 @@ list user credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3056,6 +3319,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3109,7 +3378,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3137,6 +3406,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3172,6 +3442,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3225,7 +3501,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3253,6 +3529,7 @@ list user groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3288,6 +3565,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3341,7 +3624,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3369,6 +3652,7 @@ list user policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3404,6 +3688,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3459,7 +3749,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3487,6 +3777,7 @@ list users * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3522,6 +3813,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3573,7 +3870,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3672,6 +3969,7 @@ set ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3707,6 +4005,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3754,7 +4058,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3782,6 +4086,7 @@ update policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3817,6 +4122,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3866,7 +4177,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/BranchesApi.md b/clients/python/docs/BranchesApi.md index 33c09474b8f..9d4487c73d6 100644 --- a/clients/python/docs/BranchesApi.md +++ b/clients/python/docs/BranchesApi.md @@ -23,6 +23,7 @@ Replay the changes from the given commit on the branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -59,6 +60,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -110,7 +117,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -141,6 +148,7 @@ create branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -176,6 +184,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -225,7 +239,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -256,6 +270,7 @@ delete branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -290,6 +305,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -339,7 +360,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -368,6 +389,7 @@ diff branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -403,6 +425,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -460,7 +488,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -488,6 +516,7 @@ get branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -523,6 +552,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -572,7 +607,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -600,6 +635,7 @@ list branches * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -635,6 +671,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -688,7 +730,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -716,6 +758,7 @@ reset branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -751,6 +794,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -800,7 +849,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -830,6 +879,7 @@ revert * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -865,6 +915,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -914,7 +970,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/CommitsApi.md b/clients/python/docs/CommitsApi.md index 067f4bdaf84..35b354efbce 100644 --- a/clients/python/docs/CommitsApi.md +++ b/clients/python/docs/CommitsApi.md @@ -17,6 +17,7 @@ create commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -53,6 +54,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -106,7 +113,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -138,6 +145,7 @@ get commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -173,6 +181,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -222,7 +236,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ConfigApi.md b/clients/python/docs/ConfigApi.md index bb153b51290..26600fb0385 100644 --- a/clients/python/docs/ConfigApi.md +++ b/clients/python/docs/ConfigApi.md @@ -18,6 +18,7 @@ retrieve lakeFS configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -53,6 +54,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -95,7 +102,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ExperimentalApi.md b/clients/python/docs/ExperimentalApi.md index e0f22b2b264..9a747459a6e 100644 --- a/clients/python/docs/ExperimentalApi.md +++ b/clients/python/docs/ExperimentalApi.md @@ -25,6 +25,7 @@ Aborts a presign multipart upload. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -60,6 +61,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -113,7 +120,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -144,6 +151,7 @@ Completes a presign multipart upload by assembling the uploaded parts. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -180,6 +188,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -235,7 +249,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -267,6 +281,7 @@ Initiates a multipart upload and returns an upload ID with presigned URLs for ea * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -302,6 +317,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -355,7 +376,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -384,6 +405,7 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -419,6 +441,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -468,7 +496,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -497,6 +525,7 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -531,6 +560,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -578,7 +613,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -606,6 +641,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -641,6 +677,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -688,7 +730,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -718,6 +760,7 @@ Relocate branch to refer to ref. Branch must not contain uncommitted data. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -752,6 +795,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -803,7 +852,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -833,6 +882,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -868,6 +918,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -921,7 +977,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ExternalApi.md b/clients/python/docs/ExternalApi.md index 29a7642080c..262d35c3562 100644 --- a/clients/python/docs/ExternalApi.md +++ b/clients/python/docs/ExternalApi.md @@ -19,6 +19,7 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -54,6 +55,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -103,7 +110,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -132,6 +139,7 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -166,6 +174,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -213,7 +227,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -241,6 +255,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -276,6 +291,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -323,7 +344,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -351,6 +372,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -386,6 +408,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -439,7 +467,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ExternalLoginInformation.md b/clients/python/docs/ExternalLoginInformation.md new file mode 100644 index 00000000000..f82d24bb6d3 --- /dev/null +++ b/clients/python/docs/ExternalLoginInformation.md @@ -0,0 +1,29 @@ +# ExternalLoginInformation + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**presigned_url** | **str** | | + +## Example + +```python +from lakefs_sdk.models.external_login_information import ExternalLoginInformation + +# TODO update the JSON string below +json = "{}" +# create an instance of ExternalLoginInformation from a JSON string +external_login_information_instance = ExternalLoginInformation.from_json(json) +# print the JSON string representation of the object +print ExternalLoginInformation.to_json() + +# convert the object into a dict +external_login_information_dict = external_login_information_instance.to_dict() +# create an instance of ExternalLoginInformation from a dict +external_login_information_form_dict = external_login_information.from_dict(external_login_information_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/clients/python/docs/ImportApi.md b/clients/python/docs/ImportApi.md index 496f2ac4369..689c79485d2 100644 --- a/clients/python/docs/ImportApi.md +++ b/clients/python/docs/ImportApi.md @@ -18,6 +18,7 @@ cancel ongoing import * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -52,6 +53,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -101,7 +108,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -131,6 +138,7 @@ import data from object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -167,6 +175,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -218,7 +232,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -248,6 +262,7 @@ get import status * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -283,6 +298,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -334,7 +355,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/InternalApi.md b/clients/python/docs/InternalApi.md index d45cfa5599c..ea8fd1e8219 100644 --- a/clients/python/docs/InternalApi.md +++ b/clients/python/docs/InternalApi.md @@ -42,6 +42,7 @@ Method | HTTP request | Description * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -76,6 +77,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -120,7 +127,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -149,6 +156,7 @@ create commit record * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -184,6 +192,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -231,7 +245,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -261,6 +275,7 @@ creates symlink files corresponding to the given directory * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -296,6 +311,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -347,7 +368,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -377,6 +398,7 @@ Delete specified keys from the repository's metadata. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -412,6 +434,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -459,7 +487,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -486,6 +514,7 @@ Dump repository refs (tags, commits, branches) to object store Deprecated: a new * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -521,6 +550,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -568,7 +603,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -665,6 +700,7 @@ get information of gc settings * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -700,6 +736,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -742,7 +784,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -769,6 +811,7 @@ get version of lakeFS server * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -804,6 +847,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -846,7 +895,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -939,6 +988,7 @@ retrieve lakeFS storage configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -974,6 +1024,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1016,7 +1072,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1041,6 +1097,7 @@ get usage report summary * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1076,6 +1133,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1119,7 +1182,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1148,6 +1211,7 @@ This endpoint does not need any parameter. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1183,6 +1247,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1229,7 +1299,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1257,6 +1327,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1292,6 +1363,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1338,7 +1415,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1366,6 +1443,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1400,6 +1478,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1444,7 +1528,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1472,6 +1556,7 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1507,6 +1592,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1554,7 +1645,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1582,6 +1673,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1617,6 +1709,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1663,7 +1761,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1691,6 +1789,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1726,6 +1825,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1772,7 +1877,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1800,6 +1905,7 @@ post stats events, this endpoint is meant for internal use only * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1835,6 +1941,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1880,7 +1992,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1908,6 +2020,7 @@ save lists of active commits for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1943,6 +2056,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1990,7 +2109,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2019,6 +2138,7 @@ save repository uncommitted metadata for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2055,6 +2175,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2104,7 +2230,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2134,6 +2260,7 @@ Restore repository refs (tags, commits, branches) from object store. Deprecated: * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2169,6 +2296,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2216,7 +2349,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2245,6 +2378,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2279,6 +2413,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2323,7 +2463,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2353,6 +2493,7 @@ Set repository metadata. This will only add or update the provided keys, and wil * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2388,6 +2529,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2435,7 +2582,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2606,6 +2753,7 @@ stage an object's metadata for the given branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2642,6 +2790,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2695,7 +2849,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2725,6 +2879,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2759,6 +2914,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2807,7 +2968,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/MetadataApi.md b/clients/python/docs/MetadataApi.md index 248e02e2629..ba9973040b3 100644 --- a/clients/python/docs/MetadataApi.md +++ b/clients/python/docs/MetadataApi.md @@ -17,6 +17,7 @@ return URI to a meta-range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -52,6 +53,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -101,7 +108,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -129,6 +136,7 @@ return URI to a range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -164,6 +172,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -213,7 +227,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ObjectsApi.md b/clients/python/docs/ObjectsApi.md index a9ab5b4e74a..5e28ff4ac24 100644 --- a/clients/python/docs/ObjectsApi.md +++ b/clients/python/docs/ObjectsApi.md @@ -24,6 +24,7 @@ create a copy of an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -60,6 +61,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -113,7 +120,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -143,6 +150,7 @@ delete object. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -177,6 +185,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -228,7 +242,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -257,6 +271,7 @@ delete objects. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -293,6 +308,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -346,7 +367,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -375,6 +396,7 @@ get object content * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -409,6 +431,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -466,7 +494,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -499,6 +527,7 @@ get object properties on underlying storage * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -534,6 +563,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -585,7 +620,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -613,6 +648,7 @@ check if object exists * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -647,6 +683,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -698,7 +740,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -729,6 +771,7 @@ list objects under a given prefix * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -764,6 +807,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -825,7 +874,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -853,6 +902,7 @@ get object metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -888,6 +938,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -943,7 +999,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -973,6 +1029,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1008,6 +1065,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1066,7 +1129,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/RefsApi.md b/clients/python/docs/RefsApi.md index ac999a2ff24..1c1a9df2118 100644 --- a/clients/python/docs/RefsApi.md +++ b/clients/python/docs/RefsApi.md @@ -19,6 +19,7 @@ diff references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -54,6 +55,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -115,7 +122,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -143,6 +150,7 @@ find the merge base for 2 references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -178,6 +186,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -229,7 +243,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -258,6 +272,7 @@ get commit log from ref. If both objects and prefixes are empty, return all comm * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -293,6 +308,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -358,7 +379,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -386,6 +407,7 @@ merge references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -422,6 +444,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -475,7 +503,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/RepositoriesApi.md b/clients/python/docs/RepositoriesApi.md index 6db6216fc8d..a0407f7aafd 100644 --- a/clients/python/docs/RepositoriesApi.md +++ b/clients/python/docs/RepositoriesApi.md @@ -29,6 +29,7 @@ create repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -65,6 +66,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -114,7 +121,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -143,6 +150,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -177,6 +185,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -221,7 +235,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -250,6 +264,7 @@ delete repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -284,6 +299,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -331,7 +352,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -359,6 +380,7 @@ Status of a repository dump task * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -394,6 +416,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -443,7 +471,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -472,6 +500,7 @@ Backup the repository metadata (tags, commits, branches) and save the backup to * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -507,6 +536,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -554,7 +589,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -582,6 +617,7 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -617,6 +653,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -664,7 +706,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -692,6 +734,7 @@ get repository GC rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -727,6 +770,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -774,7 +823,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -802,6 +851,7 @@ get repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -837,6 +887,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -884,7 +940,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -912,6 +968,7 @@ get repository metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -946,6 +1003,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -993,7 +1056,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1021,6 +1084,7 @@ list repositories * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1056,6 +1120,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1107,7 +1177,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1134,6 +1204,7 @@ Status of a restore request * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1169,6 +1240,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1218,7 +1295,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1247,6 +1324,7 @@ Restore repository from a dump in the object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1283,6 +1361,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1332,7 +1416,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1361,6 +1445,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1396,6 +1481,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1444,7 +1535,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1475,6 +1566,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1510,6 +1602,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1556,7 +1654,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/StagingApi.md b/clients/python/docs/StagingApi.md index ae82b69ba5f..fc9aca5cf3e 100644 --- a/clients/python/docs/StagingApi.md +++ b/clients/python/docs/StagingApi.md @@ -17,6 +17,7 @@ generate an address to which the client can upload an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -52,6 +53,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -105,7 +112,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -135,6 +142,7 @@ Link the physical address with the path in lakeFS, creating an uncommitted chang * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -171,6 +179,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -226,7 +240,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/TagsApi.md b/clients/python/docs/TagsApi.md index 8deb20e8598..41edd868455 100644 --- a/clients/python/docs/TagsApi.md +++ b/clients/python/docs/TagsApi.md @@ -19,6 +19,7 @@ create tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -55,6 +56,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -104,7 +111,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -135,6 +142,7 @@ delete tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -169,6 +177,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -218,7 +232,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -247,6 +261,7 @@ get tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -282,6 +297,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -331,7 +352,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -359,6 +380,7 @@ list tags * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -394,6 +416,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -447,7 +475,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/lakefs_sdk/__init__.py b/clients/python/lakefs_sdk/__init__.py index e3df21d13b5..5d95d822050 100644 --- a/clients/python/lakefs_sdk/__init__.py +++ b/clients/python/lakefs_sdk/__init__.py @@ -72,6 +72,7 @@ from lakefs_sdk.models.diff_list import DiffList from lakefs_sdk.models.error import Error from lakefs_sdk.models.error_no_acl import ErrorNoACL +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList diff --git a/clients/python/lakefs_sdk/api/actions_api.py b/clients/python/lakefs_sdk/api/actions_api.py index f60b970d603..f39c48d2091 100644 --- a/clients/python/lakefs_sdk/api/actions_api.py +++ b/clients/python/lakefs_sdk/api/actions_api.py @@ -170,7 +170,7 @@ def get_run_with_http_info(self, repository : StrictStr, run_id : StrictStr, **k ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ActionRun", @@ -326,7 +326,7 @@ def get_run_hook_output_with_http_info(self, repository : StrictStr, run_id : St ['application/octet-stream', 'application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "bytearray", @@ -498,7 +498,7 @@ def list_repository_runs_with_http_info(self, repository : StrictStr, after : An ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ActionRunList", @@ -662,7 +662,7 @@ def list_run_hooks_with_http_info(self, repository : StrictStr, run_id : StrictS ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "HookRunList", diff --git a/clients/python/lakefs_sdk/api/auth_api.py b/clients/python/lakefs_sdk/api/auth_api.py index d7a68967d37..ae451be79ad 100644 --- a/clients/python/lakefs_sdk/api/auth_api.py +++ b/clients/python/lakefs_sdk/api/auth_api.py @@ -30,6 +30,7 @@ from lakefs_sdk.models.credentials_list import CredentialsList from lakefs_sdk.models.credentials_with_secret import CredentialsWithSecret from lakefs_sdk.models.current_user import CurrentUser +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList @@ -185,7 +186,7 @@ def add_group_membership_with_http_info(self, group_id : StrictStr, user_id : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -328,7 +329,7 @@ def attach_policy_to_group_with_http_info(self, group_id : StrictStr, policy_id ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -471,7 +472,7 @@ def attach_policy_to_user_with_http_info(self, user_id : StrictStr, policy_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -606,7 +607,7 @@ def create_credentials_with_http_info(self, user_id : StrictStr, **kwargs) -> Ap ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "CredentialsWithSecret", @@ -753,7 +754,7 @@ def create_group_with_http_info(self, group_creation : Optional[GroupCreation] = _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Group", @@ -900,7 +901,7 @@ def create_policy_with_http_info(self, policy : Policy, **kwargs) -> ApiResponse _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Policy", @@ -1048,7 +1049,7 @@ def create_user_with_http_info(self, user_creation : Optional[UserCreation] = No _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "User", @@ -1212,7 +1213,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1355,7 +1356,7 @@ def delete_credentials_with_http_info(self, user_id : StrictStr, access_key_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1490,7 +1491,7 @@ def delete_group_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiResp ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1633,7 +1634,7 @@ def delete_group_membership_with_http_info(self, group_id : StrictStr, user_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1768,7 +1769,7 @@ def delete_policy_with_http_info(self, policy_id : StrictStr, **kwargs) -> ApiRe ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1903,7 +1904,7 @@ def delete_user_with_http_info(self, user_id : StrictStr, **kwargs) -> ApiRespon ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2046,7 +2047,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2189,7 +2190,7 @@ def detach_policy_from_group_with_http_info(self, group_id : StrictStr, policy_i ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2332,7 +2333,7 @@ def detach_policy_from_user_with_http_info(self, user_id : StrictStr, policy_id ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2353,6 +2354,152 @@ def detach_policy_from_user_with_http_info(self, user_id : StrictStr, policy_id collection_formats=_collection_formats, _request_auth=_params.get('_request_auth')) + @validate_arguments + def external_login(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_login(external_login_information, async_req=True) + >>> result = thread.get() + + :param external_login_information: + :type external_login_information: ExternalLoginInformation + :param async_req: Whether to execute the request asynchronously. + :type async_req: bool, optional + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: Returns the result object. + If the method is called asynchronously, + returns the request thread. + :rtype: AuthenticationToken + """ + kwargs['_return_http_data_only'] = True + if '_preload_content' in kwargs: + raise ValueError("Error! Please call the external_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") + return self.external_login_with_http_info(external_login_information, **kwargs) # noqa: E501 + + @validate_arguments + def external_login_with_http_info(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> ApiResponse: # noqa: E501 + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_login_with_http_info(external_login_information, async_req=True) + >>> result = thread.get() + + :param external_login_information: + :type external_login_information: ExternalLoginInformation + :param async_req: Whether to execute the request asynchronously. + :type async_req: bool, optional + :param _preload_content: if False, the ApiResponse.data will + be set to none and raw_data will store the + HTTP response body without reading/decoding. + Default is True. + :type _preload_content: bool, optional + :param _return_http_data_only: response data instead of ApiResponse + object with status code, headers, etc + :type _return_http_data_only: bool, optional + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the authentication + in the spec for a single request. + :type _request_auth: dict, optional + :type _content_type: string, optional: force content-type for the request + :return: Returns the result object. + If the method is called asynchronously, + returns the request thread. + :rtype: tuple(AuthenticationToken, status_code(int), headers(HTTPHeaderDict)) + """ + + _params = locals() + + _all_params = [ + 'external_login_information' + ] + _all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout', + '_request_auth', + '_content_type', + '_headers' + ] + ) + + # validate the arguments + for _key, _val in _params['kwargs'].items(): + if _key not in _all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method external_login" % _key + ) + _params[_key] = _val + del _params['kwargs'] + + _collection_formats = {} + + # process the path parameters + _path_params = {} + + # process the query parameters + _query_params = [] + # process the header parameters + _header_params = dict(_params.get('_headers', {})) + # process the form parameters + _form_params = [] + _files = {} + # process the body parameter + _body_params = None + if _params['external_login_information'] is not None: + _body_params = _params['external_login_information'] + + # set the HTTP header `Accept` + _header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # set the HTTP header `Content-Type` + _content_types_list = _params.get('_content_type', + self.api_client.select_header_content_type( + ['application/json'])) + if _content_types_list: + _header_params['Content-Type'] = _content_types_list + + # authentication setting + _auth_settings = [] # noqa: E501 + + _response_types_map = { + '200': "AuthenticationToken", + '401': "Error", + '420': None, + } + + return self.api_client.call_api( + '/auth/external/login', 'POST', + _path_params, + _query_params, + _header_params, + body=_body_params, + post_params=_form_params, + files=_files, + response_types_map=_response_types_map, + auth_settings=_auth_settings, + async_req=_params.get('async_req'), + _return_http_data_only=_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=_params.get('_preload_content', True), + _request_timeout=_params.get('_request_timeout'), + collection_formats=_collection_formats, + _request_auth=_params.get('_request_auth')) + @validate_arguments def get_credentials(self, user_id : StrictStr, access_key_id : StrictStr, **kwargs) -> Credentials: # noqa: E501 """get credentials # noqa: E501 @@ -2475,7 +2622,7 @@ def get_credentials_with_http_info(self, user_id : StrictStr, access_key_id : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Credentials", @@ -2607,7 +2754,7 @@ def get_current_user_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E50 ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CurrentUser", @@ -2744,7 +2891,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -2884,7 +3031,7 @@ def get_group_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiRespons ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Group", @@ -3024,7 +3171,7 @@ def get_group_acl_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiRes ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ACL", @@ -3164,7 +3311,7 @@ def get_policy_with_http_info(self, policy_id : StrictStr, **kwargs) -> ApiRespo ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Policy", @@ -3304,7 +3451,7 @@ def get_user_with_http_info(self, user_id : StrictStr, **kwargs) -> ApiResponse: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "User", @@ -3468,7 +3615,7 @@ def list_group_members_with_http_info(self, group_id : StrictStr, prefix : Annot ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UserList", @@ -3631,7 +3778,7 @@ def list_group_policies_with_http_info(self, group_id : StrictStr, prefix : Anno ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -3787,7 +3934,7 @@ def list_groups_with_http_info(self, prefix : Annotated[Optional[StrictStr], Fie ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GroupList", @@ -3942,7 +4089,7 @@ def list_policies_with_http_info(self, prefix : Annotated[Optional[StrictStr], F ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -4105,7 +4252,7 @@ def list_user_credentials_with_http_info(self, user_id : StrictStr, prefix : Ann ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CredentialsList", @@ -4269,7 +4416,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", @@ -4433,7 +4580,7 @@ def list_user_groups_with_http_info(self, user_id : StrictStr, prefix : Annotate ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GroupList", @@ -4605,7 +4752,7 @@ def list_user_policies_with_http_info(self, user_id : StrictStr, prefix : Annota ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -4761,7 +4908,7 @@ def list_users_with_http_info(self, prefix : Annotated[Optional[StrictStr], Fiel ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UserList", @@ -5061,7 +5208,7 @@ def set_group_acl_with_http_info(self, group_id : StrictStr, acl : ACL, **kwargs _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -5211,7 +5358,7 @@ def update_policy_with_http_info(self, policy_id : StrictStr, policy : Policy, * _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Policy", diff --git a/clients/python/lakefs_sdk/api/branches_api.py b/clients/python/lakefs_sdk/api/branches_api.py index ffb552796e2..2a58833faf1 100644 --- a/clients/python/lakefs_sdk/api/branches_api.py +++ b/clients/python/lakefs_sdk/api/branches_api.py @@ -190,7 +190,7 @@ def cherry_pick_with_http_info(self, repository : StrictStr, branch : StrictStr, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Commit", @@ -348,7 +348,7 @@ def create_branch_with_http_info(self, repository : StrictStr, branch_creation : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "str", @@ -507,7 +507,7 @@ def delete_branch_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -682,7 +682,7 @@ def diff_branch_with_http_info(self, repository : StrictStr, branch : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "DiffList", @@ -830,7 +830,7 @@ def get_branch_with_http_info(self, repository : StrictStr, branch : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Ref", @@ -994,7 +994,7 @@ def list_branches_with_http_info(self, repository : StrictStr, prefix : Annotate ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RefList", @@ -1157,7 +1157,7 @@ def reset_branch_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1315,7 +1315,7 @@ def revert_branch_with_http_info(self, repository : StrictStr, branch : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/commits_api.py b/clients/python/lakefs_sdk/api/commits_api.py index 02bea4c6a84..369af5fb8a6 100644 --- a/clients/python/lakefs_sdk/api/commits_api.py +++ b/clients/python/lakefs_sdk/api/commits_api.py @@ -192,7 +192,7 @@ def commit_with_http_info(self, repository : StrictStr, branch : StrictStr, comm _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Commit", @@ -344,7 +344,7 @@ def get_commit_with_http_info(self, repository : StrictStr, commit_id : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Commit", diff --git a/clients/python/lakefs_sdk/api/config_api.py b/clients/python/lakefs_sdk/api/config_api.py index 028f68fcd36..cc1e2e78b21 100644 --- a/clients/python/lakefs_sdk/api/config_api.py +++ b/clients/python/lakefs_sdk/api/config_api.py @@ -150,7 +150,7 @@ def get_config_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E501 ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Config", diff --git a/clients/python/lakefs_sdk/api/experimental_api.py b/clients/python/lakefs_sdk/api/experimental_api.py index 83f9a395bc0..a1ed0db3368 100644 --- a/clients/python/lakefs_sdk/api/experimental_api.py +++ b/clients/python/lakefs_sdk/api/experimental_api.py @@ -207,7 +207,7 @@ def abort_presign_multipart_upload_with_http_info(self, repository : StrictStr, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -383,7 +383,7 @@ def complete_presign_multipart_upload_with_http_info(self, repository : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", @@ -551,7 +551,7 @@ def create_presign_multipart_upload_with_http_info(self, repository : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "PresignMultipartUpload", @@ -715,7 +715,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -858,7 +858,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -993,7 +993,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -1159,7 +1159,7 @@ def hard_reset_branch_with_http_info(self, repository : StrictStr, branch : Stri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1318,7 +1318,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", diff --git a/clients/python/lakefs_sdk/api/external_api.py b/clients/python/lakefs_sdk/api/external_api.py index 19384b63321..f31d289ba6e 100644 --- a/clients/python/lakefs_sdk/api/external_api.py +++ b/clients/python/lakefs_sdk/api/external_api.py @@ -185,7 +185,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -328,7 +328,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -463,7 +463,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -627,7 +627,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", diff --git a/clients/python/lakefs_sdk/api/import_api.py b/clients/python/lakefs_sdk/api/import_api.py index 4e0b25708f3..4495d0813e5 100644 --- a/clients/python/lakefs_sdk/api/import_api.py +++ b/clients/python/lakefs_sdk/api/import_api.py @@ -176,7 +176,7 @@ def import_cancel_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -334,7 +334,7 @@ def import_start_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "ImportCreationResponse", @@ -492,7 +492,7 @@ def import_status_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ImportStatus", diff --git a/clients/python/lakefs_sdk/api/internal_api.py b/clients/python/lakefs_sdk/api/internal_api.py index 0febc0689d2..6d1ae4e3ec7 100644 --- a/clients/python/lakefs_sdk/api/internal_api.py +++ b/clients/python/lakefs_sdk/api/internal_api.py @@ -183,7 +183,7 @@ def create_branch_protection_rule_preflight_with_http_info(self, repository : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -333,7 +333,7 @@ def create_commit_record_with_http_info(self, repository : StrictStr, commit_rec _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -484,7 +484,7 @@ def create_symlink_file_with_http_info(self, repository : StrictStr, branch : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "StorageURI", @@ -641,7 +641,7 @@ def delete_repository_metadata_with_http_info(self, repository : StrictStr, repo _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -776,7 +776,7 @@ def dump_refs_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRespo ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "RefsDump", @@ -1041,7 +1041,7 @@ def get_garbage_collection_config_with_http_info(self, **kwargs) -> ApiResponse: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionConfig", @@ -1175,7 +1175,7 @@ def get_lake_fs_version_with_http_info(self, **kwargs) -> ApiResponse: # noqa: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "VersionConfig", @@ -1439,7 +1439,7 @@ def get_storage_config_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageConfig", @@ -1569,7 +1569,7 @@ def get_usage_report_summary_with_http_info(self, **kwargs) -> ApiResponse: # n ['application/json', 'application/text']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "InstallationUsageReport", @@ -1727,7 +1727,7 @@ def internal_create_branch_protection_rule_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1879,7 +1879,7 @@ def internal_delete_branch_protection_rule_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2016,7 +2016,7 @@ def internal_delete_garbage_collection_rules_with_http_info(self, repository : S ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2153,7 +2153,7 @@ def internal_get_branch_protection_rules_with_http_info(self, repository : Stric ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "List[BranchProtectionRule]", @@ -2295,7 +2295,7 @@ def internal_get_garbage_collection_rules_with_http_info(self, repository : Stri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionRules", @@ -2452,7 +2452,7 @@ def internal_set_garbage_collection_rules_with_http_info(self, repository : Stri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2594,7 +2594,7 @@ def post_stats_events_with_http_info(self, stats_events_list : StatsEventsList, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2729,7 +2729,7 @@ def prepare_garbage_collection_commits_with_http_info(self, repository : StrictS ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "GarbageCollectionPrepareResponse", @@ -2885,7 +2885,7 @@ def prepare_garbage_collection_uncommitted_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "PrepareGCUncommittedResponse", @@ -3042,7 +3042,7 @@ def restore_refs_with_http_info(self, repository : StrictStr, refs_restore : Ref _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3177,7 +3177,7 @@ def set_garbage_collection_rules_preflight_with_http_info(self, repository : Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3329,7 +3329,7 @@ def set_repository_metadata_with_http_info(self, repository : StrictStr, reposit _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3786,7 +3786,7 @@ def stage_object_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", @@ -3944,7 +3944,7 @@ def upload_object_preflight_with_http_info(self, repository : StrictStr, branch ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/metadata_api.py b/clients/python/lakefs_sdk/api/metadata_api.py index f897ec3b550..e8767115845 100644 --- a/clients/python/lakefs_sdk/api/metadata_api.py +++ b/clients/python/lakefs_sdk/api/metadata_api.py @@ -166,7 +166,7 @@ def get_meta_range_with_http_info(self, repository : StrictStr, meta_range : Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageURI", @@ -314,7 +314,7 @@ def get_range_with_http_info(self, repository : StrictStr, range : StrictStr, ** ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageURI", diff --git a/clients/python/lakefs_sdk/api/objects_api.py b/clients/python/lakefs_sdk/api/objects_api.py index 11a5229f3b6..9ef5b4287b7 100644 --- a/clients/python/lakefs_sdk/api/objects_api.py +++ b/clients/python/lakefs_sdk/api/objects_api.py @@ -196,7 +196,7 @@ def copy_object_with_http_info(self, repository : StrictStr, branch : Annotated[ _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", @@ -362,7 +362,7 @@ def delete_object_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -528,7 +528,7 @@ def delete_objects_with_http_info(self, repository : StrictStr, branch : StrictS _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectErrorList", @@ -709,7 +709,7 @@ def get_object_with_http_info(self, repository : StrictStr, ref : Annotated[Stri ['application/octet-stream', 'application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "bytearray", @@ -870,7 +870,7 @@ def get_underlying_properties_with_http_info(self, repository : StrictStr, ref : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UnderlyingObjectProperties", @@ -1030,7 +1030,7 @@ def head_object_with_http_info(self, repository : StrictStr, ref : Annotated[Str # process the body parameter _body_params = None # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1221,7 +1221,7 @@ def list_objects_with_http_info(self, repository : StrictStr, ref : Annotated[St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStatsList", @@ -1393,7 +1393,7 @@ def stat_object_with_http_info(self, repository : StrictStr, ref : Annotated[Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", @@ -1590,7 +1590,7 @@ def upload_object_with_http_info(self, repository : StrictStr, branch : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", diff --git a/clients/python/lakefs_sdk/api/refs_api.py b/clients/python/lakefs_sdk/api/refs_api.py index abc0529b5f8..f938e771548 100644 --- a/clients/python/lakefs_sdk/api/refs_api.py +++ b/clients/python/lakefs_sdk/api/refs_api.py @@ -222,7 +222,7 @@ def diff_refs_with_http_info(self, repository : StrictStr, left_ref : Annotated[ ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "DiffList", @@ -378,7 +378,7 @@ def find_merge_base_with_http_info(self, repository : StrictStr, source_ref : An ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "FindMergeBaseResult", @@ -596,7 +596,7 @@ def log_commits_with_http_info(self, repository : StrictStr, ref : StrictStr, af ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CommitList", @@ -767,7 +767,7 @@ def merge_into_branch_with_http_info(self, repository : StrictStr, source_ref : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "MergeResult", diff --git a/clients/python/lakefs_sdk/api/repositories_api.py b/clients/python/lakefs_sdk/api/repositories_api.py index a2ebd9e58f2..d970a24e687 100644 --- a/clients/python/lakefs_sdk/api/repositories_api.py +++ b/clients/python/lakefs_sdk/api/repositories_api.py @@ -183,7 +183,7 @@ def create_repository_with_http_info(self, repository_creation : RepositoryCreat _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Repository", @@ -324,7 +324,7 @@ def delete_gc_rules_with_http_info(self, repository : StrictStr, **kwargs) -> Ap ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -467,7 +467,7 @@ def delete_repository_with_http_info(self, repository : StrictStr, force : Annot ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -610,7 +610,7 @@ def dump_status_with_http_info(self, repository : StrictStr, task_id : StrictStr ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryDumpStatus", @@ -751,7 +751,7 @@ def dump_submit_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRes ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "TaskInfo", @@ -891,7 +891,7 @@ def get_branch_protection_rules_with_http_info(self, repository : StrictStr, **k ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "List[BranchProtectionRule]", @@ -1031,7 +1031,7 @@ def get_gc_rules_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRe ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionRules", @@ -1171,7 +1171,7 @@ def get_repository_with_http_info(self, repository : StrictStr, **kwargs) -> Api ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Repository", @@ -1311,7 +1311,7 @@ def get_repository_metadata_with_http_info(self, repository : StrictStr, **kwarg ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Dict[str, str]", @@ -1467,7 +1467,7 @@ def list_repositories_with_http_info(self, prefix : Annotated[Optional[StrictStr ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryList", @@ -1614,7 +1614,7 @@ def restore_status_with_http_info(self, repository : StrictStr, task_id : Strict ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryRestoreStatus", @@ -1770,7 +1770,7 @@ def restore_submit_with_http_info(self, repository : StrictStr, refs_restore : R _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "TaskInfo", @@ -1934,7 +1934,7 @@ def set_branch_protection_rules_with_http_info(self, repository : StrictStr, bra _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2084,7 +2084,7 @@ def set_gc_rules_with_http_info(self, repository : StrictStr, garbage_collection _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/staging_api.py b/clients/python/lakefs_sdk/api/staging_api.py index e82c4ec395c..7a91cd32ad9 100644 --- a/clients/python/lakefs_sdk/api/staging_api.py +++ b/clients/python/lakefs_sdk/api/staging_api.py @@ -186,7 +186,7 @@ def get_physical_address_with_http_info(self, repository : StrictStr, branch : S ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StagingLocation", @@ -367,7 +367,7 @@ def link_physical_address_with_http_info(self, repository : StrictStr, branch : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", diff --git a/clients/python/lakefs_sdk/api/tags_api.py b/clients/python/lakefs_sdk/api/tags_api.py index 34533bd68ad..c4ffe8c3adb 100644 --- a/clients/python/lakefs_sdk/api/tags_api.py +++ b/clients/python/lakefs_sdk/api/tags_api.py @@ -177,7 +177,7 @@ def create_tag_with_http_info(self, repository : StrictStr, tag_creation : TagCr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Ref", @@ -336,7 +336,7 @@ def delete_tag_with_http_info(self, repository : StrictStr, tag : StrictStr, for ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -479,7 +479,7 @@ def get_tag_with_http_info(self, repository : StrictStr, tag : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Ref", @@ -643,7 +643,7 @@ def list_tags_with_http_info(self, repository : StrictStr, prefix : Annotated[Op ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RefList", diff --git a/clients/python/lakefs_sdk/configuration.py b/clients/python/lakefs_sdk/configuration.py index 201334aba2a..97b4f971566 100644 --- a/clients/python/lakefs_sdk/configuration.py +++ b/clients/python/lakefs_sdk/configuration.py @@ -436,6 +436,13 @@ def auth_settings(self): 'saml_auth', ), } + if self.username is not None and self.password is not None: + auth['external_auth'] = { + 'type': 'basic', + 'in': 'header', + 'key': 'Authorization', + 'value': self.get_basic_auth_token() + } return auth def to_debug_report(self): diff --git a/clients/python/lakefs_sdk/models/__init__.py b/clients/python/lakefs_sdk/models/__init__.py index eba3f9a1860..b6a0573f318 100644 --- a/clients/python/lakefs_sdk/models/__init__.py +++ b/clients/python/lakefs_sdk/models/__init__.py @@ -40,6 +40,7 @@ from lakefs_sdk.models.diff_list import DiffList from lakefs_sdk.models.error import Error from lakefs_sdk.models.error_no_acl import ErrorNoACL +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList diff --git a/clients/python/lakefs_sdk/models/external_login_information.py b/clients/python/lakefs_sdk/models/external_login_information.py new file mode 100644 index 00000000000..0f6d5114212 --- /dev/null +++ b/clients/python/lakefs_sdk/models/external_login_information.py @@ -0,0 +1,72 @@ +# coding: utf-8 + +""" + lakeFS API + + lakeFS HTTP API + + The version of the OpenAPI document: 1.0.0 + Contact: services@treeverse.io + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + + + +from pydantic import BaseModel, Field, StrictStr + +class ExternalLoginInformation(BaseModel): + """ + ExternalLoginInformation + """ + presigned_url: StrictStr = Field(...) + __properties = ["presigned_url"] + + class Config: + """Pydantic configuration""" + allow_population_by_field_name = True + validate_assignment = True + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.dict(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> ExternalLoginInformation: + """Create an instance of ExternalLoginInformation from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self): + """Returns the dictionary representation of the model using alias""" + _dict = self.dict(by_alias=True, + exclude={ + }, + exclude_none=True) + return _dict + + @classmethod + def from_dict(cls, obj: dict) -> ExternalLoginInformation: + """Create an instance of ExternalLoginInformation from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return ExternalLoginInformation.parse_obj(obj) + + _obj = ExternalLoginInformation.parse_obj({ + "presigned_url": obj.get("presigned_url") + }) + return _obj + + diff --git a/clients/python/test/test_auth_api.py b/clients/python/test/test_auth_api.py index 0438975ef2f..3846c5e8bf3 100644 --- a/clients/python/test/test_auth_api.py +++ b/clients/python/test/test_auth_api.py @@ -141,6 +141,13 @@ def test_detach_policy_from_user(self): """ pass + def test_external_login(self): + """Test case for external_login + + perform a login using an external authenticator # noqa: E501 + """ + pass + def test_get_credentials(self): """Test case for get_credentials diff --git a/clients/python/test/test_external_login_information.py b/clients/python/test/test_external_login_information.py new file mode 100644 index 00000000000..d85b2731404 --- /dev/null +++ b/clients/python/test/test_external_login_information.py @@ -0,0 +1,56 @@ +# coding: utf-8 + +""" + lakeFS API + + lakeFS HTTP API + + The version of the OpenAPI document: 1.0.0 + Contact: services@treeverse.io + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest +import datetime + +import lakefs_sdk +from lakefs_sdk.models.external_login_information import ExternalLoginInformation # noqa: E501 +from lakefs_sdk.rest import ApiException + +class TestExternalLoginInformation(unittest.TestCase): + """ExternalLoginInformation unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test ExternalLoginInformation + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `ExternalLoginInformation` + """ + model = lakefs_sdk.models.external_login_information.ExternalLoginInformation() # noqa: E501 + if include_optional : + return ExternalLoginInformation( + presigned_url = '' + ) + else : + return ExternalLoginInformation( + presigned_url = '', + ) + """ + + def testExternalLoginInformation(self): + """Test ExternalLoginInformation""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index 81f8a2db461..d5950c3374a 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -17,6 +17,7 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] + - external_auth: [] components: securitySchemes: basic_auth: @@ -38,6 +39,9 @@ components: type: apiKey in: cookie name: saml_auth_session + external_auth: + type: http + scheme: basic parameters: PaginationPrefix: in: query @@ -1050,6 +1054,14 @@ components: secret_access_key: type: string + ExternalLoginInformation: + type: object + required: + - presigned_url + properties: + presigned_url: + type: string + AuthenticationToken: type: object required: @@ -1803,7 +1815,35 @@ paths: default: $ref: "#/components/responses/ServerError" - + /auth/external/login: + post: + tags: + - auth + operationId: externalLogin + summary: perform a login using an external authenticator + security: [] + requestBody: + content: + application/json: + schema: + $ref: "#/components/schemas/ExternalLoginInformation" + responses: + 200: + description: successful login + headers: + Set-Cookie: + schema: + type: string + content: + application/json: + schema: + $ref: "#/components/schemas/AuthenticationToken" + 401: + $ref: "#/components/responses/Unauthorized" + 420: + description: too many requests + default: + $ref: "#/components/responses/ServerError" /auth/capabilities: get: diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 5aeca559e42..5c1d546db06 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -554,6 +554,48 @@ func (c *Controller) Login(w http.ResponseWriter, r *http.Request, body apigen.L writeResponse(w, r, http.StatusOK, response) } +func (c *Controller) ExternalLogin(w http.ResponseWriter, r *http.Request, body apigen.ExternalLoginJSONRequestBody) { + ctx := r.Context() + if c.isExternalPrincipalNotSupported(ctx) { + writeError(w, r, http.StatusNotImplemented, "Not implemented") + return + } + + c.LogAction(ctx, "external_login", r, "", "", "") + + userID, err := c.Auth.ExternalLogin(ctx, body.PresignedUrl) + if c.handleAPIError(ctx, w, r, err) { + if errors.Is(err, ErrAuthenticatingRequest) { + writeResponse(w, r, http.StatusUnauthorized, http.StatusText(http.StatusUnauthorized)) + return + } + + loginTime := time.Now() + duration := c.Config.Auth.LoginDuration + expires := loginTime.Add(duration) + secret := c.Auth.SecretStore().SharedSecret() + + tokenString, err := GenerateJWTLogin(secret, userID, loginTime, expires) + if err != nil { + writeError(w, r, http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError)) + return + } + internalAuthSession, _ := c.sessionStore.Get(r, InternalAuthSessionName) + internalAuthSession.Values[TokenSessionKeyName] = tokenString + err = c.sessionStore.Save(r, w, internalAuthSession) + if err != nil { + c.Logger.WithError(err).Error("Failed to save internal auth session") + writeError(w, r, http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError)) + return + } + response := apigen.AuthenticationToken{ + Token: tokenString, + TokenExpiration: swag.Int64(expires.Unix()), + } + writeResponse(w, r, http.StatusOK, response) + } +} + func (c *Controller) GetPhysicalAddress(w http.ResponseWriter, r *http.Request, repository, branch string, params apigen.GetPhysicalAddressParams) { if !c.authorize(w, r, permissions.Node{ Permission: permissions.Permission{ diff --git a/pkg/auth/service.go b/pkg/auth/service.go index 12500ac7d4e..459aa25747b 100644 --- a/pkg/auth/service.go +++ b/pkg/auth/service.go @@ -85,6 +85,7 @@ type ExternalPrincipalsService interface { DeleteUserExternalPrincipal(ctx context.Context, userID, principalID string) error GetExternalPrincipal(ctx context.Context, principalID string) (*model.ExternalPrincipal, error) ListUserExternalPrincipals(ctx context.Context, userID string, params *model.PaginationParams) ([]*model.ExternalPrincipal, *model.Paginator, error) + ExternalLogin(ctx context.Context, presignedUrl string) (string, error) } type Service interface { @@ -1130,6 +1131,10 @@ func (s *AuthService) GetExternalPrincipal(ctx context.Context, principalID stri return nil, ErrNotImplemented } +func (s *AuthService) ExternalLogin(ctx context.Context, presignedUrl string) (string, error) { + return "", ErrNotImplemented +} + func (s *AuthService) ListUserExternalPrincipals(ctx context.Context, userID string, params *model.PaginationParams) ([]*model.ExternalPrincipal, *model.Paginator, error) { return nil, nil, ErrNotImplemented } @@ -2043,6 +2048,22 @@ func (a *APIAuthService) ListUserExternalPrincipals(ctx context.Context, userID return principals, toPagination(resp.JSON200.Pagination), nil } +func (a *APIAuthService) ExternalLogin(ctx context.Context, principalID string) (string, error) { + if !a.IsExternalPrincipalsEnabled(ctx) { + return "", fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) + } + resp, err := a.apiClient.GetExternalPrincipalWithResponse(ctx, &GetExternalPrincipalParams{ + PrincipalId: principalID, + }) + if err != nil { + return "", fmt.Errorf("get external principal: %w", err) + } + if err := a.validateResponse(resp, http.StatusOK); err != nil { + return "", err + } + return resp.JSON200.UserId, nil +} + func NewAPIAuthService(apiEndpoint, token string, externalPrincipalseEnabled bool, secretStore crypt.SecretStore, cacheConf params.ServiceCache, logger logging.Logger) (*APIAuthService, error) { if token == "" { // when no token is provided, generate one. From ce5b5e046e12e84ef37a5d6d92c7752bae50c0df Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Tue, 19 Mar 2024 17:53:59 +0200 Subject: [PATCH 02/33] Add a test --- pkg/auth/service_test.go | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) diff --git a/pkg/auth/service_test.go b/pkg/auth/service_test.go index 7611f86f3a3..0c1d134f654 100644 --- a/pkg/auth/service_test.go +++ b/pkg/auth/service_test.go @@ -2744,3 +2744,37 @@ func TestAPIAuthService_DeleteExternalPrincipalAttachedToUserDelete(t *testing.T _, err = s.GetExternalPrincipal(ctx, principalId) require.Errorf(t, err, "principal should not exist if a user is deleted") } + +func TestAPIAuthService_ExternalLogin(t *testing.T) { + mockClient, s := NewTestApiService(t, false) + userId := "user" + principalId := "arn:aws:sts::123:assumed-role/MyRole/SessionName" + ctx := context.Background() + + // create userA and principalA + reqParams := gomock.Eq(&auth.CreateUserExternalPrincipalParams{PrincipalId: principalId}) + mockClient.EXPECT().CreateUserExternalPrincipalWithResponse(gomock.Any(), userId, reqParams).Return(&auth.CreateUserExternalPrincipalResponse{ + HTTPResponse: &http.Response{ + StatusCode: http.StatusCreated, + }, + }, nil) + + mockClient.EXPECT().GetExternalPrincipalWithResponse(gomock.Any(), gomock.Eq(&auth.GetExternalPrincipalParams{ + PrincipalId: principalId, + })).Return( + &auth.GetExternalPrincipalResponse{ + HTTPResponse: &http.Response{ + StatusCode: http.StatusOK, + }, + JSON200: &auth.ExternalPrincipal{ + Id: principalId, + UserId: userId, + }, + }, nil) + + err := s.CreateUserExternalPrincipal(ctx, userId, principalId) + require.NoError(t, err) + resp, err := s.ExternalLogin(ctx, principalId) + require.NoError(t, err) + require.Equal(t, userId, resp) +} From 692916a10f588529efb2c4950b4e2ab913d20ab3 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Tue, 19 Mar 2024 17:56:12 +0200 Subject: [PATCH 03/33] Fix --- pkg/auth/service.go | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkg/auth/service.go b/pkg/auth/service.go index 459aa25747b..a9113f09889 100644 --- a/pkg/auth/service.go +++ b/pkg/auth/service.go @@ -85,7 +85,7 @@ type ExternalPrincipalsService interface { DeleteUserExternalPrincipal(ctx context.Context, userID, principalID string) error GetExternalPrincipal(ctx context.Context, principalID string) (*model.ExternalPrincipal, error) ListUserExternalPrincipals(ctx context.Context, userID string, params *model.PaginationParams) ([]*model.ExternalPrincipal, *model.Paginator, error) - ExternalLogin(ctx context.Context, presignedUrl string) (string, error) + ExternalLogin(ctx context.Context, principalID string) (string, error) } type Service interface { @@ -1131,7 +1131,7 @@ func (s *AuthService) GetExternalPrincipal(ctx context.Context, principalID stri return nil, ErrNotImplemented } -func (s *AuthService) ExternalLogin(ctx context.Context, presignedUrl string) (string, error) { +func (s *AuthService) ExternalLogin(ctx context.Context, principalID string) (string, error) { return "", ErrNotImplemented } From 31f7761fe8b2adc8433bccd7efbf75292b797f8b Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 20 Mar 2024 10:59:51 +0200 Subject: [PATCH 04/33] Fix logic --- api/authorization.yml | 49 +++++++++++++++++++++++++++++-- pkg/auth/mock/mock_auth_client.go | 40 +++++++++++++++++++++++++ pkg/auth/service.go | 12 ++++---- pkg/auth/service_test.go | 25 ++++------------ 4 files changed, 98 insertions(+), 28 deletions(-) diff --git a/api/authorization.yml b/api/authorization.yml index 46d80a9215c..f0d4bee307c 100644 --- a/api/authorization.yml +++ b/api/authorization.yml @@ -363,6 +363,15 @@ components: items: $ref: "#/components/schemas/ExternalPrincipal" + ExternalLoginInformation: + type: object + required: + - presigned_url + properties: + presigned_url: + type: string + + paths: /auth/users: get: @@ -1102,6 +1111,7 @@ paths: $ref: "#/components/responses/Unauthorized" default: $ref: "#/components/responses/ServerError" + /auth/users/{userId}/external/principals/ls: parameters: - in: path @@ -1112,6 +1122,7 @@ paths: get: tags: - auth + - external - experimental parameters: - $ref: "#/components/parameters/PaginationPrefix" @@ -1148,6 +1159,7 @@ paths: post: tags: - auth + - external - experimental operationId: createUserExternalPrincipal summary: Create principal as external identity connected to lakeFS user @@ -1164,8 +1176,9 @@ paths: $ref: "#/components/responses/ServerError" delete: tags: - - auth - - experimental + - auth + - external + - experimental operationId: deleteUserExternalPrincipal summary: delete external principal from user's external principal list responses: @@ -1208,6 +1221,38 @@ paths: default: $ref: "#/components/responses/ServerError" + /auth/external/login: + post: + tags: + - auth + - external + - experimental + operationId: externalLogin + summary: perform a login using an external authenticator + security: [] + requestBody: + content: + application/json: + schema: + $ref: "#/components/schemas/ExternalLoginInformation" + responses: + 200: + description: successful login + headers: + Set-Cookie: + schema: + type: string + content: + application/json: + schema: + $ref: "#/components/schemas/User" + 401: + $ref: "#/components/responses/Unauthorized" + 420: + description: too many requests + default: + $ref: "#/components/responses/ServerError" + /healthcheck: get: operationId: healthCheck diff --git a/pkg/auth/mock/mock_auth_client.go b/pkg/auth/mock/mock_auth_client.go index 9b5b177d7e7..7ed9c2576f9 100644 --- a/pkg/auth/mock/mock_auth_client.go +++ b/pkg/auth/mock/mock_auth_client.go @@ -456,6 +456,46 @@ func (mr *MockClientWithResponsesInterfaceMockRecorder) DetachPolicyFromUserWith return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DetachPolicyFromUserWithResponse", reflect.TypeOf((*MockClientWithResponsesInterface)(nil).DetachPolicyFromUserWithResponse), varargs...) } +// ExternalLoginWithBodyWithResponse mocks base method. +func (m *MockClientWithResponsesInterface) ExternalLoginWithBodyWithResponse(arg0 context.Context, arg1 string, arg2 io.Reader, arg3 ...auth.RequestEditorFn) (*auth.ExternalLoginResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1, arg2} + for _, a := range arg3 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ExternalLoginWithBodyWithResponse", varargs...) + ret0, _ := ret[0].(*auth.ExternalLoginResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ExternalLoginWithBodyWithResponse indicates an expected call of ExternalLoginWithBodyWithResponse. +func (mr *MockClientWithResponsesInterfaceMockRecorder) ExternalLoginWithBodyWithResponse(arg0, arg1, arg2 interface{}, arg3 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1, arg2}, arg3...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ExternalLoginWithBodyWithResponse", reflect.TypeOf((*MockClientWithResponsesInterface)(nil).ExternalLoginWithBodyWithResponse), varargs...) +} + +// ExternalLoginWithResponse mocks base method. +func (m *MockClientWithResponsesInterface) ExternalLoginWithResponse(arg0 context.Context, arg1 auth.ExternalLoginJSONRequestBody, arg2 ...auth.RequestEditorFn) (*auth.ExternalLoginResponse, error) { + m.ctrl.T.Helper() + varargs := []interface{}{arg0, arg1} + for _, a := range arg2 { + varargs = append(varargs, a) + } + ret := m.ctrl.Call(m, "ExternalLoginWithResponse", varargs...) + ret0, _ := ret[0].(*auth.ExternalLoginResponse) + ret1, _ := ret[1].(error) + return ret0, ret1 +} + +// ExternalLoginWithResponse indicates an expected call of ExternalLoginWithResponse. +func (mr *MockClientWithResponsesInterfaceMockRecorder) ExternalLoginWithResponse(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + varargs := append([]interface{}{arg0, arg1}, arg2...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ExternalLoginWithResponse", reflect.TypeOf((*MockClientWithResponsesInterface)(nil).ExternalLoginWithResponse), varargs...) +} + // GetCredentialsForUserWithResponse mocks base method. func (m *MockClientWithResponsesInterface) GetCredentialsForUserWithResponse(arg0 context.Context, arg1, arg2 string, arg3 ...auth.RequestEditorFn) (*auth.GetCredentialsForUserResponse, error) { m.ctrl.T.Helper() diff --git a/pkg/auth/service.go b/pkg/auth/service.go index a9113f09889..e952dc0d893 100644 --- a/pkg/auth/service.go +++ b/pkg/auth/service.go @@ -85,7 +85,7 @@ type ExternalPrincipalsService interface { DeleteUserExternalPrincipal(ctx context.Context, userID, principalID string) error GetExternalPrincipal(ctx context.Context, principalID string) (*model.ExternalPrincipal, error) ListUserExternalPrincipals(ctx context.Context, userID string, params *model.PaginationParams) ([]*model.ExternalPrincipal, *model.Paginator, error) - ExternalLogin(ctx context.Context, principalID string) (string, error) + ExternalLogin(ctx context.Context, presignedURL string) (string, error) } type Service interface { @@ -1131,7 +1131,7 @@ func (s *AuthService) GetExternalPrincipal(ctx context.Context, principalID stri return nil, ErrNotImplemented } -func (s *AuthService) ExternalLogin(ctx context.Context, principalID string) (string, error) { +func (s *AuthService) ExternalLogin(ctx context.Context, presignedURL string) (string, error) { return "", ErrNotImplemented } @@ -2048,20 +2048,18 @@ func (a *APIAuthService) ListUserExternalPrincipals(ctx context.Context, userID return principals, toPagination(resp.JSON200.Pagination), nil } -func (a *APIAuthService) ExternalLogin(ctx context.Context, principalID string) (string, error) { +func (a *APIAuthService) ExternalLogin(ctx context.Context, presignedURL string) (string, error) { if !a.IsExternalPrincipalsEnabled(ctx) { return "", fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) } - resp, err := a.apiClient.GetExternalPrincipalWithResponse(ctx, &GetExternalPrincipalParams{ - PrincipalId: principalID, - }) + resp, err := a.apiClient.ExternalLoginWithResponse(ctx, ExternalLoginJSONRequestBody{PresignedUrl: presignedURL}) if err != nil { return "", fmt.Errorf("get external principal: %w", err) } if err := a.validateResponse(resp, http.StatusOK); err != nil { return "", err } - return resp.JSON200.UserId, nil + return resp.JSON200.Username, nil } func NewAPIAuthService(apiEndpoint, token string, externalPrincipalseEnabled bool, secretStore crypt.SecretStore, cacheConf params.ServiceCache, logger logging.Logger) (*APIAuthService, error) { diff --git a/pkg/auth/service_test.go b/pkg/auth/service_test.go index 0c1d134f654..0f2a8ea60fd 100644 --- a/pkg/auth/service_test.go +++ b/pkg/auth/service_test.go @@ -2748,33 +2748,20 @@ func TestAPIAuthService_DeleteExternalPrincipalAttachedToUserDelete(t *testing.T func TestAPIAuthService_ExternalLogin(t *testing.T) { mockClient, s := NewTestApiService(t, false) userId := "user" - principalId := "arn:aws:sts::123:assumed-role/MyRole/SessionName" + presignedURL := "PresignedUrl" ctx := context.Background() - // create userA and principalA - reqParams := gomock.Eq(&auth.CreateUserExternalPrincipalParams{PrincipalId: principalId}) - mockClient.EXPECT().CreateUserExternalPrincipalWithResponse(gomock.Any(), userId, reqParams).Return(&auth.CreateUserExternalPrincipalResponse{ - HTTPResponse: &http.Response{ - StatusCode: http.StatusCreated, - }, - }, nil) - - mockClient.EXPECT().GetExternalPrincipalWithResponse(gomock.Any(), gomock.Eq(&auth.GetExternalPrincipalParams{ - PrincipalId: principalId, + mockClient.EXPECT().ExternalLoginWithResponse(gomock.Any(), gomock.Eq(auth.ExternalLoginJSONRequestBody{ + PresignedUrl: presignedURL, })).Return( - &auth.GetExternalPrincipalResponse{ + &auth.ExternalLoginResponse{ HTTPResponse: &http.Response{ StatusCode: http.StatusOK, }, - JSON200: &auth.ExternalPrincipal{ - Id: principalId, - UserId: userId, - }, + JSON200: &auth.User{Username: userId}, }, nil) - err := s.CreateUserExternalPrincipal(ctx, userId, principalId) - require.NoError(t, err) - resp, err := s.ExternalLogin(ctx, principalId) + resp, err := s.ExternalLogin(ctx, presignedURL) require.NoError(t, err) require.Equal(t, userId, resp) } From 60389b0944cdc1e15d1024edefc79872f8e9b660 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 20 Mar 2024 11:17:50 +0200 Subject: [PATCH 05/33] Add relevant tags --- api/swagger.yml | 2 + clients/java-legacy/README.md | 2 + clients/java-legacy/api/openapi.yaml | 2 + clients/java-legacy/docs/ExperimentalApi.md | 64 +++++++ clients/java-legacy/docs/ExternalApi.md | 64 +++++++ .../lakefs/clients/api/ExperimentalApi.java | 120 ++++++++++++ .../io/lakefs/clients/api/ExternalApi.java | 120 ++++++++++++ .../clients/api/ExperimentalApiTest.java | 17 ++ .../lakefs/clients/api/ExternalApiTest.java | 17 ++ clients/java/README.md | 2 + clients/java/api/openapi.yaml | 2 + clients/java/docs/ExperimentalApi.md | 66 +++++++ clients/java/docs/ExternalApi.md | 66 +++++++ .../lakefs/clients/sdk/ExperimentalApi.java | 172 ++++++++++++++++++ .../io/lakefs/clients/sdk/ExternalApi.java | 172 ++++++++++++++++++ .../clients/sdk/ExperimentalApiTest.java | 16 ++ .../lakefs/clients/sdk/ExternalApiTest.java | 16 ++ clients/python-legacy/README.md | 2 + clients/python-legacy/docs/ExperimentalApi.md | 74 ++++++++ clients/python-legacy/docs/ExternalApi.md | 74 ++++++++ .../lakefs_client/api/experimental_api.py | 111 +++++++++++ .../lakefs_client/api/external_api.py | 111 +++++++++++ .../test/test_experimental_api.py | 7 + .../python-legacy/test/test_external_api.py | 7 + clients/python/README.md | 2 + clients/python/docs/ExperimentalApi.md | 73 ++++++++ clients/python/docs/ExternalApi.md | 73 ++++++++ .../python/lakefs_sdk/api/experimental_api.py | 148 +++++++++++++++ clients/python/lakefs_sdk/api/external_api.py | 148 +++++++++++++++ clients/python/test/test_experimental_api.py | 7 + clients/python/test/test_external_api.py | 7 + docs/assets/js/swagger.yml | 2 + 32 files changed, 1766 insertions(+) diff --git a/api/swagger.yml b/api/swagger.yml index d5950c3374a..3c98d5f35f1 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -1819,6 +1819,8 @@ paths: post: tags: - auth + - external + - experimental operationId: externalLogin summary: perform a login using an external authenticator security: [] diff --git a/clients/java-legacy/README.md b/clients/java-legacy/README.md index 914260ae14c..3f7d7c55120 100644 --- a/clients/java-legacy/README.md +++ b/clients/java-legacy/README.md @@ -196,11 +196,13 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**createPresignMultipartUpload**](docs/ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**createUserExternalPrincipal**](docs/ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**deleteUserExternalPrincipal**](docs/ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +*ExperimentalApi* | [**externalLogin**](docs/ExperimentalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator *ExperimentalApi* | [**getExternalPrincipal**](docs/ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hardResetBranch**](docs/ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**listUserExternalPrincipals**](docs/ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExternalApi* | [**createUserExternalPrincipal**](docs/ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**deleteUserExternalPrincipal**](docs/ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +*ExternalApi* | [**externalLogin**](docs/ExternalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator *ExternalApi* | [**getExternalPrincipal**](docs/ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**listUserExternalPrincipals**](docs/ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**healthCheck**](docs/HealthCheckApi.md#healthCheck) | **GET** /healthcheck | diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index b2d6e79fa65..a3737619dc6 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -214,6 +214,8 @@ paths: summary: perform a login using an external authenticator tags: - auth + - external + - experimental x-contentType: application/json x-accepts: application/json /auth/capabilities: diff --git a/clients/java-legacy/docs/ExperimentalApi.md b/clients/java-legacy/docs/ExperimentalApi.md index 31ded2daf52..2f77eb53ca5 100644 --- a/clients/java-legacy/docs/ExperimentalApi.md +++ b/clients/java-legacy/docs/ExperimentalApi.md @@ -9,6 +9,7 @@ Method | HTTP request | Description [**createPresignMultipartUpload**](ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload [**createUserExternalPrincipal**](ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**deleteUserExternalPrincipal**](ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +[**externalLogin**](ExperimentalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator [**getExternalPrincipal**](ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id [**hardResetBranch**](ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch [**listUserExternalPrincipals**](ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -535,6 +536,69 @@ null (empty response body) **420** | too many requests | - | **0** | Internal Server Error | - | + +# **externalLogin** +> AuthenticationToken externalLogin(externalLoginInformation) + +perform a login using an external authenticator + +### Example +```java +// Import classes: +import io.lakefs.clients.api.ApiClient; +import io.lakefs.clients.api.ApiException; +import io.lakefs.clients.api.Configuration; +import io.lakefs.clients.api.models.*; +import io.lakefs.clients.api.ExperimentalApi; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("http://localhost/api/v1"); + + ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + try { + AuthenticationToken result = apiInstance.externalLogin(externalLoginInformation); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling ExperimentalApi#externalLogin"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful login | * Set-Cookie -
| +**401** | Unauthorized | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + # **getExternalPrincipal** > ExternalPrincipal getExternalPrincipal(principalId) diff --git a/clients/java-legacy/docs/ExternalApi.md b/clients/java-legacy/docs/ExternalApi.md index d0576e50037..67cd119ced8 100644 --- a/clients/java-legacy/docs/ExternalApi.md +++ b/clients/java-legacy/docs/ExternalApi.md @@ -6,6 +6,7 @@ Method | HTTP request | Description ------------- | ------------- | ------------- [**createUserExternalPrincipal**](ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**deleteUserExternalPrincipal**](ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +[**externalLogin**](ExternalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator [**getExternalPrincipal**](ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id [**listUserExternalPrincipals**](ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -209,6 +210,69 @@ null (empty response body) **420** | too many requests | - | **0** | Internal Server Error | - | + +# **externalLogin** +> AuthenticationToken externalLogin(externalLoginInformation) + +perform a login using an external authenticator + +### Example +```java +// Import classes: +import io.lakefs.clients.api.ApiClient; +import io.lakefs.clients.api.ApiException; +import io.lakefs.clients.api.Configuration; +import io.lakefs.clients.api.models.*; +import io.lakefs.clients.api.ExternalApi; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("http://localhost/api/v1"); + + ExternalApi apiInstance = new ExternalApi(defaultClient); + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + try { + AuthenticationToken result = apiInstance.externalLogin(externalLoginInformation); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling ExternalApi#externalLogin"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful login | * Set-Cookie -
| +**401** | Unauthorized | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + # **getExternalPrincipal** > ExternalPrincipal getExternalPrincipal(principalId) diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java index 168c5b4f9e6..c1f4fcba196 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java @@ -28,8 +28,10 @@ import io.lakefs.clients.api.model.AbortPresignMultipartUpload; +import io.lakefs.clients.api.model.AuthenticationToken; import io.lakefs.clients.api.model.CompletePresignMultipartUpload; import io.lakefs.clients.api.model.Error; +import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -845,6 +847,124 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ localVarApiClient.executeAsync(localVarCall, _callback); return localVarCall; } + /** + * Build call for externalLogin + * @param externalLoginInformation (optional) + * @param _callback Callback for upload/download progress + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + Object localVarPostBody = externalLoginInformation; + + // create path and map variables + String localVarPath = "/auth/external/login"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + localVarHeaderParams.put("Content-Type", localVarContentType); + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + + okhttp3.Call localVarCall = externalLoginCall(externalLoginInformation, _callback); + return localVarCall; + + } + + /** + * perform a login using an external authenticator + * + * @param externalLoginInformation (optional) + * @return AuthenticationToken + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginInformation) throws ApiException { + ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + return localVarResp.getData(); + } + + /** + * perform a login using an external authenticator + * + * @param externalLoginInformation (optional) + * @return ApiResponse<AuthenticationToken> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * perform a login using an external authenticator (asynchronously) + * + * @param externalLoginInformation (optional) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for getExternalPrincipal * @param principalId (required) diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java index 912084f15da..bc691480381 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java @@ -27,7 +27,9 @@ import java.io.IOException; +import io.lakefs.clients.api.model.AuthenticationToken; import io.lakefs.clients.api.model.Error; +import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -339,6 +341,124 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ localVarApiClient.executeAsync(localVarCall, _callback); return localVarCall; } + /** + * Build call for externalLogin + * @param externalLoginInformation (optional) + * @param _callback Callback for upload/download progress + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + Object localVarPostBody = externalLoginInformation; + + // create path and map variables + String localVarPath = "/auth/external/login"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + localVarHeaderParams.put("Content-Type", localVarContentType); + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + + okhttp3.Call localVarCall = externalLoginCall(externalLoginInformation, _callback); + return localVarCall; + + } + + /** + * perform a login using an external authenticator + * + * @param externalLoginInformation (optional) + * @return AuthenticationToken + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginInformation) throws ApiException { + ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + return localVarResp.getData(); + } + + /** + * perform a login using an external authenticator + * + * @param externalLoginInformation (optional) + * @return ApiResponse<AuthenticationToken> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * perform a login using an external authenticator (asynchronously) + * + * @param externalLoginInformation (optional) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for getExternalPrincipal * @param principalId (required) diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java index d2ac81470cd..ff068a132f2 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java @@ -15,8 +15,10 @@ import io.lakefs.clients.api.ApiException; import io.lakefs.clients.api.model.AbortPresignMultipartUpload; +import io.lakefs.clients.api.model.AuthenticationToken; import io.lakefs.clients.api.model.CompletePresignMultipartUpload; import io.lakefs.clients.api.model.Error; +import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -129,6 +131,21 @@ public void deleteUserExternalPrincipalTest() throws ApiException { // TODO: test validations } + /** + * perform a login using an external authenticator + * + * + * + * @throws ApiException + * if the Api call fails + */ + @Test + public void externalLoginTest() throws ApiException { + ExternalLoginInformation externalLoginInformation = null; + AuthenticationToken response = api.externalLogin(externalLoginInformation); + // TODO: test validations + } + /** * describe external principal by id * diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java index 09ec5293332..1ac54cf104b 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java @@ -14,7 +14,9 @@ package io.lakefs.clients.api; import io.lakefs.clients.api.ApiException; +import io.lakefs.clients.api.model.AuthenticationToken; import io.lakefs.clients.api.model.Error; +import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -68,6 +70,21 @@ public void deleteUserExternalPrincipalTest() throws ApiException { // TODO: test validations } + /** + * perform a login using an external authenticator + * + * + * + * @throws ApiException + * if the Api call fails + */ + @Test + public void externalLoginTest() throws ApiException { + ExternalLoginInformation externalLoginInformation = null; + AuthenticationToken response = api.externalLogin(externalLoginInformation); + // TODO: test validations + } + /** * describe external principal by id * diff --git a/clients/java/README.md b/clients/java/README.md index 6ca04e07bc0..f200f56cd80 100644 --- a/clients/java/README.md +++ b/clients/java/README.md @@ -204,11 +204,13 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**createPresignMultipartUpload**](docs/ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**createUserExternalPrincipal**](docs/ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**deleteUserExternalPrincipal**](docs/ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +*ExperimentalApi* | [**externalLogin**](docs/ExperimentalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator *ExperimentalApi* | [**getExternalPrincipal**](docs/ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hardResetBranch**](docs/ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**listUserExternalPrincipals**](docs/ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExternalApi* | [**createUserExternalPrincipal**](docs/ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**deleteUserExternalPrincipal**](docs/ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +*ExternalApi* | [**externalLogin**](docs/ExternalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator *ExternalApi* | [**getExternalPrincipal**](docs/ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**listUserExternalPrincipals**](docs/ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**healthCheck**](docs/HealthCheckApi.md#healthCheck) | **GET** /healthcheck | diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index 0e7c11bee79..8b2c7993778 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -214,6 +214,8 @@ paths: summary: perform a login using an external authenticator tags: - auth + - external + - experimental x-content-type: application/json x-accepts: application/json /auth/capabilities: diff --git a/clients/java/docs/ExperimentalApi.md b/clients/java/docs/ExperimentalApi.md index 75d379e989f..48145a02814 100644 --- a/clients/java/docs/ExperimentalApi.md +++ b/clients/java/docs/ExperimentalApi.md @@ -9,6 +9,7 @@ All URIs are relative to */api/v1* | [**createPresignMultipartUpload**](ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload | | [**createUserExternalPrincipal**](ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user | | [**deleteUserExternalPrincipal**](ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user | +| [**externalLogin**](ExperimentalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator | | [**getExternalPrincipal**](ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id | | [**hardResetBranch**](ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch | | [**listUserExternalPrincipals**](ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user | @@ -544,6 +545,71 @@ null (empty response body) | **420** | too many requests | - | | **0** | Internal Server Error | - | + +# **externalLogin** +> AuthenticationToken externalLogin().externalLoginInformation(externalLoginInformation).execute(); + +perform a login using an external authenticator + +### Example +```java +// Import classes: +import io.lakefs.clients.sdk.ApiClient; +import io.lakefs.clients.sdk.ApiException; +import io.lakefs.clients.sdk.Configuration; +import io.lakefs.clients.sdk.models.*; +import io.lakefs.clients.sdk.ExperimentalApi; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("/api/v1"); + + ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + try { + AuthenticationToken result = apiInstance.externalLogin() + .externalLoginInformation(externalLoginInformation) + .execute(); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling ExperimentalApi#externalLogin"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +| Name | Type | Description | Notes | +|------------- | ------------- | ------------- | -------------| +| **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] | + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +| **200** | successful login | * Set-Cookie -
| +| **401** | Unauthorized | - | +| **420** | too many requests | - | +| **0** | Internal Server Error | - | + # **getExternalPrincipal** > ExternalPrincipal getExternalPrincipal(principalId).execute(); diff --git a/clients/java/docs/ExternalApi.md b/clients/java/docs/ExternalApi.md index 970723ffeaf..782e25a75e9 100644 --- a/clients/java/docs/ExternalApi.md +++ b/clients/java/docs/ExternalApi.md @@ -6,6 +6,7 @@ All URIs are relative to */api/v1* |------------- | ------------- | -------------| | [**createUserExternalPrincipal**](ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user | | [**deleteUserExternalPrincipal**](ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user | +| [**externalLogin**](ExternalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator | | [**getExternalPrincipal**](ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id | | [**listUserExternalPrincipals**](ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user | @@ -212,6 +213,71 @@ null (empty response body) | **420** | too many requests | - | | **0** | Internal Server Error | - | + +# **externalLogin** +> AuthenticationToken externalLogin().externalLoginInformation(externalLoginInformation).execute(); + +perform a login using an external authenticator + +### Example +```java +// Import classes: +import io.lakefs.clients.sdk.ApiClient; +import io.lakefs.clients.sdk.ApiException; +import io.lakefs.clients.sdk.Configuration; +import io.lakefs.clients.sdk.models.*; +import io.lakefs.clients.sdk.ExternalApi; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("/api/v1"); + + ExternalApi apiInstance = new ExternalApi(defaultClient); + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + try { + AuthenticationToken result = apiInstance.externalLogin() + .externalLoginInformation(externalLoginInformation) + .execute(); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling ExternalApi#externalLogin"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +| Name | Type | Description | Notes | +|------------- | ------------- | ------------- | -------------| +| **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] | + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +| **200** | successful login | * Set-Cookie -
| +| **401** | Unauthorized | - | +| **420** | too many requests | - | +| **0** | Internal Server Error | - | + # **getExternalPrincipal** > ExternalPrincipal getExternalPrincipal(principalId).execute(); diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java index 870f523362d..3b46a48d81f 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java @@ -28,8 +28,10 @@ import io.lakefs.clients.sdk.model.AbortPresignMultipartUpload; +import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.CompletePresignMultipartUpload; import io.lakefs.clients.sdk.model.Error; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -1109,6 +1111,176 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } + private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + String basePath = null; + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = externalLoginInformation; + + // create path and map variables + String localVarPath = "/auth/external/login"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + return externalLoginCall(externalLoginInformation, _callback); + + } + + + private ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + private okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } + + public class APIexternalLoginRequest { + private ExternalLoginInformation externalLoginInformation; + + private APIexternalLoginRequest() { + } + + /** + * Set externalLoginInformation + * @param externalLoginInformation (optional) + * @return APIexternalLoginRequest + */ + public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation externalLoginInformation) { + this.externalLoginInformation = externalLoginInformation; + return this; + } + + /** + * Build call for externalLogin + * @param _callback ApiCallback API callback + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { + return externalLoginCall(externalLoginInformation, _callback); + } + + /** + * Execute externalLogin request + * @return AuthenticationToken + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public AuthenticationToken execute() throws ApiException { + ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + return localVarResp.getData(); + } + + /** + * Execute externalLogin request with HTTP info returned + * @return ApiResponse<AuthenticationToken> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public ApiResponse executeWithHttpInfo() throws ApiException { + return externalLoginWithHttpInfo(externalLoginInformation); + } + + /** + * Execute externalLogin request (asynchronously) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { + return externalLoginAsync(externalLoginInformation, _callback); + } + } + + /** + * perform a login using an external authenticator + * + * @return APIexternalLoginRequest + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public APIexternalLoginRequest externalLogin() { + return new APIexternalLoginRequest(); + } private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java index 0535d9a3449..5f2a701d359 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java @@ -27,7 +27,9 @@ import java.io.IOException; +import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.Error; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -452,6 +454,176 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } + private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + String basePath = null; + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = externalLoginInformation; + + // create path and map variables + String localVarPath = "/auth/external/login"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + return externalLoginCall(externalLoginInformation, _callback); + + } + + + private ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + private okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } + + public class APIexternalLoginRequest { + private ExternalLoginInformation externalLoginInformation; + + private APIexternalLoginRequest() { + } + + /** + * Set externalLoginInformation + * @param externalLoginInformation (optional) + * @return APIexternalLoginRequest + */ + public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation externalLoginInformation) { + this.externalLoginInformation = externalLoginInformation; + return this; + } + + /** + * Build call for externalLogin + * @param _callback ApiCallback API callback + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { + return externalLoginCall(externalLoginInformation, _callback); + } + + /** + * Execute externalLogin request + * @return AuthenticationToken + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public AuthenticationToken execute() throws ApiException { + ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + return localVarResp.getData(); + } + + /** + * Execute externalLogin request with HTTP info returned + * @return ApiResponse<AuthenticationToken> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public ApiResponse executeWithHttpInfo() throws ApiException { + return externalLoginWithHttpInfo(externalLoginInformation); + } + + /** + * Execute externalLogin request (asynchronously) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { + return externalLoginAsync(externalLoginInformation, _callback); + } + } + + /** + * perform a login using an external authenticator + * + * @return APIexternalLoginRequest + * @http.response.details + + + + + + +
Status Code Description Response Headers
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
+ */ + public APIexternalLoginRequest externalLogin() { + return new APIexternalLoginRequest(); + } private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java index eec86204479..215ae08a3f4 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java @@ -15,8 +15,10 @@ import io.lakefs.clients.sdk.ApiException; import io.lakefs.clients.sdk.model.AbortPresignMultipartUpload; +import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.CompletePresignMultipartUpload; import io.lakefs.clients.sdk.model.Error; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -128,6 +130,20 @@ public void deleteUserExternalPrincipalTest() throws ApiException { // TODO: test validations } + /** + * perform a login using an external authenticator + * + * @throws ApiException if the Api call fails + */ + @Test + public void externalLoginTest() throws ApiException { + ExternalLoginInformation externalLoginInformation = null; + AuthenticationToken response = api.externalLogin() + .externalLoginInformation(externalLoginInformation) + .execute(); + // TODO: test validations + } + /** * describe external principal by id * diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java index 602fc8a898b..37826f0117b 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java @@ -14,7 +14,9 @@ package io.lakefs.clients.sdk; import io.lakefs.clients.sdk.ApiException; +import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.Error; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -64,6 +66,20 @@ public void deleteUserExternalPrincipalTest() throws ApiException { // TODO: test validations } + /** + * perform a login using an external authenticator + * + * @throws ApiException if the Api call fails + */ + @Test + public void externalLoginTest() throws ApiException { + ExternalLoginInformation externalLoginInformation = null; + AuthenticationToken response = api.externalLogin() + .externalLoginInformation(externalLoginInformation) + .execute(); + // TODO: test validations + } + /** * describe external principal by id * diff --git a/clients/python-legacy/README.md b/clients/python-legacy/README.md index 32cc15f1d03..7bf2a129ca9 100644 --- a/clients/python-legacy/README.md +++ b/clients/python-legacy/README.md @@ -178,11 +178,13 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**create_presign_multipart_upload**](docs/ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**create_user_external_principal**](docs/ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**delete_user_external_principal**](docs/ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +*ExperimentalApi* | [**external_login**](docs/ExperimentalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator *ExperimentalApi* | [**get_external_principal**](docs/ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hard_reset_branch**](docs/ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**list_user_external_principals**](docs/ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExternalApi* | [**create_user_external_principal**](docs/ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**delete_user_external_principal**](docs/ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +*ExternalApi* | [**external_login**](docs/ExternalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator *ExternalApi* | [**get_external_principal**](docs/ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**list_user_external_principals**](docs/ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**health_check**](docs/HealthCheckApi.md#health_check) | **GET** /healthcheck | diff --git a/clients/python-legacy/docs/ExperimentalApi.md b/clients/python-legacy/docs/ExperimentalApi.md index 04723c2af1a..17c8f8e0d06 100644 --- a/clients/python-legacy/docs/ExperimentalApi.md +++ b/clients/python-legacy/docs/ExperimentalApi.md @@ -9,6 +9,7 @@ Method | HTTP request | Description [**create_presign_multipart_upload**](ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload [**create_user_external_principal**](ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +[**external_login**](ExperimentalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_external_principal**](ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**hard_reset_branch**](ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch [**list_user_external_principals**](ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -680,6 +681,79 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **external_login** +> AuthenticationToken external_login() + +perform a login using an external authenticator + +### Example + + +```python +import time +import lakefs_client +from lakefs_client.api import experimental_api +from lakefs_client.model.authentication_token import AuthenticationToken +from lakefs_client.model.external_login_information import ExternalLoginInformation +from lakefs_client.model.error import Error +from pprint import pprint +# Defining the host is optional and defaults to http://localhost/api/v1 +# See configuration.py for a list of all supported configuration parameters. +configuration = lakefs_client.Configuration( + host = "http://localhost/api/v1" +) + + +# Enter a context with an instance of the API client +with lakefs_client.ApiClient() as api_client: + # Create an instance of the API class + api_instance = experimental_api.ExperimentalApi(api_client) + external_login_information = ExternalLoginInformation( + presigned_url="presigned_url_example", + ) # ExternalLoginInformation | (optional) + + # example passing only required values which don't have defaults set + # and optional values + try: + # perform a login using an external authenticator + api_response = api_instance.external_login(external_login_information=external_login_information) + pprint(api_response) + except lakefs_client.ApiException as e: + print("Exception when calling ExperimentalApi->external_login: %s\n" % e) +``` + + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful login | * Set-Cookie -
| +**401** | Unauthorized | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **get_external_principal** > ExternalPrincipal get_external_principal(principal_id) diff --git a/clients/python-legacy/docs/ExternalApi.md b/clients/python-legacy/docs/ExternalApi.md index fad6f9dd9fc..3f5d31d575f 100644 --- a/clients/python-legacy/docs/ExternalApi.md +++ b/clients/python-legacy/docs/ExternalApi.md @@ -6,6 +6,7 @@ Method | HTTP request | Description ------------- | ------------- | ------------- [**create_user_external_principal**](ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +[**external_login**](ExternalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_external_principal**](ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**list_user_external_principals**](ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -258,6 +259,79 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **external_login** +> AuthenticationToken external_login() + +perform a login using an external authenticator + +### Example + + +```python +import time +import lakefs_client +from lakefs_client.api import external_api +from lakefs_client.model.authentication_token import AuthenticationToken +from lakefs_client.model.external_login_information import ExternalLoginInformation +from lakefs_client.model.error import Error +from pprint import pprint +# Defining the host is optional and defaults to http://localhost/api/v1 +# See configuration.py for a list of all supported configuration parameters. +configuration = lakefs_client.Configuration( + host = "http://localhost/api/v1" +) + + +# Enter a context with an instance of the API client +with lakefs_client.ApiClient() as api_client: + # Create an instance of the API class + api_instance = external_api.ExternalApi(api_client) + external_login_information = ExternalLoginInformation( + presigned_url="presigned_url_example", + ) # ExternalLoginInformation | (optional) + + # example passing only required values which don't have defaults set + # and optional values + try: + # perform a login using an external authenticator + api_response = api_instance.external_login(external_login_information=external_login_information) + pprint(api_response) + except lakefs_client.ApiException as e: + print("Exception when calling ExternalApi->external_login: %s\n" % e) +``` + + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful login | * Set-Cookie -
| +**401** | Unauthorized | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **get_external_principal** > ExternalPrincipal get_external_principal(principal_id) diff --git a/clients/python-legacy/lakefs_client/api/experimental_api.py b/clients/python-legacy/lakefs_client/api/experimental_api.py index 262052ec018..3047dabc63b 100644 --- a/clients/python-legacy/lakefs_client/api/experimental_api.py +++ b/clients/python-legacy/lakefs_client/api/experimental_api.py @@ -23,8 +23,10 @@ validate_and_convert_types ) from lakefs_client.model.abort_presign_multipart_upload import AbortPresignMultipartUpload +from lakefs_client.model.authentication_token import AuthenticationToken from lakefs_client.model.complete_presign_multipart_upload import CompletePresignMultipartUpload from lakefs_client.model.error import Error +from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList @@ -407,6 +409,54 @@ def __init__(self, api_client=None): }, api_client=api_client ) + self.external_login_endpoint = _Endpoint( + settings={ + 'response_type': (AuthenticationToken,), + 'auth': [], + 'endpoint_path': '/auth/external/login', + 'operation_id': 'external_login', + 'http_method': 'POST', + 'servers': None, + }, + params_map={ + 'all': [ + 'external_login_information', + ], + 'required': [], + 'nullable': [ + ], + 'enum': [ + ], + 'validation': [ + ] + }, + root_map={ + 'validations': { + }, + 'allowed_values': { + }, + 'openapi_types': { + 'external_login_information': + (ExternalLoginInformation,), + }, + 'attribute_map': { + }, + 'location_map': { + 'external_login_information': 'body', + }, + 'collection_format_map': { + } + }, + headers_map={ + 'accept': [ + 'application/json' + ], + 'content_type': [ + 'application/json' + ] + }, + api_client=api_client + ) self.get_external_principal_endpoint = _Endpoint( settings={ 'response_type': (ExternalPrincipal,), @@ -986,6 +1036,67 @@ def delete_user_external_principal( principal_id return self.delete_user_external_principal_endpoint.call_with_http_info(**kwargs) + def external_login( + self, + **kwargs + ): + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_login(async_req=True) + >>> result = thread.get() + + + Keyword Args: + external_login_information (ExternalLoginInformation): [optional] + _return_http_data_only (bool): response data without head status + code and headers. Default is True. + _preload_content (bool): if False, the urllib3.HTTPResponse object + will be returned without reading/decoding response data. + Default is True. + _request_timeout (int/float/tuple): timeout setting for this request. If + one number provided, it will be total request timeout. It can also + be a pair (tuple) of (connection, read) timeouts. + Default is None. + _check_input_type (bool): specifies if type checking + should be done one the data sent to the server. + Default is True. + _check_return_type (bool): specifies if type checking + should be done one the data received from the server. + Default is True. + _host_index (int/None): specifies the index of the server + that we want to use. + Default is read from the configuration. + async_req (bool): execute request asynchronously + + Returns: + AuthenticationToken + If the method is called asynchronously, returns the request + thread. + """ + kwargs['async_req'] = kwargs.get( + 'async_req', False + ) + kwargs['_return_http_data_only'] = kwargs.get( + '_return_http_data_only', True + ) + kwargs['_preload_content'] = kwargs.get( + '_preload_content', True + ) + kwargs['_request_timeout'] = kwargs.get( + '_request_timeout', None + ) + kwargs['_check_input_type'] = kwargs.get( + '_check_input_type', True + ) + kwargs['_check_return_type'] = kwargs.get( + '_check_return_type', True + ) + kwargs['_host_index'] = kwargs.get('_host_index') + return self.external_login_endpoint.call_with_http_info(**kwargs) + def get_external_principal( self, principal_id, diff --git a/clients/python-legacy/lakefs_client/api/external_api.py b/clients/python-legacy/lakefs_client/api/external_api.py index 63f2c0bf055..b521b1e18f1 100644 --- a/clients/python-legacy/lakefs_client/api/external_api.py +++ b/clients/python-legacy/lakefs_client/api/external_api.py @@ -22,7 +22,9 @@ none_type, validate_and_convert_types ) +from lakefs_client.model.authentication_token import AuthenticationToken from lakefs_client.model.error import Error +from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList @@ -169,6 +171,54 @@ def __init__(self, api_client=None): }, api_client=api_client ) + self.external_login_endpoint = _Endpoint( + settings={ + 'response_type': (AuthenticationToken,), + 'auth': [], + 'endpoint_path': '/auth/external/login', + 'operation_id': 'external_login', + 'http_method': 'POST', + 'servers': None, + }, + params_map={ + 'all': [ + 'external_login_information', + ], + 'required': [], + 'nullable': [ + ], + 'enum': [ + ], + 'validation': [ + ] + }, + root_map={ + 'validations': { + }, + 'allowed_values': { + }, + 'openapi_types': { + 'external_login_information': + (ExternalLoginInformation,), + }, + 'attribute_map': { + }, + 'location_map': { + 'external_login_information': 'body', + }, + 'collection_format_map': { + } + }, + headers_map={ + 'accept': [ + 'application/json' + ], + 'content_type': [ + 'application/json' + ] + }, + api_client=api_client + ) self.get_external_principal_endpoint = _Endpoint( settings={ 'response_type': (ExternalPrincipal,), @@ -442,6 +492,67 @@ def delete_user_external_principal( principal_id return self.delete_user_external_principal_endpoint.call_with_http_info(**kwargs) + def external_login( + self, + **kwargs + ): + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_login(async_req=True) + >>> result = thread.get() + + + Keyword Args: + external_login_information (ExternalLoginInformation): [optional] + _return_http_data_only (bool): response data without head status + code and headers. Default is True. + _preload_content (bool): if False, the urllib3.HTTPResponse object + will be returned without reading/decoding response data. + Default is True. + _request_timeout (int/float/tuple): timeout setting for this request. If + one number provided, it will be total request timeout. It can also + be a pair (tuple) of (connection, read) timeouts. + Default is None. + _check_input_type (bool): specifies if type checking + should be done one the data sent to the server. + Default is True. + _check_return_type (bool): specifies if type checking + should be done one the data received from the server. + Default is True. + _host_index (int/None): specifies the index of the server + that we want to use. + Default is read from the configuration. + async_req (bool): execute request asynchronously + + Returns: + AuthenticationToken + If the method is called asynchronously, returns the request + thread. + """ + kwargs['async_req'] = kwargs.get( + 'async_req', False + ) + kwargs['_return_http_data_only'] = kwargs.get( + '_return_http_data_only', True + ) + kwargs['_preload_content'] = kwargs.get( + '_preload_content', True + ) + kwargs['_request_timeout'] = kwargs.get( + '_request_timeout', None + ) + kwargs['_check_input_type'] = kwargs.get( + '_check_input_type', True + ) + kwargs['_check_return_type'] = kwargs.get( + '_check_return_type', True + ) + kwargs['_host_index'] = kwargs.get('_host_index') + return self.external_login_endpoint.call_with_http_info(**kwargs) + def get_external_principal( self, principal_id, diff --git a/clients/python-legacy/test/test_experimental_api.py b/clients/python-legacy/test/test_experimental_api.py index dd2991bf1d7..539830f672d 100644 --- a/clients/python-legacy/test/test_experimental_api.py +++ b/clients/python-legacy/test/test_experimental_api.py @@ -59,6 +59,13 @@ def test_delete_user_external_principal(self): """ pass + def test_external_login(self): + """Test case for external_login + + perform a login using an external authenticator # noqa: E501 + """ + pass + def test_get_external_principal(self): """Test case for get_external_principal diff --git a/clients/python-legacy/test/test_external_api.py b/clients/python-legacy/test/test_external_api.py index d07e73be645..b87e59dd62e 100644 --- a/clients/python-legacy/test/test_external_api.py +++ b/clients/python-legacy/test/test_external_api.py @@ -38,6 +38,13 @@ def test_delete_user_external_principal(self): """ pass + def test_external_login(self): + """Test case for external_login + + perform a login using an external authenticator # noqa: E501 + """ + pass + def test_get_external_principal(self): """Test case for get_external_principal diff --git a/clients/python/README.md b/clients/python/README.md index d5a79644b1a..1dff72e5c2f 100644 --- a/clients/python/README.md +++ b/clients/python/README.md @@ -181,11 +181,13 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**create_presign_multipart_upload**](docs/ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**create_user_external_principal**](docs/ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**delete_user_external_principal**](docs/ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +*ExperimentalApi* | [**external_login**](docs/ExperimentalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator *ExperimentalApi* | [**get_external_principal**](docs/ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hard_reset_branch**](docs/ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**list_user_external_principals**](docs/ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExternalApi* | [**create_user_external_principal**](docs/ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**delete_user_external_principal**](docs/ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +*ExternalApi* | [**external_login**](docs/ExternalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator *ExternalApi* | [**get_external_principal**](docs/ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**list_user_external_principals**](docs/ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**health_check**](docs/HealthCheckApi.md#health_check) | **GET** /healthcheck | diff --git a/clients/python/docs/ExperimentalApi.md b/clients/python/docs/ExperimentalApi.md index 9a747459a6e..29b10bee524 100644 --- a/clients/python/docs/ExperimentalApi.md +++ b/clients/python/docs/ExperimentalApi.md @@ -9,6 +9,7 @@ Method | HTTP request | Description [**create_presign_multipart_upload**](ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload [**create_user_external_principal**](ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +[**external_login**](ExperimentalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_external_principal**](ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**hard_reset_branch**](ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch [**list_user_external_principals**](ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -632,6 +633,78 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **external_login** +> AuthenticationToken external_login(external_login_information=external_login_information) + +perform a login using an external authenticator + +### Example + + +```python +import time +import os +import lakefs_sdk +from lakefs_sdk.models.authentication_token import AuthenticationToken +from lakefs_sdk.models.external_login_information import ExternalLoginInformation +from lakefs_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to /api/v1 +# See configuration.py for a list of all supported configuration parameters. +configuration = lakefs_sdk.Configuration( + host = "/api/v1" +) + + +# Enter a context with an instance of the API client +with lakefs_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = lakefs_sdk.ExperimentalApi(api_client) + external_login_information = lakefs_sdk.ExternalLoginInformation() # ExternalLoginInformation | (optional) + + try: + # perform a login using an external authenticator + api_response = api_instance.external_login(external_login_information=external_login_information) + print("The response of ExperimentalApi->external_login:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling ExperimentalApi->external_login: %s\n" % e) +``` + + + +### Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful login | * Set-Cookie -
| +**401** | Unauthorized | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **get_external_principal** > ExternalPrincipal get_external_principal(principal_id) diff --git a/clients/python/docs/ExternalApi.md b/clients/python/docs/ExternalApi.md index 262d35c3562..de30ab65db5 100644 --- a/clients/python/docs/ExternalApi.md +++ b/clients/python/docs/ExternalApi.md @@ -6,6 +6,7 @@ Method | HTTP request | Description ------------- | ------------- | ------------- [**create_user_external_principal**](ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user +[**external_login**](ExternalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_external_principal**](ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**list_user_external_principals**](ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -246,6 +247,78 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **external_login** +> AuthenticationToken external_login(external_login_information=external_login_information) + +perform a login using an external authenticator + +### Example + + +```python +import time +import os +import lakefs_sdk +from lakefs_sdk.models.authentication_token import AuthenticationToken +from lakefs_sdk.models.external_login_information import ExternalLoginInformation +from lakefs_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to /api/v1 +# See configuration.py for a list of all supported configuration parameters. +configuration = lakefs_sdk.Configuration( + host = "/api/v1" +) + + +# Enter a context with an instance of the API client +with lakefs_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = lakefs_sdk.ExternalApi(api_client) + external_login_information = lakefs_sdk.ExternalLoginInformation() # ExternalLoginInformation | (optional) + + try: + # perform a login using an external authenticator + api_response = api_instance.external_login(external_login_information=external_login_information) + print("The response of ExternalApi->external_login:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling ExternalApi->external_login: %s\n" % e) +``` + + + +### Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful login | * Set-Cookie -
| +**401** | Unauthorized | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **get_external_principal** > ExternalPrincipal get_external_principal(principal_id) diff --git a/clients/python/lakefs_sdk/api/experimental_api.py b/clients/python/lakefs_sdk/api/experimental_api.py index a1ed0db3368..e7521284a81 100644 --- a/clients/python/lakefs_sdk/api/experimental_api.py +++ b/clients/python/lakefs_sdk/api/experimental_api.py @@ -25,7 +25,9 @@ from typing import Optional from lakefs_sdk.models.abort_presign_multipart_upload import AbortPresignMultipartUpload +from lakefs_sdk.models.authentication_token import AuthenticationToken from lakefs_sdk.models.complete_presign_multipart_upload import CompletePresignMultipartUpload +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList @@ -879,6 +881,152 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri collection_formats=_collection_formats, _request_auth=_params.get('_request_auth')) + @validate_arguments + def external_login(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_login(external_login_information, async_req=True) + >>> result = thread.get() + + :param external_login_information: + :type external_login_information: ExternalLoginInformation + :param async_req: Whether to execute the request asynchronously. + :type async_req: bool, optional + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: Returns the result object. + If the method is called asynchronously, + returns the request thread. + :rtype: AuthenticationToken + """ + kwargs['_return_http_data_only'] = True + if '_preload_content' in kwargs: + raise ValueError("Error! Please call the external_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") + return self.external_login_with_http_info(external_login_information, **kwargs) # noqa: E501 + + @validate_arguments + def external_login_with_http_info(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> ApiResponse: # noqa: E501 + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_login_with_http_info(external_login_information, async_req=True) + >>> result = thread.get() + + :param external_login_information: + :type external_login_information: ExternalLoginInformation + :param async_req: Whether to execute the request asynchronously. + :type async_req: bool, optional + :param _preload_content: if False, the ApiResponse.data will + be set to none and raw_data will store the + HTTP response body without reading/decoding. + Default is True. + :type _preload_content: bool, optional + :param _return_http_data_only: response data instead of ApiResponse + object with status code, headers, etc + :type _return_http_data_only: bool, optional + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the authentication + in the spec for a single request. + :type _request_auth: dict, optional + :type _content_type: string, optional: force content-type for the request + :return: Returns the result object. + If the method is called asynchronously, + returns the request thread. + :rtype: tuple(AuthenticationToken, status_code(int), headers(HTTPHeaderDict)) + """ + + _params = locals() + + _all_params = [ + 'external_login_information' + ] + _all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout', + '_request_auth', + '_content_type', + '_headers' + ] + ) + + # validate the arguments + for _key, _val in _params['kwargs'].items(): + if _key not in _all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method external_login" % _key + ) + _params[_key] = _val + del _params['kwargs'] + + _collection_formats = {} + + # process the path parameters + _path_params = {} + + # process the query parameters + _query_params = [] + # process the header parameters + _header_params = dict(_params.get('_headers', {})) + # process the form parameters + _form_params = [] + _files = {} + # process the body parameter + _body_params = None + if _params['external_login_information'] is not None: + _body_params = _params['external_login_information'] + + # set the HTTP header `Accept` + _header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # set the HTTP header `Content-Type` + _content_types_list = _params.get('_content_type', + self.api_client.select_header_content_type( + ['application/json'])) + if _content_types_list: + _header_params['Content-Type'] = _content_types_list + + # authentication setting + _auth_settings = [] # noqa: E501 + + _response_types_map = { + '200': "AuthenticationToken", + '401': "Error", + '420': None, + } + + return self.api_client.call_api( + '/auth/external/login', 'POST', + _path_params, + _query_params, + _header_params, + body=_body_params, + post_params=_form_params, + files=_files, + response_types_map=_response_types_map, + auth_settings=_auth_settings, + async_req=_params.get('async_req'), + _return_http_data_only=_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=_params.get('_preload_content', True), + _request_timeout=_params.get('_request_timeout'), + collection_formats=_collection_formats, + _request_auth=_params.get('_request_auth')) + @validate_arguments def get_external_principal(self, principal_id : StrictStr, **kwargs) -> ExternalPrincipal: # noqa: E501 """describe external principal by id # noqa: E501 diff --git a/clients/python/lakefs_sdk/api/external_api.py b/clients/python/lakefs_sdk/api/external_api.py index f31d289ba6e..93f2afe1df9 100644 --- a/clients/python/lakefs_sdk/api/external_api.py +++ b/clients/python/lakefs_sdk/api/external_api.py @@ -24,6 +24,8 @@ from typing import Optional +from lakefs_sdk.models.authentication_token import AuthenticationToken +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList @@ -349,6 +351,152 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri collection_formats=_collection_formats, _request_auth=_params.get('_request_auth')) + @validate_arguments + def external_login(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_login(external_login_information, async_req=True) + >>> result = thread.get() + + :param external_login_information: + :type external_login_information: ExternalLoginInformation + :param async_req: Whether to execute the request asynchronously. + :type async_req: bool, optional + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: Returns the result object. + If the method is called asynchronously, + returns the request thread. + :rtype: AuthenticationToken + """ + kwargs['_return_http_data_only'] = True + if '_preload_content' in kwargs: + raise ValueError("Error! Please call the external_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") + return self.external_login_with_http_info(external_login_information, **kwargs) # noqa: E501 + + @validate_arguments + def external_login_with_http_info(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> ApiResponse: # noqa: E501 + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_login_with_http_info(external_login_information, async_req=True) + >>> result = thread.get() + + :param external_login_information: + :type external_login_information: ExternalLoginInformation + :param async_req: Whether to execute the request asynchronously. + :type async_req: bool, optional + :param _preload_content: if False, the ApiResponse.data will + be set to none and raw_data will store the + HTTP response body without reading/decoding. + Default is True. + :type _preload_content: bool, optional + :param _return_http_data_only: response data instead of ApiResponse + object with status code, headers, etc + :type _return_http_data_only: bool, optional + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the authentication + in the spec for a single request. + :type _request_auth: dict, optional + :type _content_type: string, optional: force content-type for the request + :return: Returns the result object. + If the method is called asynchronously, + returns the request thread. + :rtype: tuple(AuthenticationToken, status_code(int), headers(HTTPHeaderDict)) + """ + + _params = locals() + + _all_params = [ + 'external_login_information' + ] + _all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout', + '_request_auth', + '_content_type', + '_headers' + ] + ) + + # validate the arguments + for _key, _val in _params['kwargs'].items(): + if _key not in _all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method external_login" % _key + ) + _params[_key] = _val + del _params['kwargs'] + + _collection_formats = {} + + # process the path parameters + _path_params = {} + + # process the query parameters + _query_params = [] + # process the header parameters + _header_params = dict(_params.get('_headers', {})) + # process the form parameters + _form_params = [] + _files = {} + # process the body parameter + _body_params = None + if _params['external_login_information'] is not None: + _body_params = _params['external_login_information'] + + # set the HTTP header `Accept` + _header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # set the HTTP header `Content-Type` + _content_types_list = _params.get('_content_type', + self.api_client.select_header_content_type( + ['application/json'])) + if _content_types_list: + _header_params['Content-Type'] = _content_types_list + + # authentication setting + _auth_settings = [] # noqa: E501 + + _response_types_map = { + '200': "AuthenticationToken", + '401': "Error", + '420': None, + } + + return self.api_client.call_api( + '/auth/external/login', 'POST', + _path_params, + _query_params, + _header_params, + body=_body_params, + post_params=_form_params, + files=_files, + response_types_map=_response_types_map, + auth_settings=_auth_settings, + async_req=_params.get('async_req'), + _return_http_data_only=_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=_params.get('_preload_content', True), + _request_timeout=_params.get('_request_timeout'), + collection_formats=_collection_formats, + _request_auth=_params.get('_request_auth')) + @validate_arguments def get_external_principal(self, principal_id : StrictStr, **kwargs) -> ExternalPrincipal: # noqa: E501 """describe external principal by id # noqa: E501 diff --git a/clients/python/test/test_experimental_api.py b/clients/python/test/test_experimental_api.py index c9635638b62..56b29c9f620 100644 --- a/clients/python/test/test_experimental_api.py +++ b/clients/python/test/test_experimental_api.py @@ -64,6 +64,13 @@ def test_delete_user_external_principal(self): """ pass + def test_external_login(self): + """Test case for external_login + + perform a login using an external authenticator # noqa: E501 + """ + pass + def test_get_external_principal(self): """Test case for get_external_principal diff --git a/clients/python/test/test_external_api.py b/clients/python/test/test_external_api.py index 946919f1f46..60fa5f01670 100644 --- a/clients/python/test/test_external_api.py +++ b/clients/python/test/test_external_api.py @@ -43,6 +43,13 @@ def test_delete_user_external_principal(self): """ pass + def test_external_login(self): + """Test case for external_login + + perform a login using an external authenticator # noqa: E501 + """ + pass + def test_get_external_principal(self): """Test case for get_external_principal diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index d5950c3374a..3c98d5f35f1 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -1819,6 +1819,8 @@ paths: post: tags: - auth + - external + - experimental operationId: externalLogin summary: perform a login using an external authenticator security: [] From 47ddb2ba1da2776791477ea82aca7d061b23d2f6 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 20 Mar 2024 11:26:19 +0200 Subject: [PATCH 06/33] Fix --- api/authorization.yml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/api/authorization.yml b/api/authorization.yml index f0d4bee307c..5da761296c4 100644 --- a/api/authorization.yml +++ b/api/authorization.yml @@ -11,6 +11,7 @@ servers: security: - jwt_token: [] + - external_auth: [] components: securitySchemes: @@ -18,6 +19,9 @@ components: type: http scheme: bearer bearerFormat: JWT + external_auth: + type: http + scheme: basic parameters: PaginationPrefix: From b09b3038f8671f38df93e86a9ad662cfb9665fef Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 20 Mar 2024 11:36:24 +0200 Subject: [PATCH 07/33] Fix --- api/authorization.yml | 8 - api/swagger.yml | 10 +- clients/java-legacy/README.md | 9 - clients/java-legacy/api/openapi.yaml | 10 - clients/java-legacy/docs/ActionsApi.md | 28 +- clients/java-legacy/docs/AuthApi.md | 240 ++------------ clients/java-legacy/docs/BranchesApi.md | 56 +--- clients/java-legacy/docs/CommitsApi.md | 14 +- clients/java-legacy/docs/ConfigApi.md | 7 +- clients/java-legacy/docs/ExperimentalApi.md | 58 +--- clients/java-legacy/docs/ExternalApi.md | 30 +- clients/java-legacy/docs/ImportApi.md | 21 +- clients/java-legacy/docs/InternalApi.md | 161 ++------- clients/java-legacy/docs/MetadataApi.md | 14 +- clients/java-legacy/docs/ObjectsApi.md | 63 +--- clients/java-legacy/docs/RefsApi.md | 28 +- clients/java-legacy/docs/RepositoriesApi.md | 98 +----- clients/java-legacy/docs/StagingApi.md | 14 +- clients/java-legacy/docs/TagsApi.md | 28 +- .../io/lakefs/clients/api/ActionsApi.java | 8 +- .../java/io/lakefs/clients/api/ApiClient.java | 2 - .../java/io/lakefs/clients/api/AuthApi.java | 76 ++--- .../io/lakefs/clients/api/BranchesApi.java | 16 +- .../io/lakefs/clients/api/CommitsApi.java | 4 +- .../java/io/lakefs/clients/api/ConfigApi.java | 2 +- .../lakefs/clients/api/ExperimentalApi.java | 24 +- .../io/lakefs/clients/api/ExternalApi.java | 16 +- .../java/io/lakefs/clients/api/ImportApi.java | 6 +- .../io/lakefs/clients/api/InternalApi.java | 46 +-- .../io/lakefs/clients/api/MetadataApi.java | 4 +- .../io/lakefs/clients/api/ObjectsApi.java | 18 +- .../java/io/lakefs/clients/api/RefsApi.java | 8 +- .../lakefs/clients/api/RepositoriesApi.java | 28 +- .../io/lakefs/clients/api/StagingApi.java | 4 +- .../java/io/lakefs/clients/api/TagsApi.java | 8 +- clients/java/README.md | 10 - clients/java/api/openapi.yaml | 10 - clients/java/docs/ActionsApi.md | 28 +- clients/java/docs/AuthApi.md | 240 ++------------ clients/java/docs/BranchesApi.md | 56 +--- clients/java/docs/CommitsApi.md | 14 +- clients/java/docs/ConfigApi.md | 7 +- clients/java/docs/ExperimentalApi.md | 58 +--- clients/java/docs/ExternalApi.md | 30 +- clients/java/docs/ImportApi.md | 21 +- clients/java/docs/InternalApi.md | 161 ++------- clients/java/docs/MetadataApi.md | 14 +- clients/java/docs/ObjectsApi.md | 63 +--- clients/java/docs/RefsApi.md | 28 +- clients/java/docs/RepositoriesApi.md | 98 +----- clients/java/docs/StagingApi.md | 14 +- clients/java/docs/TagsApi.md | 28 +- .../io/lakefs/clients/sdk/ActionsApi.java | 8 +- .../java/io/lakefs/clients/sdk/ApiClient.java | 2 - .../java/io/lakefs/clients/sdk/AuthApi.java | 78 ++--- .../io/lakefs/clients/sdk/BranchesApi.java | 16 +- .../io/lakefs/clients/sdk/CommitsApi.java | 4 +- .../java/io/lakefs/clients/sdk/ConfigApi.java | 2 +- .../lakefs/clients/sdk/ExperimentalApi.java | 26 +- .../io/lakefs/clients/sdk/ExternalApi.java | 18 +- .../java/io/lakefs/clients/sdk/ImportApi.java | 6 +- .../io/lakefs/clients/sdk/InternalApi.java | 46 +-- .../io/lakefs/clients/sdk/MetadataApi.java | 4 +- .../io/lakefs/clients/sdk/ObjectsApi.java | 18 +- .../java/io/lakefs/clients/sdk/RefsApi.java | 8 +- .../lakefs/clients/sdk/RepositoriesApi.java | 28 +- .../io/lakefs/clients/sdk/StagingApi.java | 4 +- .../java/io/lakefs/clients/sdk/TagsApi.java | 8 +- clients/python-legacy/README.md | 11 - clients/python-legacy/docs/ActionsApi.md | 36 +- clients/python-legacy/docs/AuthApi.md | 308 ++---------------- clients/python-legacy/docs/BranchesApi.md | 72 +--- clients/python-legacy/docs/CommitsApi.md | 18 +- clients/python-legacy/docs/ConfigApi.md | 9 +- clients/python-legacy/docs/ExperimentalApi.md | 74 +---- clients/python-legacy/docs/ExternalApi.md | 38 +-- clients/python-legacy/docs/ImportApi.md | 27 +- clients/python-legacy/docs/InternalApi.md | 207 ++---------- clients/python-legacy/docs/MetadataApi.md | 18 +- clients/python-legacy/docs/ObjectsApi.md | 81 +---- clients/python-legacy/docs/RefsApi.md | 36 +- clients/python-legacy/docs/RepositoriesApi.md | 126 +------ clients/python-legacy/docs/StagingApi.md | 18 +- clients/python-legacy/docs/TagsApi.md | 36 +- .../lakefs_client/api/actions_api.py | 4 - .../lakefs_client/api/auth_api.py | 34 -- .../lakefs_client/api/branches_api.py | 8 - .../lakefs_client/api/commits_api.py | 2 - .../lakefs_client/api/config_api.py | 1 - .../lakefs_client/api/experimental_api.py | 8 - .../lakefs_client/api/external_api.py | 4 - .../lakefs_client/api/import_api.py | 3 - .../lakefs_client/api/internal_api.py | 23 -- .../lakefs_client/api/metadata_api.py | 2 - .../lakefs_client/api/objects_api.py | 9 - .../lakefs_client/api/refs_api.py | 4 - .../lakefs_client/api/repositories_api.py | 14 - .../lakefs_client/api/staging_api.py | 2 - .../lakefs_client/api/tags_api.py | 4 - .../lakefs_client/configuration.py | 7 - clients/python/README.md | 11 - clients/python/docs/ActionsApi.md | 36 +- clients/python/docs/AuthApi.md | 308 ++---------------- clients/python/docs/BranchesApi.md | 72 +--- clients/python/docs/CommitsApi.md | 18 +- clients/python/docs/ConfigApi.md | 9 +- clients/python/docs/ExperimentalApi.md | 74 +---- clients/python/docs/ExternalApi.md | 38 +-- clients/python/docs/ImportApi.md | 27 +- clients/python/docs/InternalApi.md | 207 ++---------- clients/python/docs/MetadataApi.md | 18 +- clients/python/docs/ObjectsApi.md | 81 +---- clients/python/docs/RefsApi.md | 36 +- clients/python/docs/RepositoriesApi.md | 126 +------ clients/python/docs/StagingApi.md | 18 +- clients/python/docs/TagsApi.md | 36 +- clients/python/lakefs_sdk/api/actions_api.py | 8 +- clients/python/lakefs_sdk/api/auth_api.py | 68 ++-- clients/python/lakefs_sdk/api/branches_api.py | 16 +- clients/python/lakefs_sdk/api/commits_api.py | 4 +- clients/python/lakefs_sdk/api/config_api.py | 2 +- .../python/lakefs_sdk/api/experimental_api.py | 16 +- clients/python/lakefs_sdk/api/external_api.py | 8 +- clients/python/lakefs_sdk/api/import_api.py | 6 +- clients/python/lakefs_sdk/api/internal_api.py | 46 +-- clients/python/lakefs_sdk/api/metadata_api.py | 4 +- clients/python/lakefs_sdk/api/objects_api.py | 18 +- clients/python/lakefs_sdk/api/refs_api.py | 8 +- .../python/lakefs_sdk/api/repositories_api.py | 28 +- clients/python/lakefs_sdk/api/staging_api.py | 4 +- clients/python/lakefs_sdk/api/tags_api.py | 8 +- clients/python/lakefs_sdk/configuration.py | 7 - docs/assets/js/swagger.yml | 10 +- 133 files changed, 897 insertions(+), 4046 deletions(-) diff --git a/api/authorization.yml b/api/authorization.yml index 5da761296c4..e3a48ceaa77 100644 --- a/api/authorization.yml +++ b/api/authorization.yml @@ -11,7 +11,6 @@ servers: security: - jwt_token: [] - - external_auth: [] components: securitySchemes: @@ -19,9 +18,6 @@ components: type: http scheme: bearer bearerFormat: JWT - external_auth: - type: http - scheme: basic parameters: PaginationPrefix: @@ -1242,10 +1238,6 @@ paths: responses: 200: description: successful login - headers: - Set-Cookie: - schema: - type: string content: application/json: schema: diff --git a/api/swagger.yml b/api/swagger.yml index 3c98d5f35f1..9c4d9af488a 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -17,7 +17,7 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] - - external_auth: [] + components: securitySchemes: basic_auth: @@ -39,9 +39,7 @@ components: type: apiKey in: cookie name: saml_auth_session - external_auth: - type: http - scheme: basic + parameters: PaginationPrefix: in: query @@ -1832,10 +1830,6 @@ paths: responses: 200: description: successful login - headers: - Set-Cookie: - schema: - type: string content: application/json: schema: diff --git a/clients/java-legacy/README.md b/clients/java-legacy/README.md index 3f7d7c55120..783d54596f0 100644 --- a/clients/java-legacy/README.md +++ b/clients/java-legacy/README.md @@ -95,11 +95,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -388,10 +383,6 @@ Authentication schemes defined for the API: - **API key parameter name**: internal_auth_session - **Location**: -### external_auth - -- **Type**: HTTP basic authentication - ### jwt_token - **Type**: HTTP basic authentication diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index a3737619dc6..716014a4fce 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -15,7 +15,6 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] -- external_auth: [] paths: /setup_comm_prefs: post: @@ -190,12 +189,6 @@ paths: schema: $ref: '#/components/schemas/AuthenticationToken' description: successful login - headers: - Set-Cookie: - explode: false - schema: - type: string - style: simple "401": content: application/json: @@ -9112,7 +9105,4 @@ components: in: cookie name: saml_auth_session type: apiKey - external_auth: - scheme: basic - type: http diff --git a/clients/java-legacy/docs/ActionsApi.md b/clients/java-legacy/docs/ActionsApi.md index 726300dc465..76e04a9bd9f 100644 --- a/clients/java-legacy/docs/ActionsApi.md +++ b/clients/java-legacy/docs/ActionsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -93,7 +88,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -141,11 +136,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -194,7 +184,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -242,11 +232,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -299,7 +284,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -347,11 +332,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -402,7 +382,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/AuthApi.md b/clients/java-legacy/docs/AuthApi.md index 47d52258b69..3ae2b96b648 100644 --- a/clients/java-legacy/docs/AuthApi.md +++ b/clients/java-legacy/docs/AuthApi.md @@ -74,11 +74,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -124,7 +119,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -172,11 +167,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -222,7 +212,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -270,11 +260,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -320,7 +305,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -368,11 +353,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -417,7 +397,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -465,11 +445,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -514,7 +489,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -562,11 +537,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -611,7 +581,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -660,11 +630,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -709,7 +674,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -758,11 +723,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -810,7 +770,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -859,11 +819,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -909,7 +864,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -957,11 +912,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1005,7 +955,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1053,11 +1003,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1103,7 +1048,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1151,11 +1096,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1199,7 +1139,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1247,11 +1187,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1295,7 +1230,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1343,11 +1278,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1393,7 +1323,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1441,11 +1371,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1491,7 +1416,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1539,11 +1464,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1589,7 +1509,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1663,7 +1583,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | * Set-Cookie -
| +**200** | successful login | - | **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -1700,11 +1620,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1751,7 +1666,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1799,11 +1714,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1844,7 +1754,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1888,11 +1798,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1937,7 +1842,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1985,11 +1890,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2034,7 +1934,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2082,11 +1982,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2131,7 +2026,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2179,11 +2074,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2228,7 +2118,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2276,11 +2166,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2325,7 +2210,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2373,11 +2258,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2428,7 +2308,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2475,11 +2355,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2530,7 +2405,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2578,11 +2453,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2631,7 +2501,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2678,11 +2548,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2731,7 +2596,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2778,11 +2643,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2833,7 +2693,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2881,11 +2741,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2936,7 +2791,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2984,11 +2839,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3039,7 +2889,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3087,11 +2937,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3144,7 +2989,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3192,11 +3037,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3245,7 +3085,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3355,11 +3195,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3405,7 +3240,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3453,11 +3288,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3504,7 +3334,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/BranchesApi.md b/clients/java-legacy/docs/BranchesApi.md index 5a0d52c2970..c1a1fc02597 100644 --- a/clients/java-legacy/docs/BranchesApi.md +++ b/clients/java-legacy/docs/BranchesApi.md @@ -46,11 +46,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -99,7 +94,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -150,11 +145,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -201,7 +191,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -252,11 +242,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -304,7 +289,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -353,11 +338,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -412,7 +392,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -460,11 +440,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -511,7 +486,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -559,11 +534,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -614,7 +584,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -662,11 +632,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -714,7 +679,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -764,11 +729,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -816,7 +776,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/CommitsApi.md b/clients/java-legacy/docs/CommitsApi.md index 8c0ca61a9aa..904969f3f78 100644 --- a/clients/java-legacy/docs/CommitsApi.md +++ b/clients/java-legacy/docs/CommitsApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -95,7 +90,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -147,11 +142,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -198,7 +188,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ConfigApi.md b/clients/java-legacy/docs/ConfigApi.md index fe09a955ca2..df872aca7ca 100644 --- a/clients/java-legacy/docs/ConfigApi.md +++ b/clients/java-legacy/docs/ConfigApi.md @@ -41,11 +41,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -86,7 +81,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ExperimentalApi.md b/clients/java-legacy/docs/ExperimentalApi.md index 2f77eb53ca5..898b5caa7c1 100644 --- a/clients/java-legacy/docs/ExperimentalApi.md +++ b/clients/java-legacy/docs/ExperimentalApi.md @@ -49,11 +49,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -105,7 +100,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -156,11 +151,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -213,7 +203,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -265,11 +255,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -320,7 +305,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -369,11 +354,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -421,7 +401,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -470,11 +450,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -520,7 +495,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -594,7 +569,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | * Set-Cookie -
| +**200** | successful login | - | **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -631,11 +606,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -680,7 +650,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -730,11 +700,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -784,7 +749,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -834,11 +799,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -889,7 +849,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ExternalApi.md b/clients/java-legacy/docs/ExternalApi.md index 67cd119ced8..56880fe0bc8 100644 --- a/clients/java-legacy/docs/ExternalApi.md +++ b/clients/java-legacy/docs/ExternalApi.md @@ -43,11 +43,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -95,7 +90,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -144,11 +139,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -194,7 +184,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -268,7 +258,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | * Set-Cookie -
| +**200** | successful login | - | **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -305,11 +295,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -354,7 +339,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -402,11 +387,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -457,7 +437,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ImportApi.md b/clients/java-legacy/docs/ImportApi.md index 8af8426b06b..89e2170feef 100644 --- a/clients/java-legacy/docs/ImportApi.md +++ b/clients/java-legacy/docs/ImportApi.md @@ -41,11 +41,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -93,7 +88,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -143,11 +138,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -196,7 +186,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -246,11 +236,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -299,7 +284,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/InternalApi.md b/clients/java-legacy/docs/InternalApi.md index 5bb12bca642..fce1503b632 100644 --- a/clients/java-legacy/docs/InternalApi.md +++ b/clients/java-legacy/docs/InternalApi.md @@ -65,11 +65,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -113,7 +108,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -162,11 +157,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -212,7 +202,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -262,11 +252,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -315,7 +300,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -365,11 +350,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -415,7 +395,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -462,11 +442,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -511,7 +486,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -620,11 +595,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -665,7 +635,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -712,11 +682,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -757,7 +722,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -862,11 +827,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -907,7 +867,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -952,11 +912,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -997,7 +952,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1046,11 +1001,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1096,7 +1046,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1144,11 +1094,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1194,7 +1139,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1242,11 +1187,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1290,7 +1230,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1338,11 +1278,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1387,7 +1322,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1435,11 +1370,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1484,7 +1414,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1532,11 +1462,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1582,7 +1507,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1630,11 +1555,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1678,7 +1598,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1726,11 +1646,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1775,7 +1690,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1824,11 +1739,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1875,7 +1785,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1925,11 +1835,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1975,7 +1880,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2024,11 +1929,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2072,7 +1972,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2122,11 +2022,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2172,7 +2067,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2347,11 +2242,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2402,7 +2292,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2452,11 +2342,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2504,7 +2389,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/MetadataApi.md b/clients/java-legacy/docs/MetadataApi.md index 1d0fbd9b1bc..77e7a4d2445 100644 --- a/clients/java-legacy/docs/MetadataApi.md +++ b/clients/java-legacy/docs/MetadataApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -91,7 +86,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -139,11 +134,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -190,7 +180,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ObjectsApi.md b/clients/java-legacy/docs/ObjectsApi.md index 98a58a5766e..763634236bc 100644 --- a/clients/java-legacy/docs/ObjectsApi.md +++ b/clients/java-legacy/docs/ObjectsApi.md @@ -47,11 +47,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -102,7 +97,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -152,11 +147,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -206,7 +196,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -255,11 +245,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -310,7 +295,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -359,11 +344,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -418,7 +398,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -471,11 +451,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -524,7 +499,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -572,11 +547,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -626,7 +596,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -677,11 +647,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -740,7 +705,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -788,11 +753,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -845,7 +805,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -895,11 +855,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -956,7 +911,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/RefsApi.md b/clients/java-legacy/docs/RefsApi.md index 71103ec7415..944f4b55ee3 100644 --- a/clients/java-legacy/docs/RefsApi.md +++ b/clients/java-legacy/docs/RefsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -105,7 +100,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -153,11 +148,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -206,7 +196,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -255,11 +245,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -322,7 +307,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -370,11 +355,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -425,7 +405,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/RepositoriesApi.md b/clients/java-legacy/docs/RepositoriesApi.md index 53242d7cf58..c34ec869b6d 100644 --- a/clients/java-legacy/docs/RepositoriesApi.md +++ b/clients/java-legacy/docs/RepositoriesApi.md @@ -52,11 +52,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -103,7 +98,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -152,11 +147,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -200,7 +190,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -249,11 +239,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -299,7 +284,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -347,11 +332,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -398,7 +378,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -447,11 +427,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -496,7 +471,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -544,11 +519,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -593,7 +563,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -641,11 +611,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -690,7 +655,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -738,11 +703,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -787,7 +747,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -835,11 +795,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -884,7 +839,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -932,11 +887,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -985,7 +935,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1032,11 +982,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1083,7 +1028,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1132,11 +1077,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1183,7 +1123,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1232,11 +1172,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1284,7 +1219,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1335,11 +1270,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1385,7 +1315,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/StagingApi.md b/clients/java-legacy/docs/StagingApi.md index 92326ebd310..6aa4318f66c 100644 --- a/clients/java-legacy/docs/StagingApi.md +++ b/clients/java-legacy/docs/StagingApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -95,7 +90,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -145,11 +140,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -202,7 +192,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/TagsApi.md b/clients/java-legacy/docs/TagsApi.md index 22517d33cdf..97b0228b8d7 100644 --- a/clients/java-legacy/docs/TagsApi.md +++ b/clients/java-legacy/docs/TagsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -93,7 +88,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -144,11 +139,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -196,7 +186,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -245,11 +235,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -296,7 +281,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -344,11 +329,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -399,7 +379,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java index a95e043aef6..5162d6e42a7 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java @@ -103,7 +103,7 @@ public okhttp3.Call getRunCall(String repository, String runId, final ApiCallbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -243,7 +243,7 @@ public okhttp3.Call getRunHookOutputCall(String repository, String runId, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -407,7 +407,7 @@ public okhttp3.Call listRepositoryRunsCall(String repository, String after, Inte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -559,7 +559,7 @@ public okhttp3.Call listRunHooksCall(String repository, String runId, String aft final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java index 79855c2c184..d469b38e79c 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java @@ -88,7 +88,6 @@ public ApiClient() { // Setup authentications (key: authentication name, value: authentication). authentications.put("basic_auth", new HttpBasicAuth()); authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); - authentications.put("external_auth", new HttpBasicAuth()); authentications.put("jwt_token", new HttpBearerAuth("bearer")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); @@ -107,7 +106,6 @@ public ApiClient(OkHttpClient client) { // Setup authentications (key: authentication name, value: authentication). authentications.put("basic_auth", new HttpBasicAuth()); authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); - authentications.put("external_auth", new HttpBasicAuth()); authentications.put("jwt_token", new HttpBearerAuth("bearer")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java index e1cc6c665e4..6dc44ee99aa 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java @@ -119,7 +119,7 @@ public okhttp3.Call addGroupMembershipCall(String groupId, String userId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -253,7 +253,7 @@ public okhttp3.Call attachPolicyToGroupCall(String groupId, String policyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -387,7 +387,7 @@ public okhttp3.Call attachPolicyToUserCall(String userId, String policyId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -519,7 +519,7 @@ public okhttp3.Call createCredentialsCall(String userId, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -646,7 +646,7 @@ public okhttp3.Call createGroupCall(GroupCreation groupCreation, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -769,7 +769,7 @@ public okhttp3.Call createPolicyCall(Policy policy, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -900,7 +900,7 @@ public okhttp3.Call createUserCall(UserCreation userCreation, final ApiCallback final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1033,7 +1033,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1173,7 +1173,7 @@ public okhttp3.Call deleteCredentialsCall(String userId, String accessKeyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1305,7 +1305,7 @@ public okhttp3.Call deleteGroupCall(String groupId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1431,7 +1431,7 @@ public okhttp3.Call deleteGroupMembershipCall(String groupId, String userId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1563,7 +1563,7 @@ public okhttp3.Call deletePolicyCall(String policyId, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1687,7 +1687,7 @@ public okhttp3.Call deleteUserCall(String userId, final ApiCallback _callback) t final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1816,7 +1816,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1950,7 +1950,7 @@ public okhttp3.Call detachPolicyFromGroupCall(String groupId, String policyId, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2084,7 +2084,7 @@ public okhttp3.Call detachPolicyFromUserCall(String userId, String policyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2182,7 +2182,7 @@ public okhttp3.Call detachPolicyFromUserAsync(String userId, String policyId, fi * @http.response.details - + @@ -2236,7 +2236,7 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -2256,7 +2256,7 @@ public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -2278,7 +2278,7 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -2336,7 +2336,7 @@ public okhttp3.Call getCredentialsCall(String userId, String accessKeyId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2466,7 +2466,7 @@ public okhttp3.Call getCurrentUserCall(final ApiCallback _callback) throws ApiEx final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2577,7 +2577,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2705,7 +2705,7 @@ public okhttp3.Call getGroupCall(String groupId, final ApiCallback _callback) th final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2833,7 +2833,7 @@ public okhttp3.Call getGroupACLCall(String groupId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2961,7 +2961,7 @@ public okhttp3.Call getPolicyCall(String policyId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3089,7 +3089,7 @@ public okhttp3.Call getUserCall(String userId, final ApiCallback _callback) thro final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3231,7 +3231,7 @@ public okhttp3.Call listGroupMembersCall(String groupId, String prefix, String a final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3380,7 +3380,7 @@ public okhttp3.Call listGroupPoliciesCall(String groupId, String prefix, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3529,7 +3529,7 @@ public okhttp3.Call listGroupsCall(String prefix, String after, Integer amount, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3667,7 +3667,7 @@ public okhttp3.Call listPoliciesCall(String prefix, String after, Integer amount final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3808,7 +3808,7 @@ public okhttp3.Call listUserCredentialsCall(String userId, String prefix, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3960,7 +3960,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4112,7 +4112,7 @@ public okhttp3.Call listUserGroupsCall(String userId, String prefix, String afte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4269,7 +4269,7 @@ public okhttp3.Call listUserPoliciesCall(String userId, String prefix, String af final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4421,7 +4421,7 @@ public okhttp3.Call listUsersCall(String prefix, String after, Integer amount, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4666,7 +4666,7 @@ public okhttp3.Call setGroupACLCall(String groupId, ACL ACL, final ApiCallback _ final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4800,7 +4800,7 @@ public okhttp3.Call updatePolicyCall(String policyId, Policy policy, final ApiCa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java index fc8ae5809ef..a72c0b7cf50 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java @@ -111,7 +111,7 @@ public okhttp3.Call cherryPickCall(String repository, String branch, CherryPickC final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -268,7 +268,7 @@ public okhttp3.Call createBranchCall(String repository, BranchCreation branchCre final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -421,7 +421,7 @@ public okhttp3.Call deleteBranchCall(String repository, String branch, Boolean f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -581,7 +581,7 @@ public okhttp3.Call diffBranchCall(String repository, String branch, String afte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -731,7 +731,7 @@ public okhttp3.Call getBranchCall(String repository, String branch, final ApiCal final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -882,7 +882,7 @@ public okhttp3.Call listBranchesCall(String repository, String prefix, String af final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1024,7 +1024,7 @@ public okhttp3.Call resetBranchCall(String repository, String branch, ResetCreat final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1176,7 +1176,7 @@ public okhttp3.Call revertBranchCall(String repository, String branch, RevertCre final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java index 81e2441bea5..23f464975fe 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java @@ -111,7 +111,7 @@ public okhttp3.Call commitCall(String repository, String branch, CommitCreation final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -272,7 +272,7 @@ public okhttp3.Call getCommitCall(String repository, String commitId, final ApiC final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java index ce12a7223e0..db1b298eed7 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java @@ -93,7 +93,7 @@ public okhttp3.Call getConfigCall(final ApiCallback _callback) throws ApiExcepti final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java index c1f4fcba196..8315b7ee639 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java @@ -118,7 +118,7 @@ public okhttp3.Call abortPresignMultipartUploadCall(String repository, String br final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -284,7 +284,7 @@ public okhttp3.Call completePresignMultipartUploadCall(String repository, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -458,7 +458,7 @@ public okhttp3.Call createPresignMultipartUploadCall(String repository, String b final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -615,7 +615,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -758,7 +758,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -856,7 +856,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -910,7 +910,7 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -930,7 +930,7 @@ public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -952,7 +952,7 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1011,7 +1011,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1153,7 +1153,7 @@ public okhttp3.Call hardResetBranchCall(String repository, String branch, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1317,7 +1317,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java index bc691480381..8106bd7336a 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java @@ -109,7 +109,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -252,7 +252,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -350,7 +350,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -404,7 +404,7 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -424,7 +424,7 @@ public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -446,7 +446,7 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -505,7 +505,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -648,7 +648,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java index 28a1367ed49..1116f52effa 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java @@ -109,7 +109,7 @@ public okhttp3.Call importCancelCall(String repository, String branch, String id final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -260,7 +260,7 @@ public okhttp3.Call importStartCall(String repository, String branch, ImportCrea final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -417,7 +417,7 @@ public okhttp3.Call importStatusCall(String repository, String branch, String id final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java index 1397b85d503..d041c92b55d 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java @@ -122,7 +122,7 @@ public okhttp3.Call createBranchProtectionRulePreflightCall(String repository, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -252,7 +252,7 @@ public okhttp3.Call createCommitRecordCall(String repository, CommitRecordCreati final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -397,7 +397,7 @@ public okhttp3.Call createSymlinkFileCall(String repository, String branch, Stri final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -536,7 +536,7 @@ public okhttp3.Call deleteRepositoryMetadataCall(String repository, RepositoryMe final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -666,7 +666,7 @@ public okhttp3.Call dumpRefsCall(String repository, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -902,7 +902,7 @@ public okhttp3.Call getGarbageCollectionConfigCall(final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1010,7 +1010,7 @@ public okhttp3.Call getLakeFSVersionCall(final ApiCallback _callback) throws Api final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1235,7 +1235,7 @@ public okhttp3.Call getStorageConfigCall(final ApiCallback _callback) throws Api final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1352,7 +1352,7 @@ public okhttp3.Call getUsageReportSummaryCall(final ApiCallback _callback) throw final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1478,7 +1478,7 @@ public okhttp3.Call internalCreateBranchProtectionRuleCall(String repository, Br final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1620,7 +1620,7 @@ public okhttp3.Call internalDeleteBranchProtectionRuleCall(String repository, In final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1761,7 +1761,7 @@ public okhttp3.Call internalDeleteGarbageCollectionRulesCall(String repository, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1894,7 +1894,7 @@ public okhttp3.Call internalGetBranchProtectionRulesCall(String repository, fina final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2031,7 +2031,7 @@ public okhttp3.Call internalGetGarbageCollectionRulesCall(String repository, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2169,7 +2169,7 @@ public okhttp3.Call internalSetGarbageCollectionRulesCall(String repository, Gar final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2307,7 +2307,7 @@ public okhttp3.Call postStatsEventsCall(StatsEventsList statsEventsList, final A final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2432,7 +2432,7 @@ public okhttp3.Call prepareGarbageCollectionCommitsCall(String repository, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2566,7 +2566,7 @@ public okhttp3.Call prepareGarbageCollectionUncommittedCall(String repository, P final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2705,7 +2705,7 @@ public okhttp3.Call restoreRefsCall(String repository, RefsRestore refsRestore, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2840,7 +2840,7 @@ public okhttp3.Call setGarbageCollectionRulesPreflightCall(String repository, fi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2965,7 +2965,7 @@ public okhttp3.Call setRepositoryMetadataCall(String repository, RepositoryMetad final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3359,7 +3359,7 @@ public okhttp3.Call stageObjectCall(String repository, String branch, String pat final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3532,7 +3532,7 @@ public okhttp3.Call uploadObjectPreflightCall(String repository, String branch, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java index 526d9c08ef9..86315a5d54f 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java @@ -100,7 +100,7 @@ public okhttp3.Call getMetaRangeCall(String repository, String metaRange, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -238,7 +238,7 @@ public okhttp3.Call getRangeCall(String repository, String range, final ApiCallb final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java index c391522decd..1c3ae1d2a52 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java @@ -114,7 +114,7 @@ public okhttp3.Call copyObjectCall(String repository, String branch, String dest final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -285,7 +285,7 @@ public okhttp3.Call deleteObjectCall(String repository, String branch, String pa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -440,7 +440,7 @@ public okhttp3.Call deleteObjectsCall(String repository, String branch, PathList final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -617,7 +617,7 @@ public okhttp3.Call getObjectCall(String repository, String ref, String path, St final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -792,7 +792,7 @@ public okhttp3.Call getUnderlyingPropertiesCall(String repository, String ref, S final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -951,7 +951,7 @@ public okhttp3.Call headObjectCall(String repository, String ref, String path, S final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "HEAD", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1135,7 +1135,7 @@ public okhttp3.Call listObjectsCall(String repository, String ref, Boolean userM final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1308,7 +1308,7 @@ public okhttp3.Call statObjectCall(String repository, String ref, String path, B final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1494,7 +1494,7 @@ public okhttp3.Call uploadObjectCall(String repository, String branch, String pa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java index 67396ac0994..026a3bb1b74 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java @@ -132,7 +132,7 @@ public okhttp3.Call diffRefsCall(String repository, String leftRef, String right final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -296,7 +296,7 @@ public okhttp3.Call findMergeBaseCall(String repository, String sourceRef, Strin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -485,7 +485,7 @@ public okhttp3.Call logCommitsCall(String repository, String ref, String after, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -654,7 +654,7 @@ public okhttp3.Call mergeIntoBranchCall(String repository, String sourceRef, Str final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java index 18263469246..a2c19552453 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java @@ -111,7 +111,7 @@ public okhttp3.Call createRepositoryCall(RepositoryCreation repositoryCreation, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -246,7 +246,7 @@ public okhttp3.Call deleteGCRulesCall(String repository, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -378,7 +378,7 @@ public okhttp3.Call deleteRepositoryCall(String repository, Boolean force, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -511,7 +511,7 @@ public okhttp3.Call dumpStatusCall(String repository, String taskId, final ApiCa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -650,7 +650,7 @@ public okhttp3.Call dumpSubmitCall(String repository, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -778,7 +778,7 @@ public okhttp3.Call getBranchProtectionRulesCall(String repository, final ApiCal final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -906,7 +906,7 @@ public okhttp3.Call getGCRulesCall(String repository, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1034,7 +1034,7 @@ public okhttp3.Call getRepositoryCall(String repository, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1162,7 +1162,7 @@ public okhttp3.Call getRepositoryMetadataCall(String repository, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1302,7 +1302,7 @@ public okhttp3.Call listRepositoriesCall(String prefix, String after, Integer am final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1434,7 +1434,7 @@ public okhttp3.Call restoreStatusCall(String repository, String taskId, final Ap final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1575,7 +1575,7 @@ public okhttp3.Call restoreSubmitCall(String repository, RefsRestore refsRestore final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1723,7 +1723,7 @@ public okhttp3.Call setBranchProtectionRulesCall(String repository, List -### external_auth - -- **Type**: HTTP basic authentication - ## Recommendation diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index 8b2c7993778..0007b5f3d8c 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -15,7 +15,6 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] -- external_auth: [] paths: /setup_comm_prefs: post: @@ -190,12 +189,6 @@ paths: schema: $ref: '#/components/schemas/AuthenticationToken' description: successful login - headers: - Set-Cookie: - explode: false - schema: - type: string - style: simple "401": content: application/json: @@ -9087,7 +9080,4 @@ components: in: cookie name: saml_auth_session type: apiKey - external_auth: - scheme: basic - type: http diff --git a/clients/java/docs/ActionsApi.md b/clients/java/docs/ActionsApi.md index 4999927c8a0..7e7b850c96f 100644 --- a/clients/java/docs/ActionsApi.md +++ b/clients/java/docs/ActionsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -94,7 +89,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -142,11 +137,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -196,7 +186,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -244,11 +234,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -306,7 +291,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -354,11 +339,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -412,7 +392,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/AuthApi.md b/clients/java/docs/AuthApi.md index e5659b16cfe..b0fc7bd6f9b 100644 --- a/clients/java/docs/AuthApi.md +++ b/clients/java/docs/AuthApi.md @@ -74,11 +74,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -125,7 +120,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -173,11 +168,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -224,7 +214,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -272,11 +262,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -323,7 +308,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -371,11 +356,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -421,7 +401,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -469,11 +449,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -520,7 +495,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -568,11 +543,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -618,7 +588,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -667,11 +637,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -718,7 +683,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -767,11 +732,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -821,7 +781,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -870,11 +830,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -921,7 +876,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -969,11 +924,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1018,7 +968,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1066,11 +1016,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1117,7 +1062,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1165,11 +1110,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1214,7 +1154,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1262,11 +1202,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1311,7 +1246,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1359,11 +1294,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1410,7 +1340,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1458,11 +1388,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1509,7 +1434,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1557,11 +1482,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1608,7 +1528,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1684,7 +1604,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -| **200** | successful login | * Set-Cookie -
| +| **200** | successful login | - | | **401** | Unauthorized | - | | **420** | too many requests | - | | **0** | Internal Server Error | - | @@ -1721,11 +1641,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1773,7 +1688,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1821,11 +1736,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1867,7 +1777,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1911,11 +1821,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1961,7 +1866,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2009,11 +1914,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2059,7 +1959,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2107,11 +2007,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2157,7 +2052,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2205,11 +2100,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2255,7 +2145,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2303,11 +2193,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2353,7 +2238,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2401,11 +2286,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2460,7 +2340,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2507,11 +2387,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2566,7 +2441,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2614,11 +2489,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2671,7 +2541,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2718,11 +2588,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2775,7 +2640,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2822,11 +2687,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2881,7 +2741,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2929,11 +2789,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2988,7 +2843,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3036,11 +2891,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3095,7 +2945,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3143,11 +2993,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3205,7 +3050,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3253,11 +3098,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3310,7 +3150,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3422,11 +3262,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3473,7 +3308,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3521,11 +3356,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3573,7 +3403,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/BranchesApi.md b/clients/java/docs/BranchesApi.md index dc939c30521..7f46857e87b 100644 --- a/clients/java/docs/BranchesApi.md +++ b/clients/java/docs/BranchesApi.md @@ -46,11 +46,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -100,7 +95,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -151,11 +146,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -203,7 +193,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -254,11 +244,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -308,7 +293,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -357,11 +342,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -421,7 +401,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -469,11 +449,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -521,7 +496,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -569,11 +544,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -628,7 +598,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -676,11 +646,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -729,7 +694,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -779,11 +744,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -832,7 +792,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/CommitsApi.md b/clients/java/docs/CommitsApi.md index 4b6beda5ce9..a60dae05893 100644 --- a/clients/java/docs/CommitsApi.md +++ b/clients/java/docs/CommitsApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -97,7 +92,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -149,11 +144,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -201,7 +191,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ConfigApi.md b/clients/java/docs/ConfigApi.md index 43497bd9217..e629af1eb17 100644 --- a/clients/java/docs/ConfigApi.md +++ b/clients/java/docs/ConfigApi.md @@ -41,11 +41,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -87,7 +82,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ExperimentalApi.md b/clients/java/docs/ExperimentalApi.md index 48145a02814..9c129de5ed9 100644 --- a/clients/java/docs/ExperimentalApi.md +++ b/clients/java/docs/ExperimentalApi.md @@ -49,11 +49,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -107,7 +102,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -158,11 +153,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -217,7 +207,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -269,11 +259,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -326,7 +311,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -375,11 +360,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -429,7 +409,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -478,11 +458,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -529,7 +504,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -605,7 +580,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -| **200** | successful login | * Set-Cookie -
| +| **200** | successful login | - | | **401** | Unauthorized | - | | **420** | too many requests | - | | **0** | Internal Server Error | - | @@ -642,11 +617,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -692,7 +662,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -742,11 +712,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -798,7 +763,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -848,11 +813,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -907,7 +867,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ExternalApi.md b/clients/java/docs/ExternalApi.md index 782e25a75e9..19385224cac 100644 --- a/clients/java/docs/ExternalApi.md +++ b/clients/java/docs/ExternalApi.md @@ -43,11 +43,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -97,7 +92,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -146,11 +141,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -197,7 +187,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -273,7 +263,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -| **200** | successful login | * Set-Cookie -
| +| **200** | successful login | - | | **401** | Unauthorized | - | | **420** | too many requests | - | | **0** | Internal Server Error | - | @@ -310,11 +300,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -360,7 +345,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -408,11 +393,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -467,7 +447,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ImportApi.md b/clients/java/docs/ImportApi.md index c1c79fda81d..625bcd954ca 100644 --- a/clients/java/docs/ImportApi.md +++ b/clients/java/docs/ImportApi.md @@ -41,11 +41,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -94,7 +89,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -144,11 +139,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -198,7 +188,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -248,11 +238,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -302,7 +287,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/InternalApi.md b/clients/java/docs/InternalApi.md index 06f90ffc466..2298ca6a769 100644 --- a/clients/java/docs/InternalApi.md +++ b/clients/java/docs/InternalApi.md @@ -65,11 +65,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -114,7 +109,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -163,11 +158,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -214,7 +204,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -264,11 +254,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -319,7 +304,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -369,11 +354,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -420,7 +400,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -467,11 +447,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -517,7 +492,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -627,11 +602,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -673,7 +643,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -720,11 +690,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -766,7 +731,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -872,11 +837,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -918,7 +878,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -963,11 +923,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1009,7 +964,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1058,11 +1013,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1109,7 +1059,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1157,11 +1107,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1208,7 +1153,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1256,11 +1201,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1305,7 +1245,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1353,11 +1293,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1403,7 +1338,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1451,11 +1386,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1501,7 +1431,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1549,11 +1479,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1600,7 +1525,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1648,11 +1573,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1697,7 +1617,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1745,11 +1665,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1795,7 +1710,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1844,11 +1759,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1897,7 +1807,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1947,11 +1857,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1998,7 +1903,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2047,11 +1952,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2096,7 +1996,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2146,11 +2046,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2197,7 +2092,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2374,11 +2269,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2430,7 +2320,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2480,11 +2370,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2533,7 +2418,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/MetadataApi.md b/clients/java/docs/MetadataApi.md index 490ae7f07a0..07a12c74861 100644 --- a/clients/java/docs/MetadataApi.md +++ b/clients/java/docs/MetadataApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -92,7 +87,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -140,11 +135,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -192,7 +182,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ObjectsApi.md b/clients/java/docs/ObjectsApi.md index 8b03c9a24e1..d441235e74e 100644 --- a/clients/java/docs/ObjectsApi.md +++ b/clients/java/docs/ObjectsApi.md @@ -47,11 +47,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -103,7 +98,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -153,11 +148,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -209,7 +199,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -258,11 +248,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -315,7 +300,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -364,11 +349,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -427,7 +407,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -480,11 +460,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -534,7 +509,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -582,11 +557,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -638,7 +608,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -689,11 +659,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -759,7 +724,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -807,11 +772,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -867,7 +827,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -917,11 +877,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -983,7 +938,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/RefsApi.md b/clients/java/docs/RefsApi.md index 65da1b9e973..36100c42bf4 100644 --- a/clients/java/docs/RefsApi.md +++ b/clients/java/docs/RefsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -111,7 +106,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -159,11 +154,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -213,7 +203,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -262,11 +252,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -338,7 +323,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -386,11 +371,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -443,7 +423,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/RepositoriesApi.md b/clients/java/docs/RepositoriesApi.md index cb8559cf7db..664fcc4ef43 100644 --- a/clients/java/docs/RepositoriesApi.md +++ b/clients/java/docs/RepositoriesApi.md @@ -52,11 +52,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -105,7 +100,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -154,11 +149,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -203,7 +193,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -252,11 +242,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -304,7 +289,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -352,11 +337,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -404,7 +384,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -453,11 +433,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -503,7 +478,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -551,11 +526,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -601,7 +571,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -649,11 +619,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -699,7 +664,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -747,11 +712,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -797,7 +757,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -845,11 +805,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -895,7 +850,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -943,11 +898,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1000,7 +950,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1047,11 +997,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1099,7 +1044,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1148,11 +1093,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1200,7 +1140,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1249,11 +1189,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1303,7 +1238,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1354,11 +1289,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1405,7 +1335,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/StagingApi.md b/clients/java/docs/StagingApi.md index ff9c5c864b0..922fab5d459 100644 --- a/clients/java/docs/StagingApi.md +++ b/clients/java/docs/StagingApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -97,7 +92,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -147,11 +142,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -206,7 +196,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/TagsApi.md b/clients/java/docs/TagsApi.md index 0129047289b..0fb60d7a48f 100644 --- a/clients/java/docs/TagsApi.md +++ b/clients/java/docs/TagsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -94,7 +89,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -145,11 +140,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -199,7 +189,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -248,11 +238,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -300,7 +285,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -348,11 +333,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -407,7 +387,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java index a912a91f951..3dba7a7a802 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java @@ -118,7 +118,7 @@ private okhttp3.Call getRunCall(String repository, String runId, final ApiCallba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -301,7 +301,7 @@ private okhttp3.Call getRunHookOutputCall(String repository, String runId, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -505,7 +505,7 @@ private okhttp3.Call listRepositoryRunsCall(String repository, String after, Int localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -730,7 +730,7 @@ private okhttp3.Call listRunHooksCall(String repository, String runId, String af localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java index f9b3e2e6cc6..38fd1cbfcd2 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java @@ -104,7 +104,6 @@ public ApiClient() { authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); - authentications.put("external_auth", new HttpBasicAuth()); // Prevent the authentications from being modified. authentications = Collections.unmodifiableMap(authentications); } @@ -125,7 +124,6 @@ public ApiClient(OkHttpClient client) { authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); - authentications.put("external_auth", new HttpBasicAuth()); // Prevent the authentications from being modified. authentications = Collections.unmodifiableMap(authentications); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java index 9475c4e37bb..ce7f089c786 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java @@ -134,7 +134,7 @@ private okhttp3.Call addGroupMembershipCall(String groupId, String userId, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -311,7 +311,7 @@ private okhttp3.Call attachPolicyToGroupCall(String groupId, String policyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -488,7 +488,7 @@ private okhttp3.Call attachPolicyToUserCall(String userId, String policyId, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -664,7 +664,7 @@ private okhttp3.Call createCredentialsCall(String userId, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -836,7 +836,7 @@ private okhttp3.Call createGroupCall(GroupCreation groupCreation, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1011,7 +1011,7 @@ private okhttp3.Call createPolicyCall(Policy policy, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1188,7 +1188,7 @@ private okhttp3.Call createUserCall(UserCreation userCreation, final ApiCallback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1373,7 +1373,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1566,7 +1566,7 @@ private okhttp3.Call deleteCredentialsCall(String userId, String accessKeyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1742,7 +1742,7 @@ private okhttp3.Call deleteGroupCall(String groupId, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1911,7 +1911,7 @@ private okhttp3.Call deleteGroupMembershipCall(String groupId, String userId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2087,7 +2087,7 @@ private okhttp3.Call deletePolicyCall(String policyId, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2255,7 +2255,7 @@ private okhttp3.Call deleteUserCall(String userId, final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2427,7 +2427,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2604,7 +2604,7 @@ private okhttp3.Call detachPolicyFromGroupCall(String groupId, String policyId, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2781,7 +2781,7 @@ private okhttp3.Call detachPolicyFromUserCall(String userId, String policyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3006,7 +3006,7 @@ public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -3023,7 +3023,7 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -3041,7 +3041,7 @@ public AuthenticationToken execute() throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -3059,7 +3059,7 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -3077,7 +3077,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callbac * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -3128,7 +3128,7 @@ private okhttp3.Call getCredentialsCall(String userId, String accessKeyId, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3307,7 +3307,7 @@ private okhttp3.Call getCurrentUserCall(final ApiCallback _callback) throws ApiE localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3454,7 +3454,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3626,7 +3626,7 @@ private okhttp3.Call getGroupCall(String groupId, final ApiCallback _callback) t localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3798,7 +3798,7 @@ private okhttp3.Call getGroupACLCall(String groupId, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3970,7 +3970,7 @@ private okhttp3.Call getPolicyCall(String policyId, final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4142,7 +4142,7 @@ private okhttp3.Call getUserCall(String userId, final ApiCallback _callback) thr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4326,7 +4326,7 @@ private okhttp3.Call listGroupMembersCall(String groupId, String prefix, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4538,7 +4538,7 @@ private okhttp3.Call listGroupPoliciesCall(String groupId, String prefix, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4754,7 +4754,7 @@ private okhttp3.Call listGroupsCall(String prefix, String after, Integer amount, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4957,7 +4957,7 @@ private okhttp3.Call listPoliciesCall(String prefix, String after, Integer amoun localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5161,7 +5161,7 @@ private okhttp3.Call listUserCredentialsCall(String userId, String prefix, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5378,7 +5378,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5595,7 +5595,7 @@ private okhttp3.Call listUserGroupsCall(String userId, String prefix, String aft localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5816,7 +5816,7 @@ private okhttp3.Call listUserPoliciesCall(String userId, String prefix, String a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -6043,7 +6043,7 @@ private okhttp3.Call listUsersCall(String prefix, String after, Integer amount, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -6406,7 +6406,7 @@ private okhttp3.Call setGroupACLCall(String groupId, ACL ACL, final ApiCallback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -6583,7 +6583,7 @@ private okhttp3.Call updatePolicyCall(String policyId, Policy policy, final ApiC localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java index 4cbfe887f27..4a78a796eca 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java @@ -123,7 +123,7 @@ private okhttp3.Call cherryPickCall(String repository, String branch, CherryPick localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -328,7 +328,7 @@ private okhttp3.Call createBranchCall(String repository, BranchCreation branchCr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -528,7 +528,7 @@ private okhttp3.Call deleteBranchCall(String repository, String branch, Boolean localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -737,7 +737,7 @@ private okhttp3.Call diffBranchCall(String repository, String branch, String aft localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -962,7 +962,7 @@ private okhttp3.Call getBranchCall(String repository, String branch, final ApiCa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1154,7 +1154,7 @@ private okhttp3.Call listBranchesCall(String repository, String prefix, String a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1361,7 +1361,7 @@ private okhttp3.Call resetBranchCall(String repository, String branch, ResetCrea localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1557,7 +1557,7 @@ private okhttp3.Call revertBranchCall(String repository, String branch, RevertCr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java index 81cc5f97ead..b051276275a 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java @@ -121,7 +121,7 @@ private okhttp3.Call commitCall(String repository, String branch, CommitCreation localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -341,7 +341,7 @@ private okhttp3.Call getCommitCall(String repository, String commitId, final Api localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java index 3d654431023..6964e235fe2 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java @@ -113,7 +113,7 @@ private okhttp3.Call getConfigCall(final ApiCallback _callback) throws ApiExcept localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java index 3b46a48d81f..e4c976ac279 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java @@ -130,7 +130,7 @@ private okhttp3.Call abortPresignMultipartUploadCall(String repository, String b localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -345,7 +345,7 @@ private okhttp3.Call completePresignMultipartUploadCall(String repository, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -571,7 +571,7 @@ private okhttp3.Call createPresignMultipartUploadCall(String repository, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -780,7 +780,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -976,7 +976,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1201,7 +1201,7 @@ public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1218,7 +1218,7 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1236,7 +1236,7 @@ public AuthenticationToken execute() throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1254,7 +1254,7 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1272,7 +1272,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callbac * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1325,7 +1325,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1506,7 +1506,7 @@ private okhttp3.Call hardResetBranchCall(String repository, String branch, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1723,7 +1723,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java index 5f2a701d359..70011b6fc1b 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java @@ -123,7 +123,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -319,7 +319,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -544,7 +544,7 @@ public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -561,7 +561,7 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -579,7 +579,7 @@ public AuthenticationToken execute() throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -597,7 +597,7 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -615,7 +615,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callbac * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -668,7 +668,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -852,7 +852,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java index b0f4d6607a2..098f0258595 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java @@ -121,7 +121,7 @@ private okhttp3.Call importCancelCall(String repository, String branch, String i localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -317,7 +317,7 @@ private okhttp3.Call importStartCall(String repository, String branch, ImportCre localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -520,7 +520,7 @@ private okhttp3.Call importStatusCall(String repository, String branch, String i localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java index f419eb2f3e6..f31b348964b 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java @@ -137,7 +137,7 @@ private okhttp3.Call createBranchProtectionRulePreflightCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -311,7 +311,7 @@ private okhttp3.Call createCommitRecordCall(String repository, CommitRecordCreat localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -502,7 +502,7 @@ private okhttp3.Call createSymlinkFileCall(String repository, String branch, Str localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -694,7 +694,7 @@ private okhttp3.Call deleteRepositoryMetadataCall(String repository, RepositoryM localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -865,7 +865,7 @@ private okhttp3.Call dumpRefsCall(String repository, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1194,7 +1194,7 @@ private okhttp3.Call getGarbageCollectionConfigCall(final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1342,7 +1342,7 @@ private okhttp3.Call getLakeFSVersionCall(final ApiCallback _callback) throws Ap localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1654,7 +1654,7 @@ private okhttp3.Call getStorageConfigCall(final ApiCallback _callback) throws Ap localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1814,7 +1814,7 @@ private okhttp3.Call getUsageReportSummaryCall(final ApiCallback _callback) thro localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1984,7 +1984,7 @@ private okhttp3.Call internalCreateBranchProtectionRuleCall(String repository, B localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2172,7 +2172,7 @@ private okhttp3.Call internalDeleteBranchProtectionRuleCall(String repository, I localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2359,7 +2359,7 @@ private okhttp3.Call internalDeleteGarbageCollectionRulesCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2538,7 +2538,7 @@ private okhttp3.Call internalGetBranchProtectionRulesCall(String repository, fin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2721,7 +2721,7 @@ private okhttp3.Call internalGetGarbageCollectionRulesCall(String repository, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2905,7 +2905,7 @@ private okhttp3.Call internalSetGarbageCollectionRulesCall(String repository, Ga localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3092,7 +3092,7 @@ private okhttp3.Call postStatsEventsCall(StatsEventsList statsEventsList, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3260,7 +3260,7 @@ private okhttp3.Call prepareGarbageCollectionCommitsCall(String repository, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3438,7 +3438,7 @@ private okhttp3.Call prepareGarbageCollectionUncommittedCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3632,7 +3632,7 @@ private okhttp3.Call restoreRefsCall(String repository, RefsRestore refsRestore, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3813,7 +3813,7 @@ private okhttp3.Call setGarbageCollectionRulesPreflightCall(String repository, f localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3982,7 +3982,7 @@ private okhttp3.Call setRepositoryMetadataCall(String repository, RepositoryMeta localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4504,7 +4504,7 @@ private okhttp3.Call stageObjectCall(String repository, String branch, String pa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4726,7 +4726,7 @@ private okhttp3.Call uploadObjectPreflightCall(String repository, String branch, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java index b72d096e83a..8d8e51f62fa 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java @@ -115,7 +115,7 @@ private okhttp3.Call getMetaRangeCall(String repository, String metaRange, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -296,7 +296,7 @@ private okhttp3.Call getRangeCall(String repository, String range, final ApiCall localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java index a45c23100e4..8f2ea7cc92d 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java @@ -126,7 +126,7 @@ private okhttp3.Call copyObjectCall(String repository, String branch, String des localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -341,7 +341,7 @@ private okhttp3.Call deleteObjectCall(String repository, String branch, String p localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -547,7 +547,7 @@ private okhttp3.Call deleteObjectsCall(String repository, String branch, PathLis localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -769,7 +769,7 @@ private okhttp3.Call getObjectCall(String repository, String ref, String path, S localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1020,7 +1020,7 @@ private okhttp3.Call getUnderlyingPropertiesCall(String repository, String ref, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1216,7 +1216,7 @@ private okhttp3.Call headObjectCall(String repository, String ref, String path, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "HEAD", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1451,7 +1451,7 @@ private okhttp3.Call listObjectsCall(String repository, String ref, Boolean user localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1710,7 +1710,7 @@ private okhttp3.Call statObjectCall(String repository, String ref, String path, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1953,7 +1953,7 @@ private okhttp3.Call uploadObjectCall(String repository, String branch, String p localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java index 23892e0a897..e266e9d9cd4 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java @@ -141,7 +141,7 @@ private okhttp3.Call diffRefsCall(String repository, String leftRef, String righ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -386,7 +386,7 @@ private okhttp3.Call findMergeBaseCall(String repository, String sourceRef, Stri localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -612,7 +612,7 @@ private okhttp3.Call logCommitsCall(String repository, String ref, String after, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -883,7 +883,7 @@ private okhttp3.Call mergeIntoBranchCall(String repository, String sourceRef, St localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java index d1b4d94a3c0..2b45a54a744 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java @@ -126,7 +126,7 @@ private okhttp3.Call createRepositoryCall(RepositoryCreation repositoryCreation, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -314,7 +314,7 @@ private okhttp3.Call deleteGCRulesCall(String repository, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -491,7 +491,7 @@ private okhttp3.Call deleteRepositoryCall(String repository, Boolean force, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -674,7 +674,7 @@ private okhttp3.Call dumpStatusCall(String repository, String taskId, final ApiC localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -859,7 +859,7 @@ private okhttp3.Call dumpSubmitCall(String repository, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1031,7 +1031,7 @@ private okhttp3.Call getBranchProtectionRulesCall(String repository, final ApiCa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1203,7 +1203,7 @@ private okhttp3.Call getGCRulesCall(String repository, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1375,7 +1375,7 @@ private okhttp3.Call getRepositoryCall(String repository, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1547,7 +1547,7 @@ private okhttp3.Call getRepositoryMetadataCall(String repository, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1730,7 +1730,7 @@ private okhttp3.Call listRepositoriesCall(String prefix, String after, Integer a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1926,7 +1926,7 @@ private okhttp3.Call restoreStatusCall(String repository, String taskId, final A localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2112,7 +2112,7 @@ private okhttp3.Call restoreSubmitCall(String repository, RefsRestore refsRestor localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2302,7 +2302,7 @@ private okhttp3.Call setBranchProtectionRulesCall(String repository, List | +**200** | successful login | - | **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -1999,7 +1887,6 @@ get credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2034,12 +1921,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2087,7 +1968,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2116,7 +1997,6 @@ get current user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2150,12 +2030,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2197,7 +2071,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2222,7 +2096,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2257,12 +2130,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2308,7 +2175,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2337,7 +2204,6 @@ get group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2372,12 +2238,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2423,7 +2283,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2452,7 +2312,6 @@ get ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2488,12 +2347,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2539,7 +2392,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2568,7 +2421,6 @@ get policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2603,12 +2455,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2654,7 +2500,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2683,7 +2529,6 @@ get user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2718,12 +2563,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2769,7 +2608,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2798,7 +2637,6 @@ list group members * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2833,12 +2671,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2899,7 +2731,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2927,7 +2759,6 @@ list group policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2962,12 +2793,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3028,7 +2853,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3057,7 +2882,6 @@ list groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3092,12 +2916,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3148,7 +2966,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3176,7 +2994,6 @@ list policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3211,12 +3028,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3267,7 +3078,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3295,7 +3106,6 @@ list user credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3330,12 +3140,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3396,7 +3200,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3425,7 +3229,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3460,12 +3263,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3526,7 +3323,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3555,7 +3352,6 @@ list user groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3590,12 +3386,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3656,7 +3446,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3685,7 +3475,6 @@ list user policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3720,12 +3509,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3788,7 +3571,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3817,7 +3600,6 @@ list users * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3852,12 +3634,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3908,7 +3684,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -4010,7 +3786,6 @@ set ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -4045,12 +3820,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -4099,7 +3868,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -4128,7 +3897,6 @@ update policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -4163,12 +3931,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -4228,7 +3990,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/BranchesApi.md b/clients/python-legacy/docs/BranchesApi.md index 72c241149cb..3cfc39c1b24 100644 --- a/clients/python-legacy/docs/BranchesApi.md +++ b/clients/python-legacy/docs/BranchesApi.md @@ -23,7 +23,6 @@ Replay the changes from the given commit on the branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -59,12 +58,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -118,7 +111,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -150,7 +143,6 @@ create branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -185,12 +177,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -242,7 +228,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -274,7 +260,6 @@ delete branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -308,12 +293,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -370,7 +349,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -400,7 +379,6 @@ diff branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -435,12 +413,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -505,7 +477,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -534,7 +506,6 @@ get branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -569,12 +540,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -622,7 +587,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -651,7 +616,6 @@ list branches * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -686,12 +650,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -752,7 +710,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -781,7 +739,6 @@ reset branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -816,12 +773,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -874,7 +825,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -905,7 +856,6 @@ revert * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -940,12 +890,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -999,7 +943,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/CommitsApi.md b/clients/python-legacy/docs/CommitsApi.md index 1aca799f978..85fa23f1a64 100644 --- a/clients/python-legacy/docs/CommitsApi.md +++ b/clients/python-legacy/docs/CommitsApi.md @@ -17,7 +17,6 @@ create commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -53,12 +52,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -127,7 +120,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -160,7 +153,6 @@ get commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -195,12 +187,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -248,7 +234,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ConfigApi.md b/clients/python-legacy/docs/ConfigApi.md index 572ebb14bb1..dd037b3ae89 100644 --- a/clients/python-legacy/docs/ConfigApi.md +++ b/clients/python-legacy/docs/ConfigApi.md @@ -18,7 +18,6 @@ retrieve lakeFS configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -53,12 +52,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -99,7 +92,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ExperimentalApi.md b/clients/python-legacy/docs/ExperimentalApi.md index 17c8f8e0d06..74581bf2de5 100644 --- a/clients/python-legacy/docs/ExperimentalApi.md +++ b/clients/python-legacy/docs/ExperimentalApi.md @@ -26,7 +26,6 @@ Aborts a presign multipart upload. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -61,12 +60,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -129,7 +122,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -161,7 +154,6 @@ Completes a presign multipart upload by assembling the uploaded parts. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -198,12 +190,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -278,7 +264,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -311,7 +297,6 @@ Initiates a multipart upload and returns an upload ID with presigned URLs for ea * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -346,12 +331,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -412,7 +391,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -442,7 +421,6 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -477,12 +455,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -545,7 +517,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -575,7 +547,6 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -609,12 +580,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -661,7 +626,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -747,7 +712,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | * Set-Cookie -
| +**200** | successful login | - | **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -763,7 +728,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -798,12 +762,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -849,7 +807,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -880,7 +838,6 @@ Relocate branch to refer to ref. Branch must not contain uncommitted data. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -914,12 +871,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -978,7 +929,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1009,7 +960,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1044,12 +994,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1110,7 +1054,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ExternalApi.md b/clients/python-legacy/docs/ExternalApi.md index 3f5d31d575f..5f11c9b14be 100644 --- a/clients/python-legacy/docs/ExternalApi.md +++ b/clients/python-legacy/docs/ExternalApi.md @@ -20,7 +20,6 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -55,12 +54,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -123,7 +116,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -153,7 +146,6 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -187,12 +179,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -239,7 +225,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -325,7 +311,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | * Set-Cookie -
| +**200** | successful login | - | **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -341,7 +327,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -376,12 +361,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -427,7 +406,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -456,7 +435,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -491,12 +469,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -557,7 +529,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ImportApi.md b/clients/python-legacy/docs/ImportApi.md index ae2e9977f92..8e693aa4e4a 100644 --- a/clients/python-legacy/docs/ImportApi.md +++ b/clients/python-legacy/docs/ImportApi.md @@ -18,7 +18,6 @@ cancel ongoing import * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -52,12 +51,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -106,7 +99,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -137,7 +130,6 @@ import data from object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -173,12 +165,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -246,7 +232,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -277,7 +263,6 @@ get import status * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -312,12 +297,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -367,7 +346,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/InternalApi.md b/clients/python-legacy/docs/InternalApi.md index 2989fa1fb75..e191241d951 100644 --- a/clients/python-legacy/docs/InternalApi.md +++ b/clients/python-legacy/docs/InternalApi.md @@ -42,7 +42,6 @@ Method | HTTP request | Description * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -76,12 +75,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -125,7 +118,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -155,7 +148,6 @@ create commit record * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -190,12 +182,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -257,7 +243,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -288,7 +274,6 @@ creates symlink files corresponding to the given directory * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -323,12 +308,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -387,7 +366,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -418,7 +397,6 @@ Delete specified keys from the repository's metadata. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -453,12 +431,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -509,7 +481,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -537,7 +509,6 @@ Dump repository refs (tags, commits, branches) to object store Deprecated: a new * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -572,12 +543,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -623,7 +588,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -719,7 +684,6 @@ get information of gc settings * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -754,12 +718,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -800,7 +758,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -828,7 +786,6 @@ get version of lakeFS server * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -863,12 +820,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -909,7 +860,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1001,7 +952,6 @@ retrieve lakeFS storage configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1036,12 +986,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1082,7 +1026,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1108,7 +1052,6 @@ get usage report summary * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1143,12 +1086,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1190,7 +1127,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1220,7 +1157,6 @@ This endpoint does not need any parameter. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1255,12 +1191,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1308,7 +1238,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1337,7 +1267,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1372,12 +1301,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1425,7 +1348,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1454,7 +1377,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1488,12 +1410,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1537,7 +1453,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1566,7 +1482,6 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1601,12 +1516,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1652,7 +1561,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1681,7 +1590,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1716,12 +1624,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1766,7 +1668,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1795,7 +1697,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1830,12 +1731,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1889,7 +1784,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1918,7 +1813,6 @@ post stats events, this endpoint is meant for internal use only * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1953,12 +1847,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2011,7 +1899,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2040,7 +1928,6 @@ save lists of active commits for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2075,12 +1962,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2126,7 +2007,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2156,7 +2037,6 @@ save repository uncommitted metadata for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2192,12 +2072,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2256,7 +2130,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2287,7 +2161,6 @@ Restore repository refs (tags, commits, branches) from object store. Deprecated: * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2322,12 +2195,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2379,7 +2246,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2409,7 +2276,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2443,12 +2309,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2492,7 +2352,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2523,7 +2383,6 @@ Set repository metadata. This will only add or update the provided keys, and wil * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2558,12 +2417,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2614,7 +2467,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2793,7 +2646,6 @@ stage an object's metadata for the given branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2829,12 +2681,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2896,7 +2742,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2927,7 +2773,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2961,12 +2806,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3014,7 +2853,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/MetadataApi.md b/clients/python-legacy/docs/MetadataApi.md index 37b4dfbc2a2..9b443620338 100644 --- a/clients/python-legacy/docs/MetadataApi.md +++ b/clients/python-legacy/docs/MetadataApi.md @@ -17,7 +17,6 @@ return URI to a meta-range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -52,12 +51,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -105,7 +98,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -134,7 +127,6 @@ return URI to a range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -169,12 +161,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -222,7 +208,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ObjectsApi.md b/clients/python-legacy/docs/ObjectsApi.md index 8509add8cb8..e84269d94c9 100644 --- a/clients/python-legacy/docs/ObjectsApi.md +++ b/clients/python-legacy/docs/ObjectsApi.md @@ -24,7 +24,6 @@ create a copy of an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -60,12 +59,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -121,7 +114,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -152,7 +145,6 @@ delete object. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -186,12 +178,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -250,7 +236,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -280,7 +266,6 @@ delete objects. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -316,12 +301,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -386,7 +365,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -416,7 +395,6 @@ get object content * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -450,12 +428,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -520,7 +492,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -554,7 +526,6 @@ get object properties on underlying storage * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -589,12 +560,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -644,7 +609,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -673,7 +638,6 @@ check if object exists * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -706,12 +670,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -770,7 +728,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -802,7 +760,6 @@ list objects under a given prefix * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -837,12 +794,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -911,7 +862,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -940,7 +891,6 @@ get object metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -975,12 +925,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1043,7 +987,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1074,7 +1018,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1109,12 +1052,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1179,7 +1116,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/RefsApi.md b/clients/python-legacy/docs/RefsApi.md index 73df34a2325..b66a3d0afa8 100644 --- a/clients/python-legacy/docs/RefsApi.md +++ b/clients/python-legacy/docs/RefsApi.md @@ -19,7 +19,6 @@ diff references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -54,12 +53,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -128,7 +121,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -157,7 +150,6 @@ find the merge base for 2 references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -192,12 +184,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -247,7 +233,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -277,7 +263,6 @@ get commit log from ref. If both objects and prefixes are empty, return all comm * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -312,12 +297,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -394,7 +373,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -423,7 +402,6 @@ merge references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -459,12 +437,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -532,7 +504,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/RepositoriesApi.md b/clients/python-legacy/docs/RepositoriesApi.md index cff989d7d17..55c47f970df 100644 --- a/clients/python-legacy/docs/RepositoriesApi.md +++ b/clients/python-legacy/docs/RepositoriesApi.md @@ -29,7 +29,6 @@ create repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -65,12 +64,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -133,7 +126,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -163,7 +156,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -197,12 +189,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -246,7 +232,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -276,7 +262,6 @@ delete repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -310,12 +295,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -370,7 +349,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -399,7 +378,6 @@ Status of a repository dump task * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -434,12 +412,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -487,7 +459,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -517,7 +489,6 @@ Backup the repository metadata (tags, commits, branches) and save the backup to * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -552,12 +523,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -603,7 +568,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -632,7 +597,6 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -667,12 +631,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -718,7 +676,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -747,7 +705,6 @@ get repository GC rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -782,12 +739,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -833,7 +784,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -862,7 +813,6 @@ get repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -897,12 +847,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -948,7 +892,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -977,7 +921,6 @@ get repository metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1012,12 +955,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1063,7 +1000,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1092,7 +1029,6 @@ list repositories * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1127,12 +1063,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1183,7 +1113,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1211,7 +1141,6 @@ Status of a restore request * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1246,12 +1175,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1299,7 +1222,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1329,7 +1252,6 @@ Restore repository from a dump in the object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1365,12 +1287,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1423,7 +1339,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1453,7 +1369,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1488,12 +1403,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1552,7 +1461,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1584,7 +1493,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1619,12 +1527,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1678,7 +1580,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/StagingApi.md b/clients/python-legacy/docs/StagingApi.md index beea3d69b80..4049f989555 100644 --- a/clients/python-legacy/docs/StagingApi.md +++ b/clients/python-legacy/docs/StagingApi.md @@ -17,7 +17,6 @@ generate an address to which the client can upload an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -52,12 +51,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -118,7 +111,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -149,7 +142,6 @@ Link the physical address with the path in lakeFS, creating an uncommitted chang * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -186,12 +178,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -267,7 +253,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/TagsApi.md b/clients/python-legacy/docs/TagsApi.md index f29449edd29..35dcada5852 100644 --- a/clients/python-legacy/docs/TagsApi.md +++ b/clients/python-legacy/docs/TagsApi.md @@ -19,7 +19,6 @@ create tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -55,12 +54,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -112,7 +105,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -144,7 +137,6 @@ delete tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -178,12 +170,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -240,7 +226,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -270,7 +256,6 @@ get tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -305,12 +290,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -358,7 +337,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -387,7 +366,6 @@ list tags * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -422,12 +400,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -488,7 +460,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/lakefs_client/api/actions_api.py b/clients/python-legacy/lakefs_client/api/actions_api.py index 5d6b95e4161..1d64126e2fd 100644 --- a/clients/python-legacy/lakefs_client/api/actions_api.py +++ b/clients/python-legacy/lakefs_client/api/actions_api.py @@ -45,7 +45,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -107,7 +106,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -176,7 +174,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -258,7 +255,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/auth_api.py b/clients/python-legacy/lakefs_client/api/auth_api.py index 39a79d71e3d..c1351e33ce4 100644 --- a/clients/python-legacy/lakefs_client/api/auth_api.py +++ b/clients/python-legacy/lakefs_client/api/auth_api.py @@ -62,7 +62,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -124,7 +123,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -186,7 +184,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -248,7 +245,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -304,7 +300,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -359,7 +354,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -416,7 +410,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -471,7 +464,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -539,7 +531,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -601,7 +592,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -657,7 +647,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -719,7 +708,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -775,7 +763,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -831,7 +818,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -893,7 +879,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -955,7 +940,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1065,7 +1049,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1127,7 +1110,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1176,7 +1158,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1232,7 +1213,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1288,7 +1268,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1344,7 +1323,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1400,7 +1378,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1456,7 +1433,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1533,7 +1509,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1610,7 +1585,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1680,7 +1654,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1750,7 +1723,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1827,7 +1799,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1904,7 +1875,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1981,7 +1951,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -2063,7 +2032,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -2181,7 +2149,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -2244,7 +2211,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/branches_api.py b/clients/python-legacy/lakefs_client/api/branches_api.py index 34d4149ac0d..aa2a208efd5 100644 --- a/clients/python-legacy/lakefs_client/api/branches_api.py +++ b/clients/python-legacy/lakefs_client/api/branches_api.py @@ -50,7 +50,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -119,7 +118,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -183,7 +181,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -250,7 +247,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -338,7 +334,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -400,7 +395,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -477,7 +471,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -546,7 +539,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/commits_api.py b/clients/python-legacy/lakefs_client/api/commits_api.py index 9b831a15f0c..25012848d0b 100644 --- a/clients/python-legacy/lakefs_client/api/commits_api.py +++ b/clients/python-legacy/lakefs_client/api/commits_api.py @@ -44,7 +44,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -118,7 +117,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/config_api.py b/clients/python-legacy/lakefs_client/api/config_api.py index a2fa0ef7f86..5fd9bfc6eaa 100644 --- a/clients/python-legacy/lakefs_client/api/config_api.py +++ b/clients/python-legacy/lakefs_client/api/config_api.py @@ -43,7 +43,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/experimental_api.py b/clients/python-legacy/lakefs_client/api/experimental_api.py index 3047dabc63b..0e5abca4d8f 100644 --- a/clients/python-legacy/lakefs_client/api/experimental_api.py +++ b/clients/python-legacy/lakefs_client/api/experimental_api.py @@ -52,7 +52,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -132,7 +131,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -212,7 +210,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -285,7 +282,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -353,7 +349,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -463,7 +458,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -519,7 +513,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -592,7 +585,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/external_api.py b/clients/python-legacy/lakefs_client/api/external_api.py index b521b1e18f1..26caa432469 100644 --- a/clients/python-legacy/lakefs_client/api/external_api.py +++ b/clients/python-legacy/lakefs_client/api/external_api.py @@ -47,7 +47,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -115,7 +114,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -225,7 +223,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -281,7 +278,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/import_api.py b/clients/python-legacy/lakefs_client/api/import_api.py index d858de45773..e53cc50f152 100644 --- a/clients/python-legacy/lakefs_client/api/import_api.py +++ b/clients/python-legacy/lakefs_client/api/import_api.py @@ -45,7 +45,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -113,7 +112,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -182,7 +180,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/internal_api.py b/clients/python-legacy/lakefs_client/api/internal_api.py index 272c0fcf49a..dee2ff16cc4 100644 --- a/clients/python-legacy/lakefs_client/api/internal_api.py +++ b/clients/python-legacy/lakefs_client/api/internal_api.py @@ -66,7 +66,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -122,7 +121,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -185,7 +183,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -252,7 +249,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -315,7 +311,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -413,7 +408,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -462,7 +456,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -553,7 +546,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -602,7 +594,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -652,7 +643,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -715,7 +705,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -778,7 +767,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -834,7 +822,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -890,7 +877,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -946,7 +932,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1009,7 +994,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1066,7 +1050,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1122,7 +1105,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1184,7 +1166,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1247,7 +1228,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1303,7 +1283,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1466,7 +1445,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1541,7 +1519,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/metadata_api.py b/clients/python-legacy/lakefs_client/api/metadata_api.py index e790581922a..849c5493623 100644 --- a/clients/python-legacy/lakefs_client/api/metadata_api.py +++ b/clients/python-legacy/lakefs_client/api/metadata_api.py @@ -43,7 +43,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -105,7 +104,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/objects_api.py b/clients/python-legacy/lakefs_client/api/objects_api.py index 1308d59e9d4..5941b74039c 100644 --- a/clients/python-legacy/lakefs_client/api/objects_api.py +++ b/clients/python-legacy/lakefs_client/api/objects_api.py @@ -48,7 +48,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -123,7 +122,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -196,7 +194,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -270,7 +267,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -361,7 +357,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -429,7 +424,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -507,7 +501,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -605,7 +598,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -683,7 +675,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/refs_api.py b/clients/python-legacy/lakefs_client/api/refs_api.py index 0e466922df6..1b6549c4c77 100644 --- a/clients/python-legacy/lakefs_client/api/refs_api.py +++ b/clients/python-legacy/lakefs_client/api/refs_api.py @@ -47,7 +47,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -152,7 +151,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -220,7 +218,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -330,7 +327,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/repositories_api.py b/clients/python-legacy/lakefs_client/api/repositories_api.py index 62c4345021f..0f8b582acdd 100644 --- a/clients/python-legacy/lakefs_client/api/repositories_api.py +++ b/clients/python-legacy/lakefs_client/api/repositories_api.py @@ -52,7 +52,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -114,7 +113,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -170,7 +168,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -231,7 +228,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -293,7 +289,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -349,7 +344,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -405,7 +399,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -461,7 +454,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -517,7 +509,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -573,7 +564,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -643,7 +633,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -705,7 +694,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -768,7 +756,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -836,7 +823,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/staging_api.py b/clients/python-legacy/lakefs_client/api/staging_api.py index 29095e52235..f2e3e3c4d51 100644 --- a/clients/python-legacy/lakefs_client/api/staging_api.py +++ b/clients/python-legacy/lakefs_client/api/staging_api.py @@ -45,7 +45,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -118,7 +117,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/tags_api.py b/clients/python-legacy/lakefs_client/api/tags_api.py index 6c3cb65fe96..3ef623ce6e8 100644 --- a/clients/python-legacy/lakefs_client/api/tags_api.py +++ b/clients/python-legacy/lakefs_client/api/tags_api.py @@ -45,7 +45,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -108,7 +107,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -175,7 +173,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -237,7 +234,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/configuration.py b/clients/python-legacy/lakefs_client/configuration.py index 803c8596028..2dfcc040680 100644 --- a/clients/python-legacy/lakefs_client/configuration.py +++ b/clients/python-legacy/lakefs_client/configuration.py @@ -419,13 +419,6 @@ def auth_settings(self): 'cookie_auth', ), } - if self.username is not None and self.password is not None: - auth['external_auth'] = { - 'type': 'basic', - 'in': 'header', - 'key': 'Authorization', - 'value': self.get_basic_auth_token() - } if self.access_token is not None: auth['jwt_token'] = { 'type': 'bearer', diff --git a/clients/python/README.md b/clients/python/README.md index 1dff72e5c2f..fe509cad3cf 100644 --- a/clients/python/README.md +++ b/clients/python/README.md @@ -78,12 +78,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -395,11 +389,6 @@ Authentication schemes defined for the API: - **API key parameter name**: saml_auth_session - **Location**: - -### external_auth - -- **Type**: HTTP basic authentication - ## Author diff --git a/clients/python/docs/ActionsApi.md b/clients/python/docs/ActionsApi.md index 0be0301241f..a35752995f8 100644 --- a/clients/python/docs/ActionsApi.md +++ b/clients/python/docs/ActionsApi.md @@ -19,7 +19,6 @@ get a run * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -55,12 +54,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -110,7 +103,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -138,7 +131,6 @@ get run hook output * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -173,12 +165,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -230,7 +216,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -258,7 +244,6 @@ list runs * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -294,12 +279,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -355,7 +334,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -383,7 +362,6 @@ list run hooks * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -419,12 +397,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -478,7 +450,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/AuthApi.md b/clients/python/docs/AuthApi.md index 674654803b6..2d3c76f3d38 100644 --- a/clients/python/docs/AuthApi.md +++ b/clients/python/docs/AuthApi.md @@ -51,7 +51,6 @@ add group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -86,12 +85,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -139,7 +132,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -167,7 +160,6 @@ attach policy to group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -202,12 +194,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -255,7 +241,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -283,7 +269,6 @@ attach policy to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -318,12 +303,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -371,7 +350,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -399,7 +378,6 @@ create credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -435,12 +413,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -488,7 +460,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -516,7 +488,6 @@ create group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -553,12 +524,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -606,7 +571,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -634,7 +599,6 @@ create policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -670,12 +634,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -723,7 +681,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -752,7 +710,6 @@ create user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -789,12 +746,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -842,7 +793,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -871,7 +822,6 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -907,12 +857,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -962,7 +906,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -991,7 +935,6 @@ delete credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1026,12 +969,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1079,7 +1016,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1107,7 +1044,6 @@ delete group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1142,12 +1078,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1193,7 +1123,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1221,7 +1151,6 @@ delete group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1256,12 +1185,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1309,7 +1232,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1337,7 +1260,6 @@ delete policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1372,12 +1294,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1423,7 +1339,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1451,7 +1367,6 @@ delete user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1486,12 +1401,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1537,7 +1446,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1565,7 +1474,6 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1600,12 +1508,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1653,7 +1555,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1681,7 +1583,6 @@ detach policy from group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1716,12 +1617,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1769,7 +1664,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1797,7 +1692,6 @@ detach policy from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1832,12 +1726,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1885,7 +1773,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1969,7 +1857,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | * Set-Cookie -
| +**200** | successful login | - | **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -1985,7 +1873,6 @@ get credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2021,12 +1908,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2076,7 +1957,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2104,7 +1985,6 @@ get current user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2140,12 +2020,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2189,7 +2063,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2213,7 +2087,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2249,12 +2122,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2302,7 +2169,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2330,7 +2197,6 @@ get group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2366,12 +2232,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2419,7 +2279,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2447,7 +2307,6 @@ get ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2483,12 +2342,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2536,7 +2389,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2564,7 +2417,6 @@ get policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2600,12 +2452,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2653,7 +2499,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2681,7 +2527,6 @@ get user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2717,12 +2562,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2770,7 +2609,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2798,7 +2637,6 @@ list group members * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2834,12 +2672,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2893,7 +2725,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2920,7 +2752,6 @@ list group policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2956,12 +2787,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3015,7 +2840,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3043,7 +2868,6 @@ list groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3079,12 +2903,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3136,7 +2954,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3163,7 +2981,6 @@ list policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3199,12 +3016,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3256,7 +3067,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3283,7 +3094,6 @@ list user credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3319,12 +3129,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3378,7 +3182,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3406,7 +3210,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3442,12 +3245,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3501,7 +3298,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3529,7 +3326,6 @@ list user groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3565,12 +3361,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3624,7 +3414,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3652,7 +3442,6 @@ list user policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3688,12 +3477,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3749,7 +3532,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3777,7 +3560,6 @@ list users * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3813,12 +3595,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3870,7 +3646,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3969,7 +3745,6 @@ set ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -4005,12 +3780,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -4058,7 +3827,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -4086,7 +3855,6 @@ update policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -4122,12 +3890,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -4177,7 +3939,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/BranchesApi.md b/clients/python/docs/BranchesApi.md index 9d4487c73d6..33c09474b8f 100644 --- a/clients/python/docs/BranchesApi.md +++ b/clients/python/docs/BranchesApi.md @@ -23,7 +23,6 @@ Replay the changes from the given commit on the branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -60,12 +59,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -117,7 +110,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -148,7 +141,6 @@ create branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -184,12 +176,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -239,7 +225,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -270,7 +256,6 @@ delete branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -305,12 +290,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -360,7 +339,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -389,7 +368,6 @@ diff branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -425,12 +403,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -488,7 +460,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -516,7 +488,6 @@ get branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -552,12 +523,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -607,7 +572,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -635,7 +600,6 @@ list branches * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -671,12 +635,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -730,7 +688,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -758,7 +716,6 @@ reset branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -794,12 +751,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -849,7 +800,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -879,7 +830,6 @@ revert * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -915,12 +865,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -970,7 +914,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/CommitsApi.md b/clients/python/docs/CommitsApi.md index 35b354efbce..067f4bdaf84 100644 --- a/clients/python/docs/CommitsApi.md +++ b/clients/python/docs/CommitsApi.md @@ -17,7 +17,6 @@ create commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -54,12 +53,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -113,7 +106,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -145,7 +138,6 @@ get commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -181,12 +173,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -236,7 +222,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ConfigApi.md b/clients/python/docs/ConfigApi.md index 26600fb0385..bb153b51290 100644 --- a/clients/python/docs/ConfigApi.md +++ b/clients/python/docs/ConfigApi.md @@ -18,7 +18,6 @@ retrieve lakeFS configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -54,12 +53,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -102,7 +95,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ExperimentalApi.md b/clients/python/docs/ExperimentalApi.md index 29b10bee524..ae8bbbaf53d 100644 --- a/clients/python/docs/ExperimentalApi.md +++ b/clients/python/docs/ExperimentalApi.md @@ -26,7 +26,6 @@ Aborts a presign multipart upload. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -62,12 +61,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -121,7 +114,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -152,7 +145,6 @@ Completes a presign multipart upload by assembling the uploaded parts. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -189,12 +181,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -250,7 +236,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -282,7 +268,6 @@ Initiates a multipart upload and returns an upload ID with presigned URLs for ea * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -318,12 +303,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -377,7 +356,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -406,7 +385,6 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -442,12 +420,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -497,7 +469,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -526,7 +498,6 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -561,12 +532,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -614,7 +579,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -698,7 +663,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | * Set-Cookie -
| +**200** | successful login | - | **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -714,7 +679,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -750,12 +714,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -803,7 +761,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -833,7 +791,6 @@ Relocate branch to refer to ref. Branch must not contain uncommitted data. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -868,12 +825,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -925,7 +876,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -955,7 +906,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -991,12 +941,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1050,7 +994,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ExternalApi.md b/clients/python/docs/ExternalApi.md index de30ab65db5..c0f947f946f 100644 --- a/clients/python/docs/ExternalApi.md +++ b/clients/python/docs/ExternalApi.md @@ -20,7 +20,6 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -56,12 +55,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -111,7 +104,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -140,7 +133,6 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -175,12 +167,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -228,7 +214,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -312,7 +298,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | * Set-Cookie -
| +**200** | successful login | - | **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -328,7 +314,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -364,12 +349,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -417,7 +396,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -445,7 +424,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -481,12 +459,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -540,7 +512,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ImportApi.md b/clients/python/docs/ImportApi.md index 689c79485d2..496f2ac4369 100644 --- a/clients/python/docs/ImportApi.md +++ b/clients/python/docs/ImportApi.md @@ -18,7 +18,6 @@ cancel ongoing import * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -53,12 +52,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -108,7 +101,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -138,7 +131,6 @@ import data from object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -175,12 +167,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -232,7 +218,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -262,7 +248,6 @@ get import status * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -298,12 +283,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -355,7 +334,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/InternalApi.md b/clients/python/docs/InternalApi.md index ea8fd1e8219..d45cfa5599c 100644 --- a/clients/python/docs/InternalApi.md +++ b/clients/python/docs/InternalApi.md @@ -42,7 +42,6 @@ Method | HTTP request | Description * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -77,12 +76,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -127,7 +120,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -156,7 +149,6 @@ create commit record * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -192,12 +184,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -245,7 +231,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -275,7 +261,6 @@ creates symlink files corresponding to the given directory * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -311,12 +296,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -368,7 +347,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -398,7 +377,6 @@ Delete specified keys from the repository's metadata. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -434,12 +412,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -487,7 +459,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -514,7 +486,6 @@ Dump repository refs (tags, commits, branches) to object store Deprecated: a new * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -550,12 +521,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -603,7 +568,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -700,7 +665,6 @@ get information of gc settings * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -736,12 +700,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -784,7 +742,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -811,7 +769,6 @@ get version of lakeFS server * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -847,12 +804,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -895,7 +846,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -988,7 +939,6 @@ retrieve lakeFS storage configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1024,12 +974,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1072,7 +1016,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1097,7 +1041,6 @@ get usage report summary * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1133,12 +1076,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1182,7 +1119,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1211,7 +1148,6 @@ This endpoint does not need any parameter. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1247,12 +1183,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1299,7 +1229,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1327,7 +1257,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1363,12 +1292,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1415,7 +1338,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1443,7 +1366,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1478,12 +1400,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1528,7 +1444,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1556,7 +1472,6 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1592,12 +1507,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1645,7 +1554,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1673,7 +1582,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1709,12 +1617,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1761,7 +1663,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1789,7 +1691,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1825,12 +1726,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1877,7 +1772,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1905,7 +1800,6 @@ post stats events, this endpoint is meant for internal use only * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1941,12 +1835,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1992,7 +1880,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2020,7 +1908,6 @@ save lists of active commits for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2056,12 +1943,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2109,7 +1990,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2138,7 +2019,6 @@ save repository uncommitted metadata for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2175,12 +2055,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2230,7 +2104,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2260,7 +2134,6 @@ Restore repository refs (tags, commits, branches) from object store. Deprecated: * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2296,12 +2169,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2349,7 +2216,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2378,7 +2245,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2413,12 +2279,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2463,7 +2323,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2493,7 +2353,6 @@ Set repository metadata. This will only add or update the provided keys, and wil * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2529,12 +2388,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2582,7 +2435,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2753,7 +2606,6 @@ stage an object's metadata for the given branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2790,12 +2642,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2849,7 +2695,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2879,7 +2725,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2914,12 +2759,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2968,7 +2807,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/MetadataApi.md b/clients/python/docs/MetadataApi.md index ba9973040b3..248e02e2629 100644 --- a/clients/python/docs/MetadataApi.md +++ b/clients/python/docs/MetadataApi.md @@ -17,7 +17,6 @@ return URI to a meta-range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -53,12 +52,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -108,7 +101,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -136,7 +129,6 @@ return URI to a range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -172,12 +164,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -227,7 +213,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ObjectsApi.md b/clients/python/docs/ObjectsApi.md index 5e28ff4ac24..a9ab5b4e74a 100644 --- a/clients/python/docs/ObjectsApi.md +++ b/clients/python/docs/ObjectsApi.md @@ -24,7 +24,6 @@ create a copy of an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -61,12 +60,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -120,7 +113,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -150,7 +143,6 @@ delete object. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -185,12 +177,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -242,7 +228,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -271,7 +257,6 @@ delete objects. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -308,12 +293,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -367,7 +346,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -396,7 +375,6 @@ get object content * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -431,12 +409,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -494,7 +466,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -527,7 +499,6 @@ get object properties on underlying storage * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -563,12 +534,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -620,7 +585,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -648,7 +613,6 @@ check if object exists * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -683,12 +647,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -740,7 +698,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -771,7 +729,6 @@ list objects under a given prefix * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -807,12 +764,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -874,7 +825,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -902,7 +853,6 @@ get object metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -938,12 +888,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -999,7 +943,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1029,7 +973,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1065,12 +1008,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1129,7 +1066,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/RefsApi.md b/clients/python/docs/RefsApi.md index 1c1a9df2118..ac999a2ff24 100644 --- a/clients/python/docs/RefsApi.md +++ b/clients/python/docs/RefsApi.md @@ -19,7 +19,6 @@ diff references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -55,12 +54,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -122,7 +115,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -150,7 +143,6 @@ find the merge base for 2 references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -186,12 +178,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -243,7 +229,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -272,7 +258,6 @@ get commit log from ref. If both objects and prefixes are empty, return all comm * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -308,12 +293,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -379,7 +358,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -407,7 +386,6 @@ merge references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -444,12 +422,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -503,7 +475,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/RepositoriesApi.md b/clients/python/docs/RepositoriesApi.md index a0407f7aafd..6db6216fc8d 100644 --- a/clients/python/docs/RepositoriesApi.md +++ b/clients/python/docs/RepositoriesApi.md @@ -29,7 +29,6 @@ create repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -66,12 +65,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -121,7 +114,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -150,7 +143,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -185,12 +177,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -235,7 +221,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -264,7 +250,6 @@ delete repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -299,12 +284,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -352,7 +331,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -380,7 +359,6 @@ Status of a repository dump task * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -416,12 +394,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -471,7 +443,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -500,7 +472,6 @@ Backup the repository metadata (tags, commits, branches) and save the backup to * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -536,12 +507,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -589,7 +554,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -617,7 +582,6 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -653,12 +617,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -706,7 +664,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -734,7 +692,6 @@ get repository GC rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -770,12 +727,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -823,7 +774,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -851,7 +802,6 @@ get repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -887,12 +837,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -940,7 +884,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -968,7 +912,6 @@ get repository metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1003,12 +946,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1056,7 +993,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1084,7 +1021,6 @@ list repositories * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1120,12 +1056,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1177,7 +1107,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1204,7 +1134,6 @@ Status of a restore request * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1240,12 +1169,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1295,7 +1218,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1324,7 +1247,6 @@ Restore repository from a dump in the object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1361,12 +1283,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1416,7 +1332,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1445,7 +1361,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1481,12 +1396,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1535,7 +1444,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1566,7 +1475,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1602,12 +1510,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1654,7 +1556,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/StagingApi.md b/clients/python/docs/StagingApi.md index fc9aca5cf3e..ae82b69ba5f 100644 --- a/clients/python/docs/StagingApi.md +++ b/clients/python/docs/StagingApi.md @@ -17,7 +17,6 @@ generate an address to which the client can upload an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -53,12 +52,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -112,7 +105,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -142,7 +135,6 @@ Link the physical address with the path in lakeFS, creating an uncommitted chang * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -179,12 +171,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -240,7 +226,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/TagsApi.md b/clients/python/docs/TagsApi.md index 41edd868455..8deb20e8598 100644 --- a/clients/python/docs/TagsApi.md +++ b/clients/python/docs/TagsApi.md @@ -19,7 +19,6 @@ create tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -56,12 +55,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -111,7 +104,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -142,7 +135,6 @@ delete tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -177,12 +169,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -232,7 +218,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -261,7 +247,6 @@ get tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -297,12 +282,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -352,7 +331,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -380,7 +359,6 @@ list tags * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -416,12 +394,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -475,7 +447,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/lakefs_sdk/api/actions_api.py b/clients/python/lakefs_sdk/api/actions_api.py index f39c48d2091..f60b970d603 100644 --- a/clients/python/lakefs_sdk/api/actions_api.py +++ b/clients/python/lakefs_sdk/api/actions_api.py @@ -170,7 +170,7 @@ def get_run_with_http_info(self, repository : StrictStr, run_id : StrictStr, **k ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ActionRun", @@ -326,7 +326,7 @@ def get_run_hook_output_with_http_info(self, repository : StrictStr, run_id : St ['application/octet-stream', 'application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "bytearray", @@ -498,7 +498,7 @@ def list_repository_runs_with_http_info(self, repository : StrictStr, after : An ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ActionRunList", @@ -662,7 +662,7 @@ def list_run_hooks_with_http_info(self, repository : StrictStr, run_id : StrictS ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "HookRunList", diff --git a/clients/python/lakefs_sdk/api/auth_api.py b/clients/python/lakefs_sdk/api/auth_api.py index ae451be79ad..8211bfc0dec 100644 --- a/clients/python/lakefs_sdk/api/auth_api.py +++ b/clients/python/lakefs_sdk/api/auth_api.py @@ -186,7 +186,7 @@ def add_group_membership_with_http_info(self, group_id : StrictStr, user_id : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -329,7 +329,7 @@ def attach_policy_to_group_with_http_info(self, group_id : StrictStr, policy_id ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -472,7 +472,7 @@ def attach_policy_to_user_with_http_info(self, user_id : StrictStr, policy_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -607,7 +607,7 @@ def create_credentials_with_http_info(self, user_id : StrictStr, **kwargs) -> Ap ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "CredentialsWithSecret", @@ -754,7 +754,7 @@ def create_group_with_http_info(self, group_creation : Optional[GroupCreation] = _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Group", @@ -901,7 +901,7 @@ def create_policy_with_http_info(self, policy : Policy, **kwargs) -> ApiResponse _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Policy", @@ -1049,7 +1049,7 @@ def create_user_with_http_info(self, user_creation : Optional[UserCreation] = No _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "User", @@ -1213,7 +1213,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1356,7 +1356,7 @@ def delete_credentials_with_http_info(self, user_id : StrictStr, access_key_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1491,7 +1491,7 @@ def delete_group_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiResp ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1634,7 +1634,7 @@ def delete_group_membership_with_http_info(self, group_id : StrictStr, user_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1769,7 +1769,7 @@ def delete_policy_with_http_info(self, policy_id : StrictStr, **kwargs) -> ApiRe ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1904,7 +1904,7 @@ def delete_user_with_http_info(self, user_id : StrictStr, **kwargs) -> ApiRespon ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2047,7 +2047,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2190,7 +2190,7 @@ def detach_policy_from_group_with_http_info(self, group_id : StrictStr, policy_i ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2333,7 +2333,7 @@ def detach_policy_from_user_with_http_info(self, user_id : StrictStr, policy_id ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2622,7 +2622,7 @@ def get_credentials_with_http_info(self, user_id : StrictStr, access_key_id : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Credentials", @@ -2754,7 +2754,7 @@ def get_current_user_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E50 ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CurrentUser", @@ -2891,7 +2891,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -3031,7 +3031,7 @@ def get_group_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiRespons ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Group", @@ -3171,7 +3171,7 @@ def get_group_acl_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiRes ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ACL", @@ -3311,7 +3311,7 @@ def get_policy_with_http_info(self, policy_id : StrictStr, **kwargs) -> ApiRespo ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Policy", @@ -3451,7 +3451,7 @@ def get_user_with_http_info(self, user_id : StrictStr, **kwargs) -> ApiResponse: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "User", @@ -3615,7 +3615,7 @@ def list_group_members_with_http_info(self, group_id : StrictStr, prefix : Annot ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UserList", @@ -3778,7 +3778,7 @@ def list_group_policies_with_http_info(self, group_id : StrictStr, prefix : Anno ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -3934,7 +3934,7 @@ def list_groups_with_http_info(self, prefix : Annotated[Optional[StrictStr], Fie ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GroupList", @@ -4089,7 +4089,7 @@ def list_policies_with_http_info(self, prefix : Annotated[Optional[StrictStr], F ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -4252,7 +4252,7 @@ def list_user_credentials_with_http_info(self, user_id : StrictStr, prefix : Ann ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CredentialsList", @@ -4416,7 +4416,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", @@ -4580,7 +4580,7 @@ def list_user_groups_with_http_info(self, user_id : StrictStr, prefix : Annotate ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GroupList", @@ -4752,7 +4752,7 @@ def list_user_policies_with_http_info(self, user_id : StrictStr, prefix : Annota ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -4908,7 +4908,7 @@ def list_users_with_http_info(self, prefix : Annotated[Optional[StrictStr], Fiel ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UserList", @@ -5208,7 +5208,7 @@ def set_group_acl_with_http_info(self, group_id : StrictStr, acl : ACL, **kwargs _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -5358,7 +5358,7 @@ def update_policy_with_http_info(self, policy_id : StrictStr, policy : Policy, * _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Policy", diff --git a/clients/python/lakefs_sdk/api/branches_api.py b/clients/python/lakefs_sdk/api/branches_api.py index 2a58833faf1..ffb552796e2 100644 --- a/clients/python/lakefs_sdk/api/branches_api.py +++ b/clients/python/lakefs_sdk/api/branches_api.py @@ -190,7 +190,7 @@ def cherry_pick_with_http_info(self, repository : StrictStr, branch : StrictStr, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Commit", @@ -348,7 +348,7 @@ def create_branch_with_http_info(self, repository : StrictStr, branch_creation : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "str", @@ -507,7 +507,7 @@ def delete_branch_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -682,7 +682,7 @@ def diff_branch_with_http_info(self, repository : StrictStr, branch : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "DiffList", @@ -830,7 +830,7 @@ def get_branch_with_http_info(self, repository : StrictStr, branch : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Ref", @@ -994,7 +994,7 @@ def list_branches_with_http_info(self, repository : StrictStr, prefix : Annotate ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RefList", @@ -1157,7 +1157,7 @@ def reset_branch_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1315,7 +1315,7 @@ def revert_branch_with_http_info(self, repository : StrictStr, branch : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/commits_api.py b/clients/python/lakefs_sdk/api/commits_api.py index 369af5fb8a6..02bea4c6a84 100644 --- a/clients/python/lakefs_sdk/api/commits_api.py +++ b/clients/python/lakefs_sdk/api/commits_api.py @@ -192,7 +192,7 @@ def commit_with_http_info(self, repository : StrictStr, branch : StrictStr, comm _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Commit", @@ -344,7 +344,7 @@ def get_commit_with_http_info(self, repository : StrictStr, commit_id : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Commit", diff --git a/clients/python/lakefs_sdk/api/config_api.py b/clients/python/lakefs_sdk/api/config_api.py index cc1e2e78b21..028f68fcd36 100644 --- a/clients/python/lakefs_sdk/api/config_api.py +++ b/clients/python/lakefs_sdk/api/config_api.py @@ -150,7 +150,7 @@ def get_config_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E501 ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Config", diff --git a/clients/python/lakefs_sdk/api/experimental_api.py b/clients/python/lakefs_sdk/api/experimental_api.py index e7521284a81..e342acdc506 100644 --- a/clients/python/lakefs_sdk/api/experimental_api.py +++ b/clients/python/lakefs_sdk/api/experimental_api.py @@ -209,7 +209,7 @@ def abort_presign_multipart_upload_with_http_info(self, repository : StrictStr, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -385,7 +385,7 @@ def complete_presign_multipart_upload_with_http_info(self, repository : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", @@ -553,7 +553,7 @@ def create_presign_multipart_upload_with_http_info(self, repository : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "PresignMultipartUpload", @@ -717,7 +717,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -860,7 +860,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1141,7 +1141,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -1307,7 +1307,7 @@ def hard_reset_branch_with_http_info(self, repository : StrictStr, branch : Stri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1466,7 +1466,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", diff --git a/clients/python/lakefs_sdk/api/external_api.py b/clients/python/lakefs_sdk/api/external_api.py index 93f2afe1df9..801eef3ebc0 100644 --- a/clients/python/lakefs_sdk/api/external_api.py +++ b/clients/python/lakefs_sdk/api/external_api.py @@ -187,7 +187,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -330,7 +330,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -611,7 +611,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -775,7 +775,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", diff --git a/clients/python/lakefs_sdk/api/import_api.py b/clients/python/lakefs_sdk/api/import_api.py index 4495d0813e5..4e0b25708f3 100644 --- a/clients/python/lakefs_sdk/api/import_api.py +++ b/clients/python/lakefs_sdk/api/import_api.py @@ -176,7 +176,7 @@ def import_cancel_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -334,7 +334,7 @@ def import_start_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "ImportCreationResponse", @@ -492,7 +492,7 @@ def import_status_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ImportStatus", diff --git a/clients/python/lakefs_sdk/api/internal_api.py b/clients/python/lakefs_sdk/api/internal_api.py index 6d1ae4e3ec7..0febc0689d2 100644 --- a/clients/python/lakefs_sdk/api/internal_api.py +++ b/clients/python/lakefs_sdk/api/internal_api.py @@ -183,7 +183,7 @@ def create_branch_protection_rule_preflight_with_http_info(self, repository : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -333,7 +333,7 @@ def create_commit_record_with_http_info(self, repository : StrictStr, commit_rec _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -484,7 +484,7 @@ def create_symlink_file_with_http_info(self, repository : StrictStr, branch : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "StorageURI", @@ -641,7 +641,7 @@ def delete_repository_metadata_with_http_info(self, repository : StrictStr, repo _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -776,7 +776,7 @@ def dump_refs_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRespo ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "RefsDump", @@ -1041,7 +1041,7 @@ def get_garbage_collection_config_with_http_info(self, **kwargs) -> ApiResponse: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionConfig", @@ -1175,7 +1175,7 @@ def get_lake_fs_version_with_http_info(self, **kwargs) -> ApiResponse: # noqa: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "VersionConfig", @@ -1439,7 +1439,7 @@ def get_storage_config_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageConfig", @@ -1569,7 +1569,7 @@ def get_usage_report_summary_with_http_info(self, **kwargs) -> ApiResponse: # n ['application/json', 'application/text']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "InstallationUsageReport", @@ -1727,7 +1727,7 @@ def internal_create_branch_protection_rule_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1879,7 +1879,7 @@ def internal_delete_branch_protection_rule_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2016,7 +2016,7 @@ def internal_delete_garbage_collection_rules_with_http_info(self, repository : S ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2153,7 +2153,7 @@ def internal_get_branch_protection_rules_with_http_info(self, repository : Stric ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "List[BranchProtectionRule]", @@ -2295,7 +2295,7 @@ def internal_get_garbage_collection_rules_with_http_info(self, repository : Stri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionRules", @@ -2452,7 +2452,7 @@ def internal_set_garbage_collection_rules_with_http_info(self, repository : Stri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2594,7 +2594,7 @@ def post_stats_events_with_http_info(self, stats_events_list : StatsEventsList, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2729,7 +2729,7 @@ def prepare_garbage_collection_commits_with_http_info(self, repository : StrictS ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "GarbageCollectionPrepareResponse", @@ -2885,7 +2885,7 @@ def prepare_garbage_collection_uncommitted_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "PrepareGCUncommittedResponse", @@ -3042,7 +3042,7 @@ def restore_refs_with_http_info(self, repository : StrictStr, refs_restore : Ref _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3177,7 +3177,7 @@ def set_garbage_collection_rules_preflight_with_http_info(self, repository : Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3329,7 +3329,7 @@ def set_repository_metadata_with_http_info(self, repository : StrictStr, reposit _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3786,7 +3786,7 @@ def stage_object_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", @@ -3944,7 +3944,7 @@ def upload_object_preflight_with_http_info(self, repository : StrictStr, branch ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/metadata_api.py b/clients/python/lakefs_sdk/api/metadata_api.py index e8767115845..f897ec3b550 100644 --- a/clients/python/lakefs_sdk/api/metadata_api.py +++ b/clients/python/lakefs_sdk/api/metadata_api.py @@ -166,7 +166,7 @@ def get_meta_range_with_http_info(self, repository : StrictStr, meta_range : Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageURI", @@ -314,7 +314,7 @@ def get_range_with_http_info(self, repository : StrictStr, range : StrictStr, ** ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageURI", diff --git a/clients/python/lakefs_sdk/api/objects_api.py b/clients/python/lakefs_sdk/api/objects_api.py index 9ef5b4287b7..11a5229f3b6 100644 --- a/clients/python/lakefs_sdk/api/objects_api.py +++ b/clients/python/lakefs_sdk/api/objects_api.py @@ -196,7 +196,7 @@ def copy_object_with_http_info(self, repository : StrictStr, branch : Annotated[ _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", @@ -362,7 +362,7 @@ def delete_object_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -528,7 +528,7 @@ def delete_objects_with_http_info(self, repository : StrictStr, branch : StrictS _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectErrorList", @@ -709,7 +709,7 @@ def get_object_with_http_info(self, repository : StrictStr, ref : Annotated[Stri ['application/octet-stream', 'application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "bytearray", @@ -870,7 +870,7 @@ def get_underlying_properties_with_http_info(self, repository : StrictStr, ref : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UnderlyingObjectProperties", @@ -1030,7 +1030,7 @@ def head_object_with_http_info(self, repository : StrictStr, ref : Annotated[Str # process the body parameter _body_params = None # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1221,7 +1221,7 @@ def list_objects_with_http_info(self, repository : StrictStr, ref : Annotated[St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStatsList", @@ -1393,7 +1393,7 @@ def stat_object_with_http_info(self, repository : StrictStr, ref : Annotated[Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", @@ -1590,7 +1590,7 @@ def upload_object_with_http_info(self, repository : StrictStr, branch : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", diff --git a/clients/python/lakefs_sdk/api/refs_api.py b/clients/python/lakefs_sdk/api/refs_api.py index f938e771548..abc0529b5f8 100644 --- a/clients/python/lakefs_sdk/api/refs_api.py +++ b/clients/python/lakefs_sdk/api/refs_api.py @@ -222,7 +222,7 @@ def diff_refs_with_http_info(self, repository : StrictStr, left_ref : Annotated[ ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "DiffList", @@ -378,7 +378,7 @@ def find_merge_base_with_http_info(self, repository : StrictStr, source_ref : An ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "FindMergeBaseResult", @@ -596,7 +596,7 @@ def log_commits_with_http_info(self, repository : StrictStr, ref : StrictStr, af ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CommitList", @@ -767,7 +767,7 @@ def merge_into_branch_with_http_info(self, repository : StrictStr, source_ref : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "MergeResult", diff --git a/clients/python/lakefs_sdk/api/repositories_api.py b/clients/python/lakefs_sdk/api/repositories_api.py index d970a24e687..a2ebd9e58f2 100644 --- a/clients/python/lakefs_sdk/api/repositories_api.py +++ b/clients/python/lakefs_sdk/api/repositories_api.py @@ -183,7 +183,7 @@ def create_repository_with_http_info(self, repository_creation : RepositoryCreat _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Repository", @@ -324,7 +324,7 @@ def delete_gc_rules_with_http_info(self, repository : StrictStr, **kwargs) -> Ap ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -467,7 +467,7 @@ def delete_repository_with_http_info(self, repository : StrictStr, force : Annot ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -610,7 +610,7 @@ def dump_status_with_http_info(self, repository : StrictStr, task_id : StrictStr ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryDumpStatus", @@ -751,7 +751,7 @@ def dump_submit_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRes ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "TaskInfo", @@ -891,7 +891,7 @@ def get_branch_protection_rules_with_http_info(self, repository : StrictStr, **k ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "List[BranchProtectionRule]", @@ -1031,7 +1031,7 @@ def get_gc_rules_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRe ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionRules", @@ -1171,7 +1171,7 @@ def get_repository_with_http_info(self, repository : StrictStr, **kwargs) -> Api ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Repository", @@ -1311,7 +1311,7 @@ def get_repository_metadata_with_http_info(self, repository : StrictStr, **kwarg ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Dict[str, str]", @@ -1467,7 +1467,7 @@ def list_repositories_with_http_info(self, prefix : Annotated[Optional[StrictStr ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryList", @@ -1614,7 +1614,7 @@ def restore_status_with_http_info(self, repository : StrictStr, task_id : Strict ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryRestoreStatus", @@ -1770,7 +1770,7 @@ def restore_submit_with_http_info(self, repository : StrictStr, refs_restore : R _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "TaskInfo", @@ -1934,7 +1934,7 @@ def set_branch_protection_rules_with_http_info(self, repository : StrictStr, bra _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2084,7 +2084,7 @@ def set_gc_rules_with_http_info(self, repository : StrictStr, garbage_collection _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/staging_api.py b/clients/python/lakefs_sdk/api/staging_api.py index 7a91cd32ad9..e82c4ec395c 100644 --- a/clients/python/lakefs_sdk/api/staging_api.py +++ b/clients/python/lakefs_sdk/api/staging_api.py @@ -186,7 +186,7 @@ def get_physical_address_with_http_info(self, repository : StrictStr, branch : S ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StagingLocation", @@ -367,7 +367,7 @@ def link_physical_address_with_http_info(self, repository : StrictStr, branch : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", diff --git a/clients/python/lakefs_sdk/api/tags_api.py b/clients/python/lakefs_sdk/api/tags_api.py index c4ffe8c3adb..34533bd68ad 100644 --- a/clients/python/lakefs_sdk/api/tags_api.py +++ b/clients/python/lakefs_sdk/api/tags_api.py @@ -177,7 +177,7 @@ def create_tag_with_http_info(self, repository : StrictStr, tag_creation : TagCr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Ref", @@ -336,7 +336,7 @@ def delete_tag_with_http_info(self, repository : StrictStr, tag : StrictStr, for ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -479,7 +479,7 @@ def get_tag_with_http_info(self, repository : StrictStr, tag : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Ref", @@ -643,7 +643,7 @@ def list_tags_with_http_info(self, repository : StrictStr, prefix : Annotated[Op ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RefList", diff --git a/clients/python/lakefs_sdk/configuration.py b/clients/python/lakefs_sdk/configuration.py index 97b4f971566..201334aba2a 100644 --- a/clients/python/lakefs_sdk/configuration.py +++ b/clients/python/lakefs_sdk/configuration.py @@ -436,13 +436,6 @@ def auth_settings(self): 'saml_auth', ), } - if self.username is not None and self.password is not None: - auth['external_auth'] = { - 'type': 'basic', - 'in': 'header', - 'key': 'Authorization', - 'value': self.get_basic_auth_token() - } return auth def to_debug_report(self): diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index 3c98d5f35f1..9c4d9af488a 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -17,7 +17,7 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] - - external_auth: [] + components: securitySchemes: basic_auth: @@ -39,9 +39,7 @@ components: type: apiKey in: cookie name: saml_auth_session - external_auth: - type: http - scheme: basic + parameters: PaginationPrefix: in: query @@ -1832,10 +1830,6 @@ paths: responses: 200: description: successful login - headers: - Set-Cookie: - schema: - type: string content: application/json: schema: From ed4042fde9233b9edfe6c58ec87ee55d86cc005c Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 20 Mar 2024 11:45:05 +0200 Subject: [PATCH 08/33] Fix --- api/authorization.yml | 4 ++++ api/swagger.yml | 4 ++++ 2 files changed, 8 insertions(+) diff --git a/api/authorization.yml b/api/authorization.yml index e3a48ceaa77..f0d4bee307c 100644 --- a/api/authorization.yml +++ b/api/authorization.yml @@ -1238,6 +1238,10 @@ paths: responses: 200: description: successful login + headers: + Set-Cookie: + schema: + type: string content: application/json: schema: diff --git a/api/swagger.yml b/api/swagger.yml index 9c4d9af488a..95079f1f8c3 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -1830,6 +1830,10 @@ paths: responses: 200: description: successful login + headers: + Set-Cookie: + schema: + type: string content: application/json: schema: From bde0214171c2c28cf0693d5e9d4f9d60d5ee3118 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 20 Mar 2024 11:59:54 +0200 Subject: [PATCH 09/33] Fix --- api/authorization.yml | 3 +++ api/swagger.yml | 5 ++++- pkg/api/auth_middleware.go | 3 ++- 3 files changed, 9 insertions(+), 2 deletions(-) diff --git a/api/authorization.yml b/api/authorization.yml index f0d4bee307c..3ee7b33a7b5 100644 --- a/api/authorization.yml +++ b/api/authorization.yml @@ -18,6 +18,9 @@ components: type: http scheme: bearer bearerFormat: JWT + external_auth: + type: http + scheme: basic parameters: PaginationPrefix: diff --git a/api/swagger.yml b/api/swagger.yml index 95079f1f8c3..78d21a7cef6 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -17,7 +17,7 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] - + - external_auth: [] components: securitySchemes: basic_auth: @@ -39,6 +39,9 @@ components: type: apiKey in: cookie name: saml_auth_session + external_auth: + type: http + scheme: basic parameters: PaginationPrefix: diff --git a/pkg/api/auth_middleware.go b/pkg/api/auth_middleware.go index 3b4b27cfd5c..2d90172be28 100644 --- a/pkg/api/auth_middleware.go +++ b/pkg/api/auth_middleware.go @@ -130,7 +130,7 @@ func checkSecurityRequirements(r *http.Request, for _, securityRequirement := range securityRequirements { for provider := range securityRequirement { switch provider { - case "jwt_token": + case "jwt_token", "external_auth": // validate jwt token from header authHeaderValue := r.Header.Get("Authorization") if authHeaderValue == "" { @@ -174,6 +174,7 @@ func checkSecurityRequirements(r *http.Request, return nil, err } user, err = userFromSAML(ctx, logger, authService, samlSession, cookieAuthConfig) + default: // unknown security requirement to check logger.WithField("provider", provider).Error("Authentication middleware unknown security requirement provider") From 5920fcc9f94499463e23dc62a8b956987346d27c Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 20 Mar 2024 12:10:55 +0200 Subject: [PATCH 10/33] Fix --- clients/java-legacy/README.md | 9 + clients/java-legacy/api/openapi.yaml | 10 + clients/java-legacy/docs/ActionsApi.md | 28 +- clients/java-legacy/docs/AuthApi.md | 240 ++++++++++++-- clients/java-legacy/docs/BranchesApi.md | 56 +++- clients/java-legacy/docs/CommitsApi.md | 14 +- clients/java-legacy/docs/ConfigApi.md | 7 +- clients/java-legacy/docs/ExperimentalApi.md | 58 +++- clients/java-legacy/docs/ExternalApi.md | 30 +- clients/java-legacy/docs/ImportApi.md | 21 +- clients/java-legacy/docs/InternalApi.md | 161 +++++++-- clients/java-legacy/docs/MetadataApi.md | 14 +- clients/java-legacy/docs/ObjectsApi.md | 63 +++- clients/java-legacy/docs/RefsApi.md | 28 +- clients/java-legacy/docs/RepositoriesApi.md | 98 +++++- clients/java-legacy/docs/StagingApi.md | 14 +- clients/java-legacy/docs/TagsApi.md | 28 +- .../io/lakefs/clients/api/ActionsApi.java | 8 +- .../java/io/lakefs/clients/api/ApiClient.java | 2 + .../java/io/lakefs/clients/api/AuthApi.java | 76 ++--- .../io/lakefs/clients/api/BranchesApi.java | 16 +- .../io/lakefs/clients/api/CommitsApi.java | 4 +- .../java/io/lakefs/clients/api/ConfigApi.java | 2 +- .../lakefs/clients/api/ExperimentalApi.java | 24 +- .../io/lakefs/clients/api/ExternalApi.java | 16 +- .../java/io/lakefs/clients/api/ImportApi.java | 6 +- .../io/lakefs/clients/api/InternalApi.java | 46 +-- .../io/lakefs/clients/api/MetadataApi.java | 4 +- .../io/lakefs/clients/api/ObjectsApi.java | 18 +- .../java/io/lakefs/clients/api/RefsApi.java | 8 +- .../lakefs/clients/api/RepositoriesApi.java | 28 +- .../io/lakefs/clients/api/StagingApi.java | 4 +- .../java/io/lakefs/clients/api/TagsApi.java | 8 +- clients/java/README.md | 10 + clients/java/api/openapi.yaml | 10 + clients/java/docs/ActionsApi.md | 28 +- clients/java/docs/AuthApi.md | 240 ++++++++++++-- clients/java/docs/BranchesApi.md | 56 +++- clients/java/docs/CommitsApi.md | 14 +- clients/java/docs/ConfigApi.md | 7 +- clients/java/docs/ExperimentalApi.md | 58 +++- clients/java/docs/ExternalApi.md | 30 +- clients/java/docs/ImportApi.md | 21 +- clients/java/docs/InternalApi.md | 161 +++++++-- clients/java/docs/MetadataApi.md | 14 +- clients/java/docs/ObjectsApi.md | 63 +++- clients/java/docs/RefsApi.md | 28 +- clients/java/docs/RepositoriesApi.md | 98 +++++- clients/java/docs/StagingApi.md | 14 +- clients/java/docs/TagsApi.md | 28 +- .../io/lakefs/clients/sdk/ActionsApi.java | 8 +- .../java/io/lakefs/clients/sdk/ApiClient.java | 2 + .../java/io/lakefs/clients/sdk/AuthApi.java | 78 ++--- .../io/lakefs/clients/sdk/BranchesApi.java | 16 +- .../io/lakefs/clients/sdk/CommitsApi.java | 4 +- .../java/io/lakefs/clients/sdk/ConfigApi.java | 2 +- .../lakefs/clients/sdk/ExperimentalApi.java | 26 +- .../io/lakefs/clients/sdk/ExternalApi.java | 18 +- .../java/io/lakefs/clients/sdk/ImportApi.java | 6 +- .../io/lakefs/clients/sdk/InternalApi.java | 46 +-- .../io/lakefs/clients/sdk/MetadataApi.java | 4 +- .../io/lakefs/clients/sdk/ObjectsApi.java | 18 +- .../java/io/lakefs/clients/sdk/RefsApi.java | 8 +- .../lakefs/clients/sdk/RepositoriesApi.java | 28 +- .../io/lakefs/clients/sdk/StagingApi.java | 4 +- .../java/io/lakefs/clients/sdk/TagsApi.java | 8 +- clients/python-legacy/README.md | 11 + clients/python-legacy/docs/ActionsApi.md | 36 +- clients/python-legacy/docs/AuthApi.md | 308 ++++++++++++++++-- clients/python-legacy/docs/BranchesApi.md | 72 +++- clients/python-legacy/docs/CommitsApi.md | 18 +- clients/python-legacy/docs/ConfigApi.md | 9 +- clients/python-legacy/docs/ExperimentalApi.md | 74 ++++- clients/python-legacy/docs/ExternalApi.md | 38 ++- clients/python-legacy/docs/ImportApi.md | 27 +- clients/python-legacy/docs/InternalApi.md | 207 ++++++++++-- clients/python-legacy/docs/MetadataApi.md | 18 +- clients/python-legacy/docs/ObjectsApi.md | 81 ++++- clients/python-legacy/docs/RefsApi.md | 36 +- clients/python-legacy/docs/RepositoriesApi.md | 126 ++++++- clients/python-legacy/docs/StagingApi.md | 18 +- clients/python-legacy/docs/TagsApi.md | 36 +- .../lakefs_client/api/actions_api.py | 4 + .../lakefs_client/api/auth_api.py | 34 ++ .../lakefs_client/api/branches_api.py | 8 + .../lakefs_client/api/commits_api.py | 2 + .../lakefs_client/api/config_api.py | 1 + .../lakefs_client/api/experimental_api.py | 8 + .../lakefs_client/api/external_api.py | 4 + .../lakefs_client/api/import_api.py | 3 + .../lakefs_client/api/internal_api.py | 23 ++ .../lakefs_client/api/metadata_api.py | 2 + .../lakefs_client/api/objects_api.py | 9 + .../lakefs_client/api/refs_api.py | 4 + .../lakefs_client/api/repositories_api.py | 14 + .../lakefs_client/api/staging_api.py | 2 + .../lakefs_client/api/tags_api.py | 4 + .../lakefs_client/configuration.py | 7 + clients/python/README.md | 11 + clients/python/docs/ActionsApi.md | 36 +- clients/python/docs/AuthApi.md | 308 ++++++++++++++++-- clients/python/docs/BranchesApi.md | 72 +++- clients/python/docs/CommitsApi.md | 18 +- clients/python/docs/ConfigApi.md | 9 +- clients/python/docs/ExperimentalApi.md | 74 ++++- clients/python/docs/ExternalApi.md | 38 ++- clients/python/docs/ImportApi.md | 27 +- clients/python/docs/InternalApi.md | 207 ++++++++++-- clients/python/docs/MetadataApi.md | 18 +- clients/python/docs/ObjectsApi.md | 81 ++++- clients/python/docs/RefsApi.md | 36 +- clients/python/docs/RepositoriesApi.md | 126 ++++++- clients/python/docs/StagingApi.md | 18 +- clients/python/docs/TagsApi.md | 36 +- clients/python/lakefs_sdk/api/actions_api.py | 8 +- clients/python/lakefs_sdk/api/auth_api.py | 68 ++-- clients/python/lakefs_sdk/api/branches_api.py | 16 +- clients/python/lakefs_sdk/api/commits_api.py | 4 +- clients/python/lakefs_sdk/api/config_api.py | 2 +- .../python/lakefs_sdk/api/experimental_api.py | 16 +- clients/python/lakefs_sdk/api/external_api.py | 8 +- clients/python/lakefs_sdk/api/import_api.py | 6 +- clients/python/lakefs_sdk/api/internal_api.py | 46 +-- clients/python/lakefs_sdk/api/metadata_api.py | 4 +- clients/python/lakefs_sdk/api/objects_api.py | 18 +- clients/python/lakefs_sdk/api/refs_api.py | 8 +- .../python/lakefs_sdk/api/repositories_api.py | 28 +- clients/python/lakefs_sdk/api/staging_api.py | 4 +- clients/python/lakefs_sdk/api/tags_api.py | 8 +- clients/python/lakefs_sdk/configuration.py | 7 + docs/assets/js/swagger.yml | 9 +- 131 files changed, 4030 insertions(+), 894 deletions(-) diff --git a/clients/java-legacy/README.md b/clients/java-legacy/README.md index 783d54596f0..3f7d7c55120 100644 --- a/clients/java-legacy/README.md +++ b/clients/java-legacy/README.md @@ -95,6 +95,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -383,6 +388,10 @@ Authentication schemes defined for the API: - **API key parameter name**: internal_auth_session - **Location**: +### external_auth + +- **Type**: HTTP basic authentication + ### jwt_token - **Type**: HTTP basic authentication diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index 716014a4fce..a3737619dc6 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -15,6 +15,7 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] +- external_auth: [] paths: /setup_comm_prefs: post: @@ -189,6 +190,12 @@ paths: schema: $ref: '#/components/schemas/AuthenticationToken' description: successful login + headers: + Set-Cookie: + explode: false + schema: + type: string + style: simple "401": content: application/json: @@ -9105,4 +9112,7 @@ components: in: cookie name: saml_auth_session type: apiKey + external_auth: + scheme: basic + type: http diff --git a/clients/java-legacy/docs/ActionsApi.md b/clients/java-legacy/docs/ActionsApi.md index 76e04a9bd9f..726300dc465 100644 --- a/clients/java-legacy/docs/ActionsApi.md +++ b/clients/java-legacy/docs/ActionsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -88,7 +93,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -136,6 +141,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -184,7 +194,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -232,6 +242,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -284,7 +299,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -332,6 +347,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -382,7 +402,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/AuthApi.md b/clients/java-legacy/docs/AuthApi.md index 3ae2b96b648..47d52258b69 100644 --- a/clients/java-legacy/docs/AuthApi.md +++ b/clients/java-legacy/docs/AuthApi.md @@ -74,6 +74,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -119,7 +124,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -167,6 +172,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -212,7 +222,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -260,6 +270,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -305,7 +320,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -353,6 +368,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -397,7 +417,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -445,6 +465,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -489,7 +514,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -537,6 +562,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -581,7 +611,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -630,6 +660,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -674,7 +709,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -723,6 +758,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -770,7 +810,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -819,6 +859,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -864,7 +909,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -912,6 +957,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -955,7 +1005,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1003,6 +1053,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1048,7 +1103,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1096,6 +1151,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1139,7 +1199,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1187,6 +1247,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1230,7 +1295,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1278,6 +1343,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1323,7 +1393,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1371,6 +1441,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1416,7 +1491,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1464,6 +1539,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1509,7 +1589,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1583,7 +1663,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | - | +**200** | successful login | * Set-Cookie -
| **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -1620,6 +1700,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1666,7 +1751,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1714,6 +1799,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1754,7 +1844,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1798,6 +1888,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1842,7 +1937,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1890,6 +1985,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1934,7 +2034,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1982,6 +2082,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2026,7 +2131,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2074,6 +2179,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2118,7 +2228,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2166,6 +2276,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2210,7 +2325,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2258,6 +2373,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2308,7 +2428,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2355,6 +2475,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2405,7 +2530,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2453,6 +2578,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2501,7 +2631,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2548,6 +2678,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2596,7 +2731,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2643,6 +2778,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2693,7 +2833,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2741,6 +2881,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2791,7 +2936,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2839,6 +2984,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2889,7 +3039,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2937,6 +3087,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2989,7 +3144,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3037,6 +3192,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3085,7 +3245,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3195,6 +3355,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3240,7 +3405,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3288,6 +3453,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3334,7 +3504,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/BranchesApi.md b/clients/java-legacy/docs/BranchesApi.md index c1a1fc02597..5a0d52c2970 100644 --- a/clients/java-legacy/docs/BranchesApi.md +++ b/clients/java-legacy/docs/BranchesApi.md @@ -46,6 +46,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -94,7 +99,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -145,6 +150,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -191,7 +201,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -242,6 +252,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -289,7 +304,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -338,6 +353,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -392,7 +412,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -440,6 +460,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -486,7 +511,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -534,6 +559,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -584,7 +614,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -632,6 +662,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -679,7 +714,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -729,6 +764,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -776,7 +816,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/CommitsApi.md b/clients/java-legacy/docs/CommitsApi.md index 904969f3f78..8c0ca61a9aa 100644 --- a/clients/java-legacy/docs/CommitsApi.md +++ b/clients/java-legacy/docs/CommitsApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -90,7 +95,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -142,6 +147,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -188,7 +198,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ConfigApi.md b/clients/java-legacy/docs/ConfigApi.md index df872aca7ca..fe09a955ca2 100644 --- a/clients/java-legacy/docs/ConfigApi.md +++ b/clients/java-legacy/docs/ConfigApi.md @@ -41,6 +41,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -81,7 +86,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ExperimentalApi.md b/clients/java-legacy/docs/ExperimentalApi.md index 898b5caa7c1..2f77eb53ca5 100644 --- a/clients/java-legacy/docs/ExperimentalApi.md +++ b/clients/java-legacy/docs/ExperimentalApi.md @@ -49,6 +49,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -100,7 +105,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -151,6 +156,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -203,7 +213,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -255,6 +265,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -305,7 +320,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -354,6 +369,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -401,7 +421,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -450,6 +470,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -495,7 +520,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -569,7 +594,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | - | +**200** | successful login | * Set-Cookie -
| **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -606,6 +631,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -650,7 +680,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -700,6 +730,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -749,7 +784,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -799,6 +834,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -849,7 +889,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ExternalApi.md b/clients/java-legacy/docs/ExternalApi.md index 56880fe0bc8..67cd119ced8 100644 --- a/clients/java-legacy/docs/ExternalApi.md +++ b/clients/java-legacy/docs/ExternalApi.md @@ -43,6 +43,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -90,7 +95,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -139,6 +144,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -184,7 +194,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -258,7 +268,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | - | +**200** | successful login | * Set-Cookie -
| **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -295,6 +305,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -339,7 +354,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -387,6 +402,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -437,7 +457,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ImportApi.md b/clients/java-legacy/docs/ImportApi.md index 89e2170feef..8af8426b06b 100644 --- a/clients/java-legacy/docs/ImportApi.md +++ b/clients/java-legacy/docs/ImportApi.md @@ -41,6 +41,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -88,7 +93,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -138,6 +143,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -186,7 +196,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -236,6 +246,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -284,7 +299,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/InternalApi.md b/clients/java-legacy/docs/InternalApi.md index fce1503b632..5bb12bca642 100644 --- a/clients/java-legacy/docs/InternalApi.md +++ b/clients/java-legacy/docs/InternalApi.md @@ -65,6 +65,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -108,7 +113,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -157,6 +162,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -202,7 +212,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -252,6 +262,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -300,7 +315,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -350,6 +365,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -395,7 +415,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -442,6 +462,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -486,7 +511,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -595,6 +620,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -635,7 +665,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -682,6 +712,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -722,7 +757,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -827,6 +862,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -867,7 +907,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -912,6 +952,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -952,7 +997,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1001,6 +1046,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1046,7 +1096,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1094,6 +1144,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1139,7 +1194,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1187,6 +1242,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1230,7 +1290,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1278,6 +1338,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1322,7 +1387,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1370,6 +1435,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1414,7 +1484,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1462,6 +1532,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1507,7 +1582,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1555,6 +1630,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1598,7 +1678,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1646,6 +1726,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1690,7 +1775,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1739,6 +1824,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1785,7 +1875,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1835,6 +1925,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1880,7 +1975,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1929,6 +2024,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1972,7 +2072,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2022,6 +2122,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2067,7 +2172,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2242,6 +2347,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2292,7 +2402,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2342,6 +2452,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2389,7 +2504,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/MetadataApi.md b/clients/java-legacy/docs/MetadataApi.md index 77e7a4d2445..1d0fbd9b1bc 100644 --- a/clients/java-legacy/docs/MetadataApi.md +++ b/clients/java-legacy/docs/MetadataApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -86,7 +91,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -134,6 +139,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -180,7 +190,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ObjectsApi.md b/clients/java-legacy/docs/ObjectsApi.md index 763634236bc..98a58a5766e 100644 --- a/clients/java-legacy/docs/ObjectsApi.md +++ b/clients/java-legacy/docs/ObjectsApi.md @@ -47,6 +47,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -97,7 +102,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -147,6 +152,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -196,7 +206,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -245,6 +255,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -295,7 +310,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -344,6 +359,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -398,7 +418,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -451,6 +471,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -499,7 +524,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -547,6 +572,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -596,7 +626,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -647,6 +677,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -705,7 +740,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -753,6 +788,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -805,7 +845,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -855,6 +895,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -911,7 +956,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/RefsApi.md b/clients/java-legacy/docs/RefsApi.md index 944f4b55ee3..71103ec7415 100644 --- a/clients/java-legacy/docs/RefsApi.md +++ b/clients/java-legacy/docs/RefsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -100,7 +105,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -148,6 +153,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -196,7 +206,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -245,6 +255,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -307,7 +322,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -355,6 +370,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -405,7 +425,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/RepositoriesApi.md b/clients/java-legacy/docs/RepositoriesApi.md index c34ec869b6d..53242d7cf58 100644 --- a/clients/java-legacy/docs/RepositoriesApi.md +++ b/clients/java-legacy/docs/RepositoriesApi.md @@ -52,6 +52,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -98,7 +103,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -147,6 +152,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -190,7 +200,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -239,6 +249,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -284,7 +299,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -332,6 +347,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -378,7 +398,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -427,6 +447,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -471,7 +496,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -519,6 +544,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -563,7 +593,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -611,6 +641,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -655,7 +690,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -703,6 +738,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -747,7 +787,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -795,6 +835,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -839,7 +884,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -887,6 +932,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -935,7 +985,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -982,6 +1032,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1028,7 +1083,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1077,6 +1132,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1123,7 +1183,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1172,6 +1232,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1219,7 +1284,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1270,6 +1335,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1315,7 +1385,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/StagingApi.md b/clients/java-legacy/docs/StagingApi.md index 6aa4318f66c..92326ebd310 100644 --- a/clients/java-legacy/docs/StagingApi.md +++ b/clients/java-legacy/docs/StagingApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -90,7 +95,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -140,6 +145,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -192,7 +202,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/TagsApi.md b/clients/java-legacy/docs/TagsApi.md index 97b0228b8d7..22517d33cdf 100644 --- a/clients/java-legacy/docs/TagsApi.md +++ b/clients/java-legacy/docs/TagsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -88,7 +93,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -139,6 +144,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -186,7 +196,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -235,6 +245,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -281,7 +296,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -329,6 +344,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -379,7 +399,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java index 5162d6e42a7..a95e043aef6 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java @@ -103,7 +103,7 @@ public okhttp3.Call getRunCall(String repository, String runId, final ApiCallbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -243,7 +243,7 @@ public okhttp3.Call getRunHookOutputCall(String repository, String runId, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -407,7 +407,7 @@ public okhttp3.Call listRepositoryRunsCall(String repository, String after, Inte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -559,7 +559,7 @@ public okhttp3.Call listRunHooksCall(String repository, String runId, String aft final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java index d469b38e79c..79855c2c184 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java @@ -88,6 +88,7 @@ public ApiClient() { // Setup authentications (key: authentication name, value: authentication). authentications.put("basic_auth", new HttpBasicAuth()); authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); + authentications.put("external_auth", new HttpBasicAuth()); authentications.put("jwt_token", new HttpBearerAuth("bearer")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); @@ -106,6 +107,7 @@ public ApiClient(OkHttpClient client) { // Setup authentications (key: authentication name, value: authentication). authentications.put("basic_auth", new HttpBasicAuth()); authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); + authentications.put("external_auth", new HttpBasicAuth()); authentications.put("jwt_token", new HttpBearerAuth("bearer")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java index 6dc44ee99aa..e1cc6c665e4 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java @@ -119,7 +119,7 @@ public okhttp3.Call addGroupMembershipCall(String groupId, String userId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -253,7 +253,7 @@ public okhttp3.Call attachPolicyToGroupCall(String groupId, String policyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -387,7 +387,7 @@ public okhttp3.Call attachPolicyToUserCall(String userId, String policyId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -519,7 +519,7 @@ public okhttp3.Call createCredentialsCall(String userId, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -646,7 +646,7 @@ public okhttp3.Call createGroupCall(GroupCreation groupCreation, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -769,7 +769,7 @@ public okhttp3.Call createPolicyCall(Policy policy, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -900,7 +900,7 @@ public okhttp3.Call createUserCall(UserCreation userCreation, final ApiCallback final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1033,7 +1033,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1173,7 +1173,7 @@ public okhttp3.Call deleteCredentialsCall(String userId, String accessKeyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1305,7 +1305,7 @@ public okhttp3.Call deleteGroupCall(String groupId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1431,7 +1431,7 @@ public okhttp3.Call deleteGroupMembershipCall(String groupId, String userId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1563,7 +1563,7 @@ public okhttp3.Call deletePolicyCall(String policyId, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1687,7 +1687,7 @@ public okhttp3.Call deleteUserCall(String userId, final ApiCallback _callback) t final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1816,7 +1816,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1950,7 +1950,7 @@ public okhttp3.Call detachPolicyFromGroupCall(String groupId, String policyId, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2084,7 +2084,7 @@ public okhttp3.Call detachPolicyFromUserCall(String userId, String policyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2182,7 +2182,7 @@ public okhttp3.Call detachPolicyFromUserAsync(String userId, String policyId, fi * @http.response.details
Status Code Description Response Headers
200 successful login * Set-Cookie -
200 successful login -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -2236,7 +2236,7 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -2256,7 +2256,7 @@ public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -2278,7 +2278,7 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -2336,7 +2336,7 @@ public okhttp3.Call getCredentialsCall(String userId, String accessKeyId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2466,7 +2466,7 @@ public okhttp3.Call getCurrentUserCall(final ApiCallback _callback) throws ApiEx final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2577,7 +2577,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2705,7 +2705,7 @@ public okhttp3.Call getGroupCall(String groupId, final ApiCallback _callback) th final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2833,7 +2833,7 @@ public okhttp3.Call getGroupACLCall(String groupId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2961,7 +2961,7 @@ public okhttp3.Call getPolicyCall(String policyId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3089,7 +3089,7 @@ public okhttp3.Call getUserCall(String userId, final ApiCallback _callback) thro final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3231,7 +3231,7 @@ public okhttp3.Call listGroupMembersCall(String groupId, String prefix, String a final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3380,7 +3380,7 @@ public okhttp3.Call listGroupPoliciesCall(String groupId, String prefix, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3529,7 +3529,7 @@ public okhttp3.Call listGroupsCall(String prefix, String after, Integer amount, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3667,7 +3667,7 @@ public okhttp3.Call listPoliciesCall(String prefix, String after, Integer amount final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3808,7 +3808,7 @@ public okhttp3.Call listUserCredentialsCall(String userId, String prefix, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3960,7 +3960,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4112,7 +4112,7 @@ public okhttp3.Call listUserGroupsCall(String userId, String prefix, String afte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4269,7 +4269,7 @@ public okhttp3.Call listUserPoliciesCall(String userId, String prefix, String af final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4421,7 +4421,7 @@ public okhttp3.Call listUsersCall(String prefix, String after, Integer amount, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4666,7 +4666,7 @@ public okhttp3.Call setGroupACLCall(String groupId, ACL ACL, final ApiCallback _ final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4800,7 +4800,7 @@ public okhttp3.Call updatePolicyCall(String policyId, Policy policy, final ApiCa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java index a72c0b7cf50..fc8ae5809ef 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java @@ -111,7 +111,7 @@ public okhttp3.Call cherryPickCall(String repository, String branch, CherryPickC final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -268,7 +268,7 @@ public okhttp3.Call createBranchCall(String repository, BranchCreation branchCre final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -421,7 +421,7 @@ public okhttp3.Call deleteBranchCall(String repository, String branch, Boolean f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -581,7 +581,7 @@ public okhttp3.Call diffBranchCall(String repository, String branch, String afte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -731,7 +731,7 @@ public okhttp3.Call getBranchCall(String repository, String branch, final ApiCal final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -882,7 +882,7 @@ public okhttp3.Call listBranchesCall(String repository, String prefix, String af final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1024,7 +1024,7 @@ public okhttp3.Call resetBranchCall(String repository, String branch, ResetCreat final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1176,7 +1176,7 @@ public okhttp3.Call revertBranchCall(String repository, String branch, RevertCre final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java index 23f464975fe..81e2441bea5 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java @@ -111,7 +111,7 @@ public okhttp3.Call commitCall(String repository, String branch, CommitCreation final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -272,7 +272,7 @@ public okhttp3.Call getCommitCall(String repository, String commitId, final ApiC final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java index db1b298eed7..ce12a7223e0 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java @@ -93,7 +93,7 @@ public okhttp3.Call getConfigCall(final ApiCallback _callback) throws ApiExcepti final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java index 8315b7ee639..c1f4fcba196 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java @@ -118,7 +118,7 @@ public okhttp3.Call abortPresignMultipartUploadCall(String repository, String br final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -284,7 +284,7 @@ public okhttp3.Call completePresignMultipartUploadCall(String repository, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -458,7 +458,7 @@ public okhttp3.Call createPresignMultipartUploadCall(String repository, String b final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -615,7 +615,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -758,7 +758,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -856,7 +856,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -910,7 +910,7 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -930,7 +930,7 @@ public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -952,7 +952,7 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1011,7 +1011,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1153,7 +1153,7 @@ public okhttp3.Call hardResetBranchCall(String repository, String branch, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1317,7 +1317,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java index 8106bd7336a..bc691480381 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java @@ -109,7 +109,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -252,7 +252,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -350,7 +350,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -404,7 +404,7 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -424,7 +424,7 @@ public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -446,7 +446,7 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -505,7 +505,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -648,7 +648,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java index 1116f52effa..28a1367ed49 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java @@ -109,7 +109,7 @@ public okhttp3.Call importCancelCall(String repository, String branch, String id final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -260,7 +260,7 @@ public okhttp3.Call importStartCall(String repository, String branch, ImportCrea final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -417,7 +417,7 @@ public okhttp3.Call importStatusCall(String repository, String branch, String id final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java index d041c92b55d..1397b85d503 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java @@ -122,7 +122,7 @@ public okhttp3.Call createBranchProtectionRulePreflightCall(String repository, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -252,7 +252,7 @@ public okhttp3.Call createCommitRecordCall(String repository, CommitRecordCreati final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -397,7 +397,7 @@ public okhttp3.Call createSymlinkFileCall(String repository, String branch, Stri final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -536,7 +536,7 @@ public okhttp3.Call deleteRepositoryMetadataCall(String repository, RepositoryMe final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -666,7 +666,7 @@ public okhttp3.Call dumpRefsCall(String repository, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -902,7 +902,7 @@ public okhttp3.Call getGarbageCollectionConfigCall(final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1010,7 +1010,7 @@ public okhttp3.Call getLakeFSVersionCall(final ApiCallback _callback) throws Api final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1235,7 +1235,7 @@ public okhttp3.Call getStorageConfigCall(final ApiCallback _callback) throws Api final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1352,7 +1352,7 @@ public okhttp3.Call getUsageReportSummaryCall(final ApiCallback _callback) throw final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1478,7 +1478,7 @@ public okhttp3.Call internalCreateBranchProtectionRuleCall(String repository, Br final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1620,7 +1620,7 @@ public okhttp3.Call internalDeleteBranchProtectionRuleCall(String repository, In final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1761,7 +1761,7 @@ public okhttp3.Call internalDeleteGarbageCollectionRulesCall(String repository, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1894,7 +1894,7 @@ public okhttp3.Call internalGetBranchProtectionRulesCall(String repository, fina final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2031,7 +2031,7 @@ public okhttp3.Call internalGetGarbageCollectionRulesCall(String repository, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2169,7 +2169,7 @@ public okhttp3.Call internalSetGarbageCollectionRulesCall(String repository, Gar final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2307,7 +2307,7 @@ public okhttp3.Call postStatsEventsCall(StatsEventsList statsEventsList, final A final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2432,7 +2432,7 @@ public okhttp3.Call prepareGarbageCollectionCommitsCall(String repository, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2566,7 +2566,7 @@ public okhttp3.Call prepareGarbageCollectionUncommittedCall(String repository, P final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2705,7 +2705,7 @@ public okhttp3.Call restoreRefsCall(String repository, RefsRestore refsRestore, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2840,7 +2840,7 @@ public okhttp3.Call setGarbageCollectionRulesPreflightCall(String repository, fi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2965,7 +2965,7 @@ public okhttp3.Call setRepositoryMetadataCall(String repository, RepositoryMetad final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3359,7 +3359,7 @@ public okhttp3.Call stageObjectCall(String repository, String branch, String pat final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3532,7 +3532,7 @@ public okhttp3.Call uploadObjectPreflightCall(String repository, String branch, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java index 86315a5d54f..526d9c08ef9 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java @@ -100,7 +100,7 @@ public okhttp3.Call getMetaRangeCall(String repository, String metaRange, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -238,7 +238,7 @@ public okhttp3.Call getRangeCall(String repository, String range, final ApiCallb final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java index 1c3ae1d2a52..c391522decd 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java @@ -114,7 +114,7 @@ public okhttp3.Call copyObjectCall(String repository, String branch, String dest final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -285,7 +285,7 @@ public okhttp3.Call deleteObjectCall(String repository, String branch, String pa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -440,7 +440,7 @@ public okhttp3.Call deleteObjectsCall(String repository, String branch, PathList final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -617,7 +617,7 @@ public okhttp3.Call getObjectCall(String repository, String ref, String path, St final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -792,7 +792,7 @@ public okhttp3.Call getUnderlyingPropertiesCall(String repository, String ref, S final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -951,7 +951,7 @@ public okhttp3.Call headObjectCall(String repository, String ref, String path, S final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "HEAD", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1135,7 +1135,7 @@ public okhttp3.Call listObjectsCall(String repository, String ref, Boolean userM final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1308,7 +1308,7 @@ public okhttp3.Call statObjectCall(String repository, String ref, String path, B final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1494,7 +1494,7 @@ public okhttp3.Call uploadObjectCall(String repository, String branch, String pa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java index 026a3bb1b74..67396ac0994 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java @@ -132,7 +132,7 @@ public okhttp3.Call diffRefsCall(String repository, String leftRef, String right final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -296,7 +296,7 @@ public okhttp3.Call findMergeBaseCall(String repository, String sourceRef, Strin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -485,7 +485,7 @@ public okhttp3.Call logCommitsCall(String repository, String ref, String after, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -654,7 +654,7 @@ public okhttp3.Call mergeIntoBranchCall(String repository, String sourceRef, Str final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java index a2c19552453..18263469246 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java @@ -111,7 +111,7 @@ public okhttp3.Call createRepositoryCall(RepositoryCreation repositoryCreation, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -246,7 +246,7 @@ public okhttp3.Call deleteGCRulesCall(String repository, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -378,7 +378,7 @@ public okhttp3.Call deleteRepositoryCall(String repository, Boolean force, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -511,7 +511,7 @@ public okhttp3.Call dumpStatusCall(String repository, String taskId, final ApiCa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -650,7 +650,7 @@ public okhttp3.Call dumpSubmitCall(String repository, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -778,7 +778,7 @@ public okhttp3.Call getBranchProtectionRulesCall(String repository, final ApiCal final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -906,7 +906,7 @@ public okhttp3.Call getGCRulesCall(String repository, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1034,7 +1034,7 @@ public okhttp3.Call getRepositoryCall(String repository, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1162,7 +1162,7 @@ public okhttp3.Call getRepositoryMetadataCall(String repository, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1302,7 +1302,7 @@ public okhttp3.Call listRepositoriesCall(String prefix, String after, Integer am final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1434,7 +1434,7 @@ public okhttp3.Call restoreStatusCall(String repository, String taskId, final Ap final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1575,7 +1575,7 @@ public okhttp3.Call restoreSubmitCall(String repository, RefsRestore refsRestore final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1723,7 +1723,7 @@ public okhttp3.Call setBranchProtectionRulesCall(String repository, List +### external_auth + +- **Type**: HTTP basic authentication + ## Recommendation diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index 0007b5f3d8c..8b2c7993778 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -15,6 +15,7 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] +- external_auth: [] paths: /setup_comm_prefs: post: @@ -189,6 +190,12 @@ paths: schema: $ref: '#/components/schemas/AuthenticationToken' description: successful login + headers: + Set-Cookie: + explode: false + schema: + type: string + style: simple "401": content: application/json: @@ -9080,4 +9087,7 @@ components: in: cookie name: saml_auth_session type: apiKey + external_auth: + scheme: basic + type: http diff --git a/clients/java/docs/ActionsApi.md b/clients/java/docs/ActionsApi.md index 7e7b850c96f..4999927c8a0 100644 --- a/clients/java/docs/ActionsApi.md +++ b/clients/java/docs/ActionsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -89,7 +94,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -137,6 +142,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -186,7 +196,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -234,6 +244,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -291,7 +306,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -339,6 +354,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -392,7 +412,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/AuthApi.md b/clients/java/docs/AuthApi.md index b0fc7bd6f9b..e5659b16cfe 100644 --- a/clients/java/docs/AuthApi.md +++ b/clients/java/docs/AuthApi.md @@ -74,6 +74,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -120,7 +125,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -168,6 +173,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -214,7 +224,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -262,6 +272,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -308,7 +323,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -356,6 +371,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -401,7 +421,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -449,6 +469,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -495,7 +520,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -543,6 +568,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -588,7 +618,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -637,6 +667,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -683,7 +718,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -732,6 +767,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -781,7 +821,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -830,6 +870,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -876,7 +921,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -924,6 +969,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -968,7 +1018,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1016,6 +1066,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1062,7 +1117,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1110,6 +1165,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1154,7 +1214,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1202,6 +1262,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1246,7 +1311,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1294,6 +1359,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1340,7 +1410,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1388,6 +1458,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1434,7 +1509,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1482,6 +1557,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1528,7 +1608,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1604,7 +1684,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -| **200** | successful login | - | +| **200** | successful login | * Set-Cookie -
| | **401** | Unauthorized | - | | **420** | too many requests | - | | **0** | Internal Server Error | - | @@ -1641,6 +1721,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1688,7 +1773,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1736,6 +1821,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1777,7 +1867,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1821,6 +1911,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1866,7 +1961,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1914,6 +2009,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1959,7 +2059,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2007,6 +2107,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2052,7 +2157,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2100,6 +2205,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2145,7 +2255,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2193,6 +2303,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2238,7 +2353,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2286,6 +2401,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2340,7 +2460,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2387,6 +2507,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2441,7 +2566,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2489,6 +2614,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2541,7 +2671,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2588,6 +2718,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2640,7 +2775,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2687,6 +2822,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2741,7 +2881,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2789,6 +2929,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2843,7 +2988,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2891,6 +3036,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2945,7 +3095,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2993,6 +3143,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3050,7 +3205,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3098,6 +3253,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3150,7 +3310,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3262,6 +3422,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3308,7 +3473,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3356,6 +3521,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3403,7 +3573,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/BranchesApi.md b/clients/java/docs/BranchesApi.md index 7f46857e87b..dc939c30521 100644 --- a/clients/java/docs/BranchesApi.md +++ b/clients/java/docs/BranchesApi.md @@ -46,6 +46,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -95,7 +100,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -146,6 +151,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -193,7 +203,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -244,6 +254,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -293,7 +308,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -342,6 +357,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -401,7 +421,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -449,6 +469,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -496,7 +521,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -544,6 +569,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -598,7 +628,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -646,6 +676,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -694,7 +729,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -744,6 +779,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -792,7 +832,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/CommitsApi.md b/clients/java/docs/CommitsApi.md index a60dae05893..4b6beda5ce9 100644 --- a/clients/java/docs/CommitsApi.md +++ b/clients/java/docs/CommitsApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -92,7 +97,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -144,6 +149,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -191,7 +201,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ConfigApi.md b/clients/java/docs/ConfigApi.md index e629af1eb17..43497bd9217 100644 --- a/clients/java/docs/ConfigApi.md +++ b/clients/java/docs/ConfigApi.md @@ -41,6 +41,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -82,7 +87,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ExperimentalApi.md b/clients/java/docs/ExperimentalApi.md index 9c129de5ed9..48145a02814 100644 --- a/clients/java/docs/ExperimentalApi.md +++ b/clients/java/docs/ExperimentalApi.md @@ -49,6 +49,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -102,7 +107,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -153,6 +158,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -207,7 +217,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -259,6 +269,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -311,7 +326,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -360,6 +375,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -409,7 +429,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -458,6 +478,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -504,7 +529,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -580,7 +605,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -| **200** | successful login | - | +| **200** | successful login | * Set-Cookie -
| | **401** | Unauthorized | - | | **420** | too many requests | - | | **0** | Internal Server Error | - | @@ -617,6 +642,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -662,7 +692,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -712,6 +742,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -763,7 +798,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -813,6 +848,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -867,7 +907,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ExternalApi.md b/clients/java/docs/ExternalApi.md index 19385224cac..782e25a75e9 100644 --- a/clients/java/docs/ExternalApi.md +++ b/clients/java/docs/ExternalApi.md @@ -43,6 +43,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -92,7 +97,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -141,6 +146,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -187,7 +197,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -263,7 +273,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -| **200** | successful login | - | +| **200** | successful login | * Set-Cookie -
| | **401** | Unauthorized | - | | **420** | too many requests | - | | **0** | Internal Server Error | - | @@ -300,6 +310,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -345,7 +360,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -393,6 +408,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -447,7 +467,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ImportApi.md b/clients/java/docs/ImportApi.md index 625bcd954ca..c1c79fda81d 100644 --- a/clients/java/docs/ImportApi.md +++ b/clients/java/docs/ImportApi.md @@ -41,6 +41,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -89,7 +94,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -139,6 +144,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -188,7 +198,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -238,6 +248,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -287,7 +302,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/InternalApi.md b/clients/java/docs/InternalApi.md index 2298ca6a769..06f90ffc466 100644 --- a/clients/java/docs/InternalApi.md +++ b/clients/java/docs/InternalApi.md @@ -65,6 +65,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -109,7 +114,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -158,6 +163,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -204,7 +214,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -254,6 +264,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -304,7 +319,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -354,6 +369,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -400,7 +420,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -447,6 +467,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -492,7 +517,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -602,6 +627,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -643,7 +673,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -690,6 +720,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -731,7 +766,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -837,6 +872,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -878,7 +918,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -923,6 +963,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -964,7 +1009,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1013,6 +1058,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1059,7 +1109,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1107,6 +1157,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1153,7 +1208,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1201,6 +1256,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1245,7 +1305,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1293,6 +1353,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1338,7 +1403,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1386,6 +1451,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1431,7 +1501,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1479,6 +1549,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1525,7 +1600,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1573,6 +1648,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1617,7 +1697,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1665,6 +1745,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1710,7 +1795,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1759,6 +1844,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1807,7 +1897,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1857,6 +1947,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1903,7 +1998,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1952,6 +2047,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1996,7 +2096,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2046,6 +2146,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2092,7 +2197,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2269,6 +2374,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2320,7 +2430,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2370,6 +2480,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2418,7 +2533,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/MetadataApi.md b/clients/java/docs/MetadataApi.md index 07a12c74861..490ae7f07a0 100644 --- a/clients/java/docs/MetadataApi.md +++ b/clients/java/docs/MetadataApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -87,7 +92,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -135,6 +140,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -182,7 +192,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ObjectsApi.md b/clients/java/docs/ObjectsApi.md index d441235e74e..8b03c9a24e1 100644 --- a/clients/java/docs/ObjectsApi.md +++ b/clients/java/docs/ObjectsApi.md @@ -47,6 +47,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -98,7 +103,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -148,6 +153,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -199,7 +209,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -248,6 +258,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -300,7 +315,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -349,6 +364,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -407,7 +427,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -460,6 +480,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -509,7 +534,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -557,6 +582,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -608,7 +638,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -659,6 +689,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -724,7 +759,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -772,6 +807,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -827,7 +867,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -877,6 +917,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -938,7 +983,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/RefsApi.md b/clients/java/docs/RefsApi.md index 36100c42bf4..65da1b9e973 100644 --- a/clients/java/docs/RefsApi.md +++ b/clients/java/docs/RefsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -106,7 +111,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -154,6 +159,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -203,7 +213,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -252,6 +262,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -323,7 +338,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -371,6 +386,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -423,7 +443,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/RepositoriesApi.md b/clients/java/docs/RepositoriesApi.md index 664fcc4ef43..cb8559cf7db 100644 --- a/clients/java/docs/RepositoriesApi.md +++ b/clients/java/docs/RepositoriesApi.md @@ -52,6 +52,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -100,7 +105,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -149,6 +154,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -193,7 +203,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -242,6 +252,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -289,7 +304,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -337,6 +352,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -384,7 +404,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -433,6 +453,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -478,7 +503,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -526,6 +551,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -571,7 +601,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -619,6 +649,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -664,7 +699,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -712,6 +747,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -757,7 +797,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -805,6 +845,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -850,7 +895,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -898,6 +943,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -950,7 +1000,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -997,6 +1047,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1044,7 +1099,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1093,6 +1148,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1140,7 +1200,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1189,6 +1249,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1238,7 +1303,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1289,6 +1354,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1335,7 +1405,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/StagingApi.md b/clients/java/docs/StagingApi.md index 922fab5d459..ff9c5c864b0 100644 --- a/clients/java/docs/StagingApi.md +++ b/clients/java/docs/StagingApi.md @@ -40,6 +40,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -92,7 +97,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -142,6 +147,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -196,7 +206,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/TagsApi.md b/clients/java/docs/TagsApi.md index 0fb60d7a48f..0129047289b 100644 --- a/clients/java/docs/TagsApi.md +++ b/clients/java/docs/TagsApi.md @@ -42,6 +42,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -89,7 +94,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -140,6 +145,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -189,7 +199,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -238,6 +248,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -285,7 +300,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -333,6 +348,11 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); + // Configure HTTP basic authorization: external_auth + HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); + external_auth.setUsername("YOUR USERNAME"); + external_auth.setPassword("YOUR PASSWORD"); + // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -387,7 +407,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java index 3dba7a7a802..a912a91f951 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java @@ -118,7 +118,7 @@ private okhttp3.Call getRunCall(String repository, String runId, final ApiCallba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -301,7 +301,7 @@ private okhttp3.Call getRunHookOutputCall(String repository, String runId, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -505,7 +505,7 @@ private okhttp3.Call listRepositoryRunsCall(String repository, String after, Int localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -730,7 +730,7 @@ private okhttp3.Call listRunHooksCall(String repository, String runId, String af localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java index 38fd1cbfcd2..f9b3e2e6cc6 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java @@ -104,6 +104,7 @@ public ApiClient() { authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); + authentications.put("external_auth", new HttpBasicAuth()); // Prevent the authentications from being modified. authentications = Collections.unmodifiableMap(authentications); } @@ -124,6 +125,7 @@ public ApiClient(OkHttpClient client) { authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); + authentications.put("external_auth", new HttpBasicAuth()); // Prevent the authentications from being modified. authentications = Collections.unmodifiableMap(authentications); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java index ce7f089c786..9475c4e37bb 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java @@ -134,7 +134,7 @@ private okhttp3.Call addGroupMembershipCall(String groupId, String userId, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -311,7 +311,7 @@ private okhttp3.Call attachPolicyToGroupCall(String groupId, String policyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -488,7 +488,7 @@ private okhttp3.Call attachPolicyToUserCall(String userId, String policyId, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -664,7 +664,7 @@ private okhttp3.Call createCredentialsCall(String userId, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -836,7 +836,7 @@ private okhttp3.Call createGroupCall(GroupCreation groupCreation, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1011,7 +1011,7 @@ private okhttp3.Call createPolicyCall(Policy policy, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1188,7 +1188,7 @@ private okhttp3.Call createUserCall(UserCreation userCreation, final ApiCallback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1373,7 +1373,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1566,7 +1566,7 @@ private okhttp3.Call deleteCredentialsCall(String userId, String accessKeyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1742,7 +1742,7 @@ private okhttp3.Call deleteGroupCall(String groupId, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1911,7 +1911,7 @@ private okhttp3.Call deleteGroupMembershipCall(String groupId, String userId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2087,7 +2087,7 @@ private okhttp3.Call deletePolicyCall(String policyId, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2255,7 +2255,7 @@ private okhttp3.Call deleteUserCall(String userId, final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2427,7 +2427,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2604,7 +2604,7 @@ private okhttp3.Call detachPolicyFromGroupCall(String groupId, String policyId, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2781,7 +2781,7 @@ private okhttp3.Call detachPolicyFromUserCall(String userId, String policyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3006,7 +3006,7 @@ public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -3023,7 +3023,7 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -3041,7 +3041,7 @@ public AuthenticationToken execute() throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -3059,7 +3059,7 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -3077,7 +3077,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callbac * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -3128,7 +3128,7 @@ private okhttp3.Call getCredentialsCall(String userId, String accessKeyId, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3307,7 +3307,7 @@ private okhttp3.Call getCurrentUserCall(final ApiCallback _callback) throws ApiE localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3454,7 +3454,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3626,7 +3626,7 @@ private okhttp3.Call getGroupCall(String groupId, final ApiCallback _callback) t localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3798,7 +3798,7 @@ private okhttp3.Call getGroupACLCall(String groupId, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3970,7 +3970,7 @@ private okhttp3.Call getPolicyCall(String policyId, final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4142,7 +4142,7 @@ private okhttp3.Call getUserCall(String userId, final ApiCallback _callback) thr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4326,7 +4326,7 @@ private okhttp3.Call listGroupMembersCall(String groupId, String prefix, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4538,7 +4538,7 @@ private okhttp3.Call listGroupPoliciesCall(String groupId, String prefix, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4754,7 +4754,7 @@ private okhttp3.Call listGroupsCall(String prefix, String after, Integer amount, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4957,7 +4957,7 @@ private okhttp3.Call listPoliciesCall(String prefix, String after, Integer amoun localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5161,7 +5161,7 @@ private okhttp3.Call listUserCredentialsCall(String userId, String prefix, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5378,7 +5378,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5595,7 +5595,7 @@ private okhttp3.Call listUserGroupsCall(String userId, String prefix, String aft localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5816,7 +5816,7 @@ private okhttp3.Call listUserPoliciesCall(String userId, String prefix, String a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -6043,7 +6043,7 @@ private okhttp3.Call listUsersCall(String prefix, String after, Integer amount, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -6406,7 +6406,7 @@ private okhttp3.Call setGroupACLCall(String groupId, ACL ACL, final ApiCallback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -6583,7 +6583,7 @@ private okhttp3.Call updatePolicyCall(String policyId, Policy policy, final ApiC localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java index 4a78a796eca..4cbfe887f27 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java @@ -123,7 +123,7 @@ private okhttp3.Call cherryPickCall(String repository, String branch, CherryPick localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -328,7 +328,7 @@ private okhttp3.Call createBranchCall(String repository, BranchCreation branchCr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -528,7 +528,7 @@ private okhttp3.Call deleteBranchCall(String repository, String branch, Boolean localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -737,7 +737,7 @@ private okhttp3.Call diffBranchCall(String repository, String branch, String aft localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -962,7 +962,7 @@ private okhttp3.Call getBranchCall(String repository, String branch, final ApiCa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1154,7 +1154,7 @@ private okhttp3.Call listBranchesCall(String repository, String prefix, String a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1361,7 +1361,7 @@ private okhttp3.Call resetBranchCall(String repository, String branch, ResetCrea localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1557,7 +1557,7 @@ private okhttp3.Call revertBranchCall(String repository, String branch, RevertCr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java index b051276275a..81cc5f97ead 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java @@ -121,7 +121,7 @@ private okhttp3.Call commitCall(String repository, String branch, CommitCreation localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -341,7 +341,7 @@ private okhttp3.Call getCommitCall(String repository, String commitId, final Api localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java index 6964e235fe2..3d654431023 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java @@ -113,7 +113,7 @@ private okhttp3.Call getConfigCall(final ApiCallback _callback) throws ApiExcept localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java index e4c976ac279..3b46a48d81f 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java @@ -130,7 +130,7 @@ private okhttp3.Call abortPresignMultipartUploadCall(String repository, String b localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -345,7 +345,7 @@ private okhttp3.Call completePresignMultipartUploadCall(String repository, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -571,7 +571,7 @@ private okhttp3.Call createPresignMultipartUploadCall(String repository, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -780,7 +780,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -976,7 +976,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1201,7 +1201,7 @@ public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1218,7 +1218,7 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1236,7 +1236,7 @@ public AuthenticationToken execute() throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1254,7 +1254,7 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1272,7 +1272,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callbac * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -1325,7 +1325,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1506,7 +1506,7 @@ private okhttp3.Call hardResetBranchCall(String repository, String branch, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1723,7 +1723,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java index 70011b6fc1b..5f2a701d359 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java @@ -123,7 +123,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -319,7 +319,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -544,7 +544,7 @@ public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -561,7 +561,7 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -579,7 +579,7 @@ public AuthenticationToken execute() throws ApiException { * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -597,7 +597,7 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -615,7 +615,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callbac * @http.response.details
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
- + @@ -668,7 +668,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -852,7 +852,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java index 098f0258595..b0f4d6607a2 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java @@ -121,7 +121,7 @@ private okhttp3.Call importCancelCall(String repository, String branch, String i localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -317,7 +317,7 @@ private okhttp3.Call importStartCall(String repository, String branch, ImportCre localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -520,7 +520,7 @@ private okhttp3.Call importStatusCall(String repository, String branch, String i localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java index f31b348964b..f419eb2f3e6 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java @@ -137,7 +137,7 @@ private okhttp3.Call createBranchProtectionRulePreflightCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -311,7 +311,7 @@ private okhttp3.Call createCommitRecordCall(String repository, CommitRecordCreat localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -502,7 +502,7 @@ private okhttp3.Call createSymlinkFileCall(String repository, String branch, Str localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -694,7 +694,7 @@ private okhttp3.Call deleteRepositoryMetadataCall(String repository, RepositoryM localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -865,7 +865,7 @@ private okhttp3.Call dumpRefsCall(String repository, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1194,7 +1194,7 @@ private okhttp3.Call getGarbageCollectionConfigCall(final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1342,7 +1342,7 @@ private okhttp3.Call getLakeFSVersionCall(final ApiCallback _callback) throws Ap localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1654,7 +1654,7 @@ private okhttp3.Call getStorageConfigCall(final ApiCallback _callback) throws Ap localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1814,7 +1814,7 @@ private okhttp3.Call getUsageReportSummaryCall(final ApiCallback _callback) thro localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1984,7 +1984,7 @@ private okhttp3.Call internalCreateBranchProtectionRuleCall(String repository, B localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2172,7 +2172,7 @@ private okhttp3.Call internalDeleteBranchProtectionRuleCall(String repository, I localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2359,7 +2359,7 @@ private okhttp3.Call internalDeleteGarbageCollectionRulesCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2538,7 +2538,7 @@ private okhttp3.Call internalGetBranchProtectionRulesCall(String repository, fin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2721,7 +2721,7 @@ private okhttp3.Call internalGetGarbageCollectionRulesCall(String repository, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2905,7 +2905,7 @@ private okhttp3.Call internalSetGarbageCollectionRulesCall(String repository, Ga localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3092,7 +3092,7 @@ private okhttp3.Call postStatsEventsCall(StatsEventsList statsEventsList, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3260,7 +3260,7 @@ private okhttp3.Call prepareGarbageCollectionCommitsCall(String repository, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3438,7 +3438,7 @@ private okhttp3.Call prepareGarbageCollectionUncommittedCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3632,7 +3632,7 @@ private okhttp3.Call restoreRefsCall(String repository, RefsRestore refsRestore, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3813,7 +3813,7 @@ private okhttp3.Call setGarbageCollectionRulesPreflightCall(String repository, f localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3982,7 +3982,7 @@ private okhttp3.Call setRepositoryMetadataCall(String repository, RepositoryMeta localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4504,7 +4504,7 @@ private okhttp3.Call stageObjectCall(String repository, String branch, String pa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4726,7 +4726,7 @@ private okhttp3.Call uploadObjectPreflightCall(String repository, String branch, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java index 8d8e51f62fa..b72d096e83a 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java @@ -115,7 +115,7 @@ private okhttp3.Call getMetaRangeCall(String repository, String metaRange, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -296,7 +296,7 @@ private okhttp3.Call getRangeCall(String repository, String range, final ApiCall localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java index 8f2ea7cc92d..a45c23100e4 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java @@ -126,7 +126,7 @@ private okhttp3.Call copyObjectCall(String repository, String branch, String des localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -341,7 +341,7 @@ private okhttp3.Call deleteObjectCall(String repository, String branch, String p localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -547,7 +547,7 @@ private okhttp3.Call deleteObjectsCall(String repository, String branch, PathLis localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -769,7 +769,7 @@ private okhttp3.Call getObjectCall(String repository, String ref, String path, S localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1020,7 +1020,7 @@ private okhttp3.Call getUnderlyingPropertiesCall(String repository, String ref, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1216,7 +1216,7 @@ private okhttp3.Call headObjectCall(String repository, String ref, String path, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "HEAD", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1451,7 +1451,7 @@ private okhttp3.Call listObjectsCall(String repository, String ref, Boolean user localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1710,7 +1710,7 @@ private okhttp3.Call statObjectCall(String repository, String ref, String path, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1953,7 +1953,7 @@ private okhttp3.Call uploadObjectCall(String repository, String branch, String p localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java index e266e9d9cd4..23892e0a897 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java @@ -141,7 +141,7 @@ private okhttp3.Call diffRefsCall(String repository, String leftRef, String righ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -386,7 +386,7 @@ private okhttp3.Call findMergeBaseCall(String repository, String sourceRef, Stri localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -612,7 +612,7 @@ private okhttp3.Call logCommitsCall(String repository, String ref, String after, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -883,7 +883,7 @@ private okhttp3.Call mergeIntoBranchCall(String repository, String sourceRef, St localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java index 2b45a54a744..d1b4d94a3c0 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java @@ -126,7 +126,7 @@ private okhttp3.Call createRepositoryCall(RepositoryCreation repositoryCreation, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -314,7 +314,7 @@ private okhttp3.Call deleteGCRulesCall(String repository, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -491,7 +491,7 @@ private okhttp3.Call deleteRepositoryCall(String repository, Boolean force, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -674,7 +674,7 @@ private okhttp3.Call dumpStatusCall(String repository, String taskId, final ApiC localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -859,7 +859,7 @@ private okhttp3.Call dumpSubmitCall(String repository, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1031,7 +1031,7 @@ private okhttp3.Call getBranchProtectionRulesCall(String repository, final ApiCa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1203,7 +1203,7 @@ private okhttp3.Call getGCRulesCall(String repository, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1375,7 +1375,7 @@ private okhttp3.Call getRepositoryCall(String repository, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1547,7 +1547,7 @@ private okhttp3.Call getRepositoryMetadataCall(String repository, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1730,7 +1730,7 @@ private okhttp3.Call listRepositoriesCall(String prefix, String after, Integer a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1926,7 +1926,7 @@ private okhttp3.Call restoreStatusCall(String repository, String taskId, final A localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2112,7 +2112,7 @@ private okhttp3.Call restoreSubmitCall(String repository, RefsRestore refsRestor localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2302,7 +2302,7 @@ private okhttp3.Call setBranchProtectionRulesCall(String repository, List | **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -1887,6 +1999,7 @@ get credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1921,6 +2034,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1968,7 +2087,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1997,6 +2116,7 @@ get current user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2030,6 +2150,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2071,7 +2197,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2096,6 +2222,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2130,6 +2257,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2175,7 +2308,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2204,6 +2337,7 @@ get group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2238,6 +2372,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2283,7 +2423,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2312,6 +2452,7 @@ get ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2347,6 +2488,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2392,7 +2539,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2421,6 +2568,7 @@ get policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2455,6 +2603,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2500,7 +2654,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2529,6 +2683,7 @@ get user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2563,6 +2718,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2608,7 +2769,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2637,6 +2798,7 @@ list group members * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2671,6 +2833,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2731,7 +2899,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2759,6 +2927,7 @@ list group policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2793,6 +2962,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2853,7 +3028,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2882,6 +3057,7 @@ list groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2916,6 +3092,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2966,7 +3148,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2994,6 +3176,7 @@ list policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3028,6 +3211,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3078,7 +3267,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3106,6 +3295,7 @@ list user credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3140,6 +3330,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3200,7 +3396,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3229,6 +3425,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3263,6 +3460,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3323,7 +3526,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3352,6 +3555,7 @@ list user groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3386,6 +3590,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3446,7 +3656,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3475,6 +3685,7 @@ list user policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3509,6 +3720,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3571,7 +3788,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3600,6 +3817,7 @@ list users * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3634,6 +3852,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3684,7 +3908,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3786,6 +4010,7 @@ set ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3820,6 +4045,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3868,7 +4099,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3897,6 +4128,7 @@ update policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3931,6 +4163,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3990,7 +4228,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/BranchesApi.md b/clients/python-legacy/docs/BranchesApi.md index 3cfc39c1b24..72c241149cb 100644 --- a/clients/python-legacy/docs/BranchesApi.md +++ b/clients/python-legacy/docs/BranchesApi.md @@ -23,6 +23,7 @@ Replay the changes from the given commit on the branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -58,6 +59,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -111,7 +118,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -143,6 +150,7 @@ create branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -177,6 +185,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -228,7 +242,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -260,6 +274,7 @@ delete branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -293,6 +308,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -349,7 +370,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -379,6 +400,7 @@ diff branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -413,6 +435,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -477,7 +505,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -506,6 +534,7 @@ get branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -540,6 +569,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -587,7 +622,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -616,6 +651,7 @@ list branches * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -650,6 +686,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -710,7 +752,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -739,6 +781,7 @@ reset branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -773,6 +816,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -825,7 +874,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -856,6 +905,7 @@ revert * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -890,6 +940,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -943,7 +999,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/CommitsApi.md b/clients/python-legacy/docs/CommitsApi.md index 85fa23f1a64..1aca799f978 100644 --- a/clients/python-legacy/docs/CommitsApi.md +++ b/clients/python-legacy/docs/CommitsApi.md @@ -17,6 +17,7 @@ create commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -52,6 +53,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -120,7 +127,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -153,6 +160,7 @@ get commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -187,6 +195,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -234,7 +248,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ConfigApi.md b/clients/python-legacy/docs/ConfigApi.md index dd037b3ae89..572ebb14bb1 100644 --- a/clients/python-legacy/docs/ConfigApi.md +++ b/clients/python-legacy/docs/ConfigApi.md @@ -18,6 +18,7 @@ retrieve lakeFS configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -52,6 +53,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -92,7 +99,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ExperimentalApi.md b/clients/python-legacy/docs/ExperimentalApi.md index 74581bf2de5..17c8f8e0d06 100644 --- a/clients/python-legacy/docs/ExperimentalApi.md +++ b/clients/python-legacy/docs/ExperimentalApi.md @@ -26,6 +26,7 @@ Aborts a presign multipart upload. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -60,6 +61,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -122,7 +129,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -154,6 +161,7 @@ Completes a presign multipart upload by assembling the uploaded parts. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -190,6 +198,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -264,7 +278,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -297,6 +311,7 @@ Initiates a multipart upload and returns an upload ID with presigned URLs for ea * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -331,6 +346,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -391,7 +412,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -421,6 +442,7 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -455,6 +477,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -517,7 +545,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -547,6 +575,7 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -580,6 +609,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -626,7 +661,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -712,7 +747,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | - | +**200** | successful login | * Set-Cookie -
| **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -728,6 +763,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -762,6 +798,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -807,7 +849,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -838,6 +880,7 @@ Relocate branch to refer to ref. Branch must not contain uncommitted data. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -871,6 +914,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -929,7 +978,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -960,6 +1009,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -994,6 +1044,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1054,7 +1110,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ExternalApi.md b/clients/python-legacy/docs/ExternalApi.md index 5f11c9b14be..3f5d31d575f 100644 --- a/clients/python-legacy/docs/ExternalApi.md +++ b/clients/python-legacy/docs/ExternalApi.md @@ -20,6 +20,7 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -54,6 +55,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -116,7 +123,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -146,6 +153,7 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -179,6 +187,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -225,7 +239,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -311,7 +325,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | - | +**200** | successful login | * Set-Cookie -
| **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -327,6 +341,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -361,6 +376,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -406,7 +427,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -435,6 +456,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -469,6 +491,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -529,7 +557,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ImportApi.md b/clients/python-legacy/docs/ImportApi.md index 8e693aa4e4a..ae2e9977f92 100644 --- a/clients/python-legacy/docs/ImportApi.md +++ b/clients/python-legacy/docs/ImportApi.md @@ -18,6 +18,7 @@ cancel ongoing import * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -51,6 +52,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -99,7 +106,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -130,6 +137,7 @@ import data from object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -165,6 +173,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -232,7 +246,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -263,6 +277,7 @@ get import status * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -297,6 +312,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -346,7 +367,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/InternalApi.md b/clients/python-legacy/docs/InternalApi.md index e191241d951..2989fa1fb75 100644 --- a/clients/python-legacy/docs/InternalApi.md +++ b/clients/python-legacy/docs/InternalApi.md @@ -42,6 +42,7 @@ Method | HTTP request | Description * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -75,6 +76,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -118,7 +125,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -148,6 +155,7 @@ create commit record * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -182,6 +190,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -243,7 +257,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -274,6 +288,7 @@ creates symlink files corresponding to the given directory * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -308,6 +323,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -366,7 +387,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -397,6 +418,7 @@ Delete specified keys from the repository's metadata. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -431,6 +453,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -481,7 +509,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -509,6 +537,7 @@ Dump repository refs (tags, commits, branches) to object store Deprecated: a new * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -543,6 +572,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -588,7 +623,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -684,6 +719,7 @@ get information of gc settings * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -718,6 +754,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -758,7 +800,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -786,6 +828,7 @@ get version of lakeFS server * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -820,6 +863,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -860,7 +909,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -952,6 +1001,7 @@ retrieve lakeFS storage configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -986,6 +1036,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1026,7 +1082,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1052,6 +1108,7 @@ get usage report summary * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1086,6 +1143,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1127,7 +1190,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1157,6 +1220,7 @@ This endpoint does not need any parameter. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1191,6 +1255,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1238,7 +1308,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1267,6 +1337,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1301,6 +1372,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1348,7 +1425,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1377,6 +1454,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1410,6 +1488,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1453,7 +1537,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1482,6 +1566,7 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1516,6 +1601,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1561,7 +1652,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1590,6 +1681,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1624,6 +1716,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1668,7 +1766,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1697,6 +1795,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1731,6 +1830,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1784,7 +1889,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1813,6 +1918,7 @@ post stats events, this endpoint is meant for internal use only * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1847,6 +1953,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1899,7 +2011,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1928,6 +2040,7 @@ save lists of active commits for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1962,6 +2075,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2007,7 +2126,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2037,6 +2156,7 @@ save repository uncommitted metadata for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2072,6 +2192,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2130,7 +2256,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2161,6 +2287,7 @@ Restore repository refs (tags, commits, branches) from object store. Deprecated: * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2195,6 +2322,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2246,7 +2379,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2276,6 +2409,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2309,6 +2443,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2352,7 +2492,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2383,6 +2523,7 @@ Set repository metadata. This will only add or update the provided keys, and wil * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2417,6 +2558,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2467,7 +2614,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2646,6 +2793,7 @@ stage an object's metadata for the given branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2681,6 +2829,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2742,7 +2896,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2773,6 +2927,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2806,6 +2961,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2853,7 +3014,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/MetadataApi.md b/clients/python-legacy/docs/MetadataApi.md index 9b443620338..37b4dfbc2a2 100644 --- a/clients/python-legacy/docs/MetadataApi.md +++ b/clients/python-legacy/docs/MetadataApi.md @@ -17,6 +17,7 @@ return URI to a meta-range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -51,6 +52,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -98,7 +105,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -127,6 +134,7 @@ return URI to a range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -161,6 +169,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -208,7 +222,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ObjectsApi.md b/clients/python-legacy/docs/ObjectsApi.md index e84269d94c9..8509add8cb8 100644 --- a/clients/python-legacy/docs/ObjectsApi.md +++ b/clients/python-legacy/docs/ObjectsApi.md @@ -24,6 +24,7 @@ create a copy of an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -59,6 +60,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -114,7 +121,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -145,6 +152,7 @@ delete object. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -178,6 +186,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -236,7 +250,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -266,6 +280,7 @@ delete objects. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -301,6 +316,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -365,7 +386,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -395,6 +416,7 @@ get object content * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -428,6 +450,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -492,7 +520,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -526,6 +554,7 @@ get object properties on underlying storage * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -560,6 +589,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -609,7 +644,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -638,6 +673,7 @@ check if object exists * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -670,6 +706,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -728,7 +770,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -760,6 +802,7 @@ list objects under a given prefix * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -794,6 +837,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -862,7 +911,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -891,6 +940,7 @@ get object metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -925,6 +975,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -987,7 +1043,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1018,6 +1074,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1052,6 +1109,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1116,7 +1179,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/RefsApi.md b/clients/python-legacy/docs/RefsApi.md index b66a3d0afa8..73df34a2325 100644 --- a/clients/python-legacy/docs/RefsApi.md +++ b/clients/python-legacy/docs/RefsApi.md @@ -19,6 +19,7 @@ diff references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -53,6 +54,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -121,7 +128,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -150,6 +157,7 @@ find the merge base for 2 references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -184,6 +192,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -233,7 +247,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -263,6 +277,7 @@ get commit log from ref. If both objects and prefixes are empty, return all comm * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -297,6 +312,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -373,7 +394,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -402,6 +423,7 @@ merge references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -437,6 +459,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -504,7 +532,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/RepositoriesApi.md b/clients/python-legacy/docs/RepositoriesApi.md index 55c47f970df..cff989d7d17 100644 --- a/clients/python-legacy/docs/RepositoriesApi.md +++ b/clients/python-legacy/docs/RepositoriesApi.md @@ -29,6 +29,7 @@ create repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -64,6 +65,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -126,7 +133,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -156,6 +163,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -189,6 +197,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -232,7 +246,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -262,6 +276,7 @@ delete repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -295,6 +310,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -349,7 +370,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -378,6 +399,7 @@ Status of a repository dump task * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -412,6 +434,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -459,7 +487,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -489,6 +517,7 @@ Backup the repository metadata (tags, commits, branches) and save the backup to * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -523,6 +552,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -568,7 +603,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -597,6 +632,7 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -631,6 +667,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -676,7 +718,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -705,6 +747,7 @@ get repository GC rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -739,6 +782,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -784,7 +833,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -813,6 +862,7 @@ get repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -847,6 +897,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -892,7 +948,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -921,6 +977,7 @@ get repository metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -955,6 +1012,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1000,7 +1063,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1029,6 +1092,7 @@ list repositories * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1063,6 +1127,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1113,7 +1183,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1141,6 +1211,7 @@ Status of a restore request * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1175,6 +1246,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1222,7 +1299,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1252,6 +1329,7 @@ Restore repository from a dump in the object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1287,6 +1365,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1339,7 +1423,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1369,6 +1453,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1403,6 +1488,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1461,7 +1552,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1493,6 +1584,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1527,6 +1619,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1580,7 +1678,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/StagingApi.md b/clients/python-legacy/docs/StagingApi.md index 4049f989555..beea3d69b80 100644 --- a/clients/python-legacy/docs/StagingApi.md +++ b/clients/python-legacy/docs/StagingApi.md @@ -17,6 +17,7 @@ generate an address to which the client can upload an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -51,6 +52,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -111,7 +118,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -142,6 +149,7 @@ Link the physical address with the path in lakeFS, creating an uncommitted chang * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -178,6 +186,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -253,7 +267,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/TagsApi.md b/clients/python-legacy/docs/TagsApi.md index 35dcada5852..f29449edd29 100644 --- a/clients/python-legacy/docs/TagsApi.md +++ b/clients/python-legacy/docs/TagsApi.md @@ -19,6 +19,7 @@ create tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -54,6 +55,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -105,7 +112,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -137,6 +144,7 @@ delete tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -170,6 +178,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -226,7 +240,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -256,6 +270,7 @@ get tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -290,6 +305,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -337,7 +358,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -366,6 +387,7 @@ list tags * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -400,6 +422,12 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_client.Configuration( + username = 'YOUR_USERNAME', + password = 'YOUR_PASSWORD' +) + # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -460,7 +488,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/lakefs_client/api/actions_api.py b/clients/python-legacy/lakefs_client/api/actions_api.py index 1d64126e2fd..5d6b95e4161 100644 --- a/clients/python-legacy/lakefs_client/api/actions_api.py +++ b/clients/python-legacy/lakefs_client/api/actions_api.py @@ -45,6 +45,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -106,6 +107,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -174,6 +176,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -255,6 +258,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/auth_api.py b/clients/python-legacy/lakefs_client/api/auth_api.py index c1351e33ce4..39a79d71e3d 100644 --- a/clients/python-legacy/lakefs_client/api/auth_api.py +++ b/clients/python-legacy/lakefs_client/api/auth_api.py @@ -62,6 +62,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -123,6 +124,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -184,6 +186,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -245,6 +248,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -300,6 +304,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -354,6 +359,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -410,6 +416,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -464,6 +471,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -531,6 +539,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -592,6 +601,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -647,6 +657,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -708,6 +719,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -763,6 +775,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -818,6 +831,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -879,6 +893,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -940,6 +955,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1049,6 +1065,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1110,6 +1127,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1158,6 +1176,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1213,6 +1232,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1268,6 +1288,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1323,6 +1344,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1378,6 +1400,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1433,6 +1456,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1509,6 +1533,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1585,6 +1610,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1654,6 +1680,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1723,6 +1750,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1799,6 +1827,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1875,6 +1904,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1951,6 +1981,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -2032,6 +2063,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -2149,6 +2181,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -2211,6 +2244,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/branches_api.py b/clients/python-legacy/lakefs_client/api/branches_api.py index aa2a208efd5..34d4149ac0d 100644 --- a/clients/python-legacy/lakefs_client/api/branches_api.py +++ b/clients/python-legacy/lakefs_client/api/branches_api.py @@ -50,6 +50,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -118,6 +119,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -181,6 +183,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -247,6 +250,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -334,6 +338,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -395,6 +400,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -471,6 +477,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -539,6 +546,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/commits_api.py b/clients/python-legacy/lakefs_client/api/commits_api.py index 25012848d0b..9b831a15f0c 100644 --- a/clients/python-legacy/lakefs_client/api/commits_api.py +++ b/clients/python-legacy/lakefs_client/api/commits_api.py @@ -44,6 +44,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -117,6 +118,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/config_api.py b/clients/python-legacy/lakefs_client/api/config_api.py index 5fd9bfc6eaa..a2fa0ef7f86 100644 --- a/clients/python-legacy/lakefs_client/api/config_api.py +++ b/clients/python-legacy/lakefs_client/api/config_api.py @@ -43,6 +43,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/experimental_api.py b/clients/python-legacy/lakefs_client/api/experimental_api.py index 0e5abca4d8f..3047dabc63b 100644 --- a/clients/python-legacy/lakefs_client/api/experimental_api.py +++ b/clients/python-legacy/lakefs_client/api/experimental_api.py @@ -52,6 +52,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -131,6 +132,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -210,6 +212,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -282,6 +285,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -349,6 +353,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -458,6 +463,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -513,6 +519,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -585,6 +592,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/external_api.py b/clients/python-legacy/lakefs_client/api/external_api.py index 26caa432469..b521b1e18f1 100644 --- a/clients/python-legacy/lakefs_client/api/external_api.py +++ b/clients/python-legacy/lakefs_client/api/external_api.py @@ -47,6 +47,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -114,6 +115,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -223,6 +225,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -278,6 +281,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/import_api.py b/clients/python-legacy/lakefs_client/api/import_api.py index e53cc50f152..d858de45773 100644 --- a/clients/python-legacy/lakefs_client/api/import_api.py +++ b/clients/python-legacy/lakefs_client/api/import_api.py @@ -45,6 +45,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -112,6 +113,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -180,6 +182,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/internal_api.py b/clients/python-legacy/lakefs_client/api/internal_api.py index dee2ff16cc4..272c0fcf49a 100644 --- a/clients/python-legacy/lakefs_client/api/internal_api.py +++ b/clients/python-legacy/lakefs_client/api/internal_api.py @@ -66,6 +66,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -121,6 +122,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -183,6 +185,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -249,6 +252,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -311,6 +315,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -408,6 +413,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -456,6 +462,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -546,6 +553,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -594,6 +602,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -643,6 +652,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -705,6 +715,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -767,6 +778,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -822,6 +834,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -877,6 +890,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -932,6 +946,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -994,6 +1009,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1050,6 +1066,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1105,6 +1122,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1166,6 +1184,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1228,6 +1247,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1283,6 +1303,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1445,6 +1466,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1519,6 +1541,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/metadata_api.py b/clients/python-legacy/lakefs_client/api/metadata_api.py index 849c5493623..e790581922a 100644 --- a/clients/python-legacy/lakefs_client/api/metadata_api.py +++ b/clients/python-legacy/lakefs_client/api/metadata_api.py @@ -43,6 +43,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -104,6 +105,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/objects_api.py b/clients/python-legacy/lakefs_client/api/objects_api.py index 5941b74039c..1308d59e9d4 100644 --- a/clients/python-legacy/lakefs_client/api/objects_api.py +++ b/clients/python-legacy/lakefs_client/api/objects_api.py @@ -48,6 +48,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -122,6 +123,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -194,6 +196,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -267,6 +270,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -357,6 +361,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -424,6 +429,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -501,6 +507,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -598,6 +605,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -675,6 +683,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/refs_api.py b/clients/python-legacy/lakefs_client/api/refs_api.py index 1b6549c4c77..0e466922df6 100644 --- a/clients/python-legacy/lakefs_client/api/refs_api.py +++ b/clients/python-legacy/lakefs_client/api/refs_api.py @@ -47,6 +47,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -151,6 +152,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -218,6 +220,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -327,6 +330,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/repositories_api.py b/clients/python-legacy/lakefs_client/api/repositories_api.py index 0f8b582acdd..62c4345021f 100644 --- a/clients/python-legacy/lakefs_client/api/repositories_api.py +++ b/clients/python-legacy/lakefs_client/api/repositories_api.py @@ -52,6 +52,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -113,6 +114,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -168,6 +170,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -228,6 +231,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -289,6 +293,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -344,6 +349,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -399,6 +405,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -454,6 +461,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -509,6 +517,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -564,6 +573,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -633,6 +643,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -694,6 +705,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -756,6 +768,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -823,6 +836,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/staging_api.py b/clients/python-legacy/lakefs_client/api/staging_api.py index f2e3e3c4d51..29095e52235 100644 --- a/clients/python-legacy/lakefs_client/api/staging_api.py +++ b/clients/python-legacy/lakefs_client/api/staging_api.py @@ -45,6 +45,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -117,6 +118,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/tags_api.py b/clients/python-legacy/lakefs_client/api/tags_api.py index 3ef623ce6e8..6c3cb65fe96 100644 --- a/clients/python-legacy/lakefs_client/api/tags_api.py +++ b/clients/python-legacy/lakefs_client/api/tags_api.py @@ -45,6 +45,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -107,6 +108,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -173,6 +175,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -234,6 +237,7 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', + 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/configuration.py b/clients/python-legacy/lakefs_client/configuration.py index 2dfcc040680..803c8596028 100644 --- a/clients/python-legacy/lakefs_client/configuration.py +++ b/clients/python-legacy/lakefs_client/configuration.py @@ -419,6 +419,13 @@ def auth_settings(self): 'cookie_auth', ), } + if self.username is not None and self.password is not None: + auth['external_auth'] = { + 'type': 'basic', + 'in': 'header', + 'key': 'Authorization', + 'value': self.get_basic_auth_token() + } if self.access_token is not None: auth['jwt_token'] = { 'type': 'bearer', diff --git a/clients/python/README.md b/clients/python/README.md index fe509cad3cf..1dff72e5c2f 100644 --- a/clients/python/README.md +++ b/clients/python/README.md @@ -78,6 +78,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -389,6 +395,11 @@ Authentication schemes defined for the API: - **API key parameter name**: saml_auth_session - **Location**: + +### external_auth + +- **Type**: HTTP basic authentication + ## Author diff --git a/clients/python/docs/ActionsApi.md b/clients/python/docs/ActionsApi.md index a35752995f8..0be0301241f 100644 --- a/clients/python/docs/ActionsApi.md +++ b/clients/python/docs/ActionsApi.md @@ -19,6 +19,7 @@ get a run * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -54,6 +55,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -103,7 +110,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -131,6 +138,7 @@ get run hook output * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -165,6 +173,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -216,7 +230,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -244,6 +258,7 @@ list runs * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -279,6 +294,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -334,7 +355,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -362,6 +383,7 @@ list run hooks * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -397,6 +419,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -450,7 +478,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/AuthApi.md b/clients/python/docs/AuthApi.md index 2d3c76f3d38..674654803b6 100644 --- a/clients/python/docs/AuthApi.md +++ b/clients/python/docs/AuthApi.md @@ -51,6 +51,7 @@ add group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -85,6 +86,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -132,7 +139,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -160,6 +167,7 @@ attach policy to group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -194,6 +202,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -241,7 +255,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -269,6 +283,7 @@ attach policy to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -303,6 +318,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -350,7 +371,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -378,6 +399,7 @@ create credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -413,6 +435,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -460,7 +488,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -488,6 +516,7 @@ create group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -524,6 +553,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -571,7 +606,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -599,6 +634,7 @@ create policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -634,6 +670,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -681,7 +723,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -710,6 +752,7 @@ create user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -746,6 +789,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -793,7 +842,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -822,6 +871,7 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -857,6 +907,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -906,7 +962,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -935,6 +991,7 @@ delete credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -969,6 +1026,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1016,7 +1079,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1044,6 +1107,7 @@ delete group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1078,6 +1142,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1123,7 +1193,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1151,6 +1221,7 @@ delete group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1185,6 +1256,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1232,7 +1309,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1260,6 +1337,7 @@ delete policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1294,6 +1372,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1339,7 +1423,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1367,6 +1451,7 @@ delete user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1401,6 +1486,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1446,7 +1537,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1474,6 +1565,7 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1508,6 +1600,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1555,7 +1653,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1583,6 +1681,7 @@ detach policy from group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1617,6 +1716,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1664,7 +1769,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1692,6 +1797,7 @@ detach policy from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1726,6 +1832,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1773,7 +1885,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1857,7 +1969,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | - | +**200** | successful login | * Set-Cookie -
| **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -1873,6 +1985,7 @@ get credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1908,6 +2021,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1957,7 +2076,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1985,6 +2104,7 @@ get current user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2020,6 +2140,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2063,7 +2189,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2087,6 +2213,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2122,6 +2249,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2169,7 +2302,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2197,6 +2330,7 @@ get group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2232,6 +2366,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2279,7 +2419,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2307,6 +2447,7 @@ get ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2342,6 +2483,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2389,7 +2536,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2417,6 +2564,7 @@ get policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2452,6 +2600,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2499,7 +2653,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2527,6 +2681,7 @@ get user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2562,6 +2717,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2609,7 +2770,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2637,6 +2798,7 @@ list group members * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2672,6 +2834,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2725,7 +2893,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2752,6 +2920,7 @@ list group policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2787,6 +2956,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2840,7 +3015,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2868,6 +3043,7 @@ list groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2903,6 +3079,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2954,7 +3136,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2981,6 +3163,7 @@ list policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3016,6 +3199,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3067,7 +3256,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3094,6 +3283,7 @@ list user credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3129,6 +3319,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3182,7 +3378,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3210,6 +3406,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3245,6 +3442,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3298,7 +3501,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3326,6 +3529,7 @@ list user groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3361,6 +3565,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3414,7 +3624,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3442,6 +3652,7 @@ list user policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3477,6 +3688,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3532,7 +3749,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3560,6 +3777,7 @@ list users * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3595,6 +3813,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3646,7 +3870,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3745,6 +3969,7 @@ set ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3780,6 +4005,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3827,7 +4058,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3855,6 +4086,7 @@ update policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3890,6 +4122,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3939,7 +4177,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/BranchesApi.md b/clients/python/docs/BranchesApi.md index 33c09474b8f..9d4487c73d6 100644 --- a/clients/python/docs/BranchesApi.md +++ b/clients/python/docs/BranchesApi.md @@ -23,6 +23,7 @@ Replay the changes from the given commit on the branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -59,6 +60,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -110,7 +117,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -141,6 +148,7 @@ create branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -176,6 +184,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -225,7 +239,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -256,6 +270,7 @@ delete branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -290,6 +305,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -339,7 +360,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -368,6 +389,7 @@ diff branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -403,6 +425,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -460,7 +488,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -488,6 +516,7 @@ get branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -523,6 +552,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -572,7 +607,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -600,6 +635,7 @@ list branches * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -635,6 +671,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -688,7 +730,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -716,6 +758,7 @@ reset branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -751,6 +794,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -800,7 +849,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -830,6 +879,7 @@ revert * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -865,6 +915,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -914,7 +970,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/CommitsApi.md b/clients/python/docs/CommitsApi.md index 067f4bdaf84..35b354efbce 100644 --- a/clients/python/docs/CommitsApi.md +++ b/clients/python/docs/CommitsApi.md @@ -17,6 +17,7 @@ create commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -53,6 +54,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -106,7 +113,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -138,6 +145,7 @@ get commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -173,6 +181,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -222,7 +236,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ConfigApi.md b/clients/python/docs/ConfigApi.md index bb153b51290..26600fb0385 100644 --- a/clients/python/docs/ConfigApi.md +++ b/clients/python/docs/ConfigApi.md @@ -18,6 +18,7 @@ retrieve lakeFS configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -53,6 +54,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -95,7 +102,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ExperimentalApi.md b/clients/python/docs/ExperimentalApi.md index ae8bbbaf53d..29b10bee524 100644 --- a/clients/python/docs/ExperimentalApi.md +++ b/clients/python/docs/ExperimentalApi.md @@ -26,6 +26,7 @@ Aborts a presign multipart upload. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -61,6 +62,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -114,7 +121,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -145,6 +152,7 @@ Completes a presign multipart upload by assembling the uploaded parts. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -181,6 +189,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -236,7 +250,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -268,6 +282,7 @@ Initiates a multipart upload and returns an upload ID with presigned URLs for ea * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -303,6 +318,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -356,7 +377,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -385,6 +406,7 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -420,6 +442,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -469,7 +497,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -498,6 +526,7 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -532,6 +561,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -579,7 +614,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -663,7 +698,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | - | +**200** | successful login | * Set-Cookie -
| **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -679,6 +714,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -714,6 +750,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -761,7 +803,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -791,6 +833,7 @@ Relocate branch to refer to ref. Branch must not contain uncommitted data. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -825,6 +868,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -876,7 +925,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -906,6 +955,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -941,6 +991,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -994,7 +1050,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ExternalApi.md b/clients/python/docs/ExternalApi.md index c0f947f946f..de30ab65db5 100644 --- a/clients/python/docs/ExternalApi.md +++ b/clients/python/docs/ExternalApi.md @@ -20,6 +20,7 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -55,6 +56,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -104,7 +111,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -133,6 +140,7 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -167,6 +175,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -214,7 +228,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -298,7 +312,7 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| -**200** | successful login | - | +**200** | successful login | * Set-Cookie -
| **401** | Unauthorized | - | **420** | too many requests | - | **0** | Internal Server Error | - | @@ -314,6 +328,7 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -349,6 +364,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -396,7 +417,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -424,6 +445,7 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -459,6 +481,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -512,7 +540,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ImportApi.md b/clients/python/docs/ImportApi.md index 496f2ac4369..689c79485d2 100644 --- a/clients/python/docs/ImportApi.md +++ b/clients/python/docs/ImportApi.md @@ -18,6 +18,7 @@ cancel ongoing import * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -52,6 +53,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -101,7 +108,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -131,6 +138,7 @@ import data from object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -167,6 +175,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -218,7 +232,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -248,6 +262,7 @@ get import status * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -283,6 +298,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -334,7 +355,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/InternalApi.md b/clients/python/docs/InternalApi.md index d45cfa5599c..ea8fd1e8219 100644 --- a/clients/python/docs/InternalApi.md +++ b/clients/python/docs/InternalApi.md @@ -42,6 +42,7 @@ Method | HTTP request | Description * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -76,6 +77,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -120,7 +127,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -149,6 +156,7 @@ create commit record * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -184,6 +192,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -231,7 +245,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -261,6 +275,7 @@ creates symlink files corresponding to the given directory * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -296,6 +311,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -347,7 +368,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -377,6 +398,7 @@ Delete specified keys from the repository's metadata. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -412,6 +434,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -459,7 +487,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -486,6 +514,7 @@ Dump repository refs (tags, commits, branches) to object store Deprecated: a new * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -521,6 +550,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -568,7 +603,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -665,6 +700,7 @@ get information of gc settings * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -700,6 +736,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -742,7 +784,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -769,6 +811,7 @@ get version of lakeFS server * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -804,6 +847,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -846,7 +895,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -939,6 +988,7 @@ retrieve lakeFS storage configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -974,6 +1024,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1016,7 +1072,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1041,6 +1097,7 @@ get usage report summary * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1076,6 +1133,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1119,7 +1182,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1148,6 +1211,7 @@ This endpoint does not need any parameter. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1183,6 +1247,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1229,7 +1299,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1257,6 +1327,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1292,6 +1363,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1338,7 +1415,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1366,6 +1443,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1400,6 +1478,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1444,7 +1528,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1472,6 +1556,7 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1507,6 +1592,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1554,7 +1645,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1582,6 +1673,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1617,6 +1709,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1663,7 +1761,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1691,6 +1789,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1726,6 +1825,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1772,7 +1877,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1800,6 +1905,7 @@ post stats events, this endpoint is meant for internal use only * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1835,6 +1941,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1880,7 +1992,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1908,6 +2020,7 @@ save lists of active commits for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1943,6 +2056,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1990,7 +2109,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2019,6 +2138,7 @@ save repository uncommitted metadata for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2055,6 +2175,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2104,7 +2230,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2134,6 +2260,7 @@ Restore repository refs (tags, commits, branches) from object store. Deprecated: * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2169,6 +2296,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2216,7 +2349,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2245,6 +2378,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2279,6 +2413,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2323,7 +2463,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2353,6 +2493,7 @@ Set repository metadata. This will only add or update the provided keys, and wil * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2388,6 +2529,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2435,7 +2582,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2606,6 +2753,7 @@ stage an object's metadata for the given branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2642,6 +2790,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2695,7 +2849,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2725,6 +2879,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2759,6 +2914,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2807,7 +2968,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/MetadataApi.md b/clients/python/docs/MetadataApi.md index 248e02e2629..ba9973040b3 100644 --- a/clients/python/docs/MetadataApi.md +++ b/clients/python/docs/MetadataApi.md @@ -17,6 +17,7 @@ return URI to a meta-range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -52,6 +53,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -101,7 +108,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -129,6 +136,7 @@ return URI to a range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -164,6 +172,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -213,7 +227,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ObjectsApi.md b/clients/python/docs/ObjectsApi.md index a9ab5b4e74a..5e28ff4ac24 100644 --- a/clients/python/docs/ObjectsApi.md +++ b/clients/python/docs/ObjectsApi.md @@ -24,6 +24,7 @@ create a copy of an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -60,6 +61,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -113,7 +120,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -143,6 +150,7 @@ delete object. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -177,6 +185,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -228,7 +242,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -257,6 +271,7 @@ delete objects. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -293,6 +308,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -346,7 +367,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -375,6 +396,7 @@ get object content * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -409,6 +431,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -466,7 +494,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -499,6 +527,7 @@ get object properties on underlying storage * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -534,6 +563,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -585,7 +620,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -613,6 +648,7 @@ check if object exists * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -647,6 +683,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -698,7 +740,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -729,6 +771,7 @@ list objects under a given prefix * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -764,6 +807,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -825,7 +874,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -853,6 +902,7 @@ get object metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -888,6 +938,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -943,7 +999,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -973,6 +1029,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1008,6 +1065,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1066,7 +1129,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/RefsApi.md b/clients/python/docs/RefsApi.md index ac999a2ff24..1c1a9df2118 100644 --- a/clients/python/docs/RefsApi.md +++ b/clients/python/docs/RefsApi.md @@ -19,6 +19,7 @@ diff references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -54,6 +55,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -115,7 +122,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -143,6 +150,7 @@ find the merge base for 2 references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -178,6 +186,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -229,7 +243,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -258,6 +272,7 @@ get commit log from ref. If both objects and prefixes are empty, return all comm * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -293,6 +308,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -358,7 +379,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -386,6 +407,7 @@ merge references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -422,6 +444,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -475,7 +503,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/RepositoriesApi.md b/clients/python/docs/RepositoriesApi.md index 6db6216fc8d..a0407f7aafd 100644 --- a/clients/python/docs/RepositoriesApi.md +++ b/clients/python/docs/RepositoriesApi.md @@ -29,6 +29,7 @@ create repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -65,6 +66,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -114,7 +121,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -143,6 +150,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -177,6 +185,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -221,7 +235,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -250,6 +264,7 @@ delete repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -284,6 +299,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -331,7 +352,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -359,6 +380,7 @@ Status of a repository dump task * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -394,6 +416,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -443,7 +471,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -472,6 +500,7 @@ Backup the repository metadata (tags, commits, branches) and save the backup to * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -507,6 +536,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -554,7 +589,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -582,6 +617,7 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -617,6 +653,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -664,7 +706,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -692,6 +734,7 @@ get repository GC rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -727,6 +770,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -774,7 +823,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -802,6 +851,7 @@ get repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -837,6 +887,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -884,7 +940,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -912,6 +968,7 @@ get repository metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -946,6 +1003,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -993,7 +1056,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1021,6 +1084,7 @@ list repositories * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1056,6 +1120,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1107,7 +1177,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1134,6 +1204,7 @@ Status of a restore request * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1169,6 +1240,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1218,7 +1295,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1247,6 +1324,7 @@ Restore repository from a dump in the object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1283,6 +1361,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1332,7 +1416,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1361,6 +1445,7 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1396,6 +1481,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1444,7 +1535,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1475,6 +1566,7 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1510,6 +1602,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1556,7 +1654,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/StagingApi.md b/clients/python/docs/StagingApi.md index ae82b69ba5f..fc9aca5cf3e 100644 --- a/clients/python/docs/StagingApi.md +++ b/clients/python/docs/StagingApi.md @@ -17,6 +17,7 @@ generate an address to which the client can upload an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -52,6 +53,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -105,7 +112,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -135,6 +142,7 @@ Link the physical address with the path in lakeFS, creating an uncommitted chang * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -171,6 +179,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -226,7 +240,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/TagsApi.md b/clients/python/docs/TagsApi.md index 8deb20e8598..41edd868455 100644 --- a/clients/python/docs/TagsApi.md +++ b/clients/python/docs/TagsApi.md @@ -19,6 +19,7 @@ create tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -55,6 +56,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -104,7 +111,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -135,6 +142,7 @@ delete tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -169,6 +177,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -218,7 +232,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -247,6 +261,7 @@ get tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -282,6 +297,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -331,7 +352,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -359,6 +380,7 @@ list tags * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): +* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -394,6 +416,12 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' +# Configure HTTP basic authorization: external_auth +configuration = lakefs_sdk.Configuration( + username = os.environ["USERNAME"], + password = os.environ["PASSWORD"] +) + # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -447,7 +475,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/lakefs_sdk/api/actions_api.py b/clients/python/lakefs_sdk/api/actions_api.py index f60b970d603..f39c48d2091 100644 --- a/clients/python/lakefs_sdk/api/actions_api.py +++ b/clients/python/lakefs_sdk/api/actions_api.py @@ -170,7 +170,7 @@ def get_run_with_http_info(self, repository : StrictStr, run_id : StrictStr, **k ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ActionRun", @@ -326,7 +326,7 @@ def get_run_hook_output_with_http_info(self, repository : StrictStr, run_id : St ['application/octet-stream', 'application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "bytearray", @@ -498,7 +498,7 @@ def list_repository_runs_with_http_info(self, repository : StrictStr, after : An ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ActionRunList", @@ -662,7 +662,7 @@ def list_run_hooks_with_http_info(self, repository : StrictStr, run_id : StrictS ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "HookRunList", diff --git a/clients/python/lakefs_sdk/api/auth_api.py b/clients/python/lakefs_sdk/api/auth_api.py index 8211bfc0dec..ae451be79ad 100644 --- a/clients/python/lakefs_sdk/api/auth_api.py +++ b/clients/python/lakefs_sdk/api/auth_api.py @@ -186,7 +186,7 @@ def add_group_membership_with_http_info(self, group_id : StrictStr, user_id : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -329,7 +329,7 @@ def attach_policy_to_group_with_http_info(self, group_id : StrictStr, policy_id ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -472,7 +472,7 @@ def attach_policy_to_user_with_http_info(self, user_id : StrictStr, policy_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -607,7 +607,7 @@ def create_credentials_with_http_info(self, user_id : StrictStr, **kwargs) -> Ap ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "CredentialsWithSecret", @@ -754,7 +754,7 @@ def create_group_with_http_info(self, group_creation : Optional[GroupCreation] = _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Group", @@ -901,7 +901,7 @@ def create_policy_with_http_info(self, policy : Policy, **kwargs) -> ApiResponse _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Policy", @@ -1049,7 +1049,7 @@ def create_user_with_http_info(self, user_creation : Optional[UserCreation] = No _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "User", @@ -1213,7 +1213,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1356,7 +1356,7 @@ def delete_credentials_with_http_info(self, user_id : StrictStr, access_key_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1491,7 +1491,7 @@ def delete_group_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiResp ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1634,7 +1634,7 @@ def delete_group_membership_with_http_info(self, group_id : StrictStr, user_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1769,7 +1769,7 @@ def delete_policy_with_http_info(self, policy_id : StrictStr, **kwargs) -> ApiRe ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1904,7 +1904,7 @@ def delete_user_with_http_info(self, user_id : StrictStr, **kwargs) -> ApiRespon ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2047,7 +2047,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2190,7 +2190,7 @@ def detach_policy_from_group_with_http_info(self, group_id : StrictStr, policy_i ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2333,7 +2333,7 @@ def detach_policy_from_user_with_http_info(self, user_id : StrictStr, policy_id ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2622,7 +2622,7 @@ def get_credentials_with_http_info(self, user_id : StrictStr, access_key_id : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Credentials", @@ -2754,7 +2754,7 @@ def get_current_user_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E50 ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CurrentUser", @@ -2891,7 +2891,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -3031,7 +3031,7 @@ def get_group_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiRespons ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Group", @@ -3171,7 +3171,7 @@ def get_group_acl_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiRes ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ACL", @@ -3311,7 +3311,7 @@ def get_policy_with_http_info(self, policy_id : StrictStr, **kwargs) -> ApiRespo ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Policy", @@ -3451,7 +3451,7 @@ def get_user_with_http_info(self, user_id : StrictStr, **kwargs) -> ApiResponse: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "User", @@ -3615,7 +3615,7 @@ def list_group_members_with_http_info(self, group_id : StrictStr, prefix : Annot ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UserList", @@ -3778,7 +3778,7 @@ def list_group_policies_with_http_info(self, group_id : StrictStr, prefix : Anno ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -3934,7 +3934,7 @@ def list_groups_with_http_info(self, prefix : Annotated[Optional[StrictStr], Fie ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GroupList", @@ -4089,7 +4089,7 @@ def list_policies_with_http_info(self, prefix : Annotated[Optional[StrictStr], F ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -4252,7 +4252,7 @@ def list_user_credentials_with_http_info(self, user_id : StrictStr, prefix : Ann ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CredentialsList", @@ -4416,7 +4416,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", @@ -4580,7 +4580,7 @@ def list_user_groups_with_http_info(self, user_id : StrictStr, prefix : Annotate ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GroupList", @@ -4752,7 +4752,7 @@ def list_user_policies_with_http_info(self, user_id : StrictStr, prefix : Annota ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -4908,7 +4908,7 @@ def list_users_with_http_info(self, prefix : Annotated[Optional[StrictStr], Fiel ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UserList", @@ -5208,7 +5208,7 @@ def set_group_acl_with_http_info(self, group_id : StrictStr, acl : ACL, **kwargs _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -5358,7 +5358,7 @@ def update_policy_with_http_info(self, policy_id : StrictStr, policy : Policy, * _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Policy", diff --git a/clients/python/lakefs_sdk/api/branches_api.py b/clients/python/lakefs_sdk/api/branches_api.py index ffb552796e2..2a58833faf1 100644 --- a/clients/python/lakefs_sdk/api/branches_api.py +++ b/clients/python/lakefs_sdk/api/branches_api.py @@ -190,7 +190,7 @@ def cherry_pick_with_http_info(self, repository : StrictStr, branch : StrictStr, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Commit", @@ -348,7 +348,7 @@ def create_branch_with_http_info(self, repository : StrictStr, branch_creation : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "str", @@ -507,7 +507,7 @@ def delete_branch_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -682,7 +682,7 @@ def diff_branch_with_http_info(self, repository : StrictStr, branch : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "DiffList", @@ -830,7 +830,7 @@ def get_branch_with_http_info(self, repository : StrictStr, branch : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Ref", @@ -994,7 +994,7 @@ def list_branches_with_http_info(self, repository : StrictStr, prefix : Annotate ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RefList", @@ -1157,7 +1157,7 @@ def reset_branch_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1315,7 +1315,7 @@ def revert_branch_with_http_info(self, repository : StrictStr, branch : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/commits_api.py b/clients/python/lakefs_sdk/api/commits_api.py index 02bea4c6a84..369af5fb8a6 100644 --- a/clients/python/lakefs_sdk/api/commits_api.py +++ b/clients/python/lakefs_sdk/api/commits_api.py @@ -192,7 +192,7 @@ def commit_with_http_info(self, repository : StrictStr, branch : StrictStr, comm _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Commit", @@ -344,7 +344,7 @@ def get_commit_with_http_info(self, repository : StrictStr, commit_id : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Commit", diff --git a/clients/python/lakefs_sdk/api/config_api.py b/clients/python/lakefs_sdk/api/config_api.py index 028f68fcd36..cc1e2e78b21 100644 --- a/clients/python/lakefs_sdk/api/config_api.py +++ b/clients/python/lakefs_sdk/api/config_api.py @@ -150,7 +150,7 @@ def get_config_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E501 ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Config", diff --git a/clients/python/lakefs_sdk/api/experimental_api.py b/clients/python/lakefs_sdk/api/experimental_api.py index e342acdc506..e7521284a81 100644 --- a/clients/python/lakefs_sdk/api/experimental_api.py +++ b/clients/python/lakefs_sdk/api/experimental_api.py @@ -209,7 +209,7 @@ def abort_presign_multipart_upload_with_http_info(self, repository : StrictStr, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -385,7 +385,7 @@ def complete_presign_multipart_upload_with_http_info(self, repository : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", @@ -553,7 +553,7 @@ def create_presign_multipart_upload_with_http_info(self, repository : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "PresignMultipartUpload", @@ -717,7 +717,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -860,7 +860,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1141,7 +1141,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -1307,7 +1307,7 @@ def hard_reset_branch_with_http_info(self, repository : StrictStr, branch : Stri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1466,7 +1466,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", diff --git a/clients/python/lakefs_sdk/api/external_api.py b/clients/python/lakefs_sdk/api/external_api.py index 801eef3ebc0..93f2afe1df9 100644 --- a/clients/python/lakefs_sdk/api/external_api.py +++ b/clients/python/lakefs_sdk/api/external_api.py @@ -187,7 +187,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -330,7 +330,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -611,7 +611,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -775,7 +775,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", diff --git a/clients/python/lakefs_sdk/api/import_api.py b/clients/python/lakefs_sdk/api/import_api.py index 4e0b25708f3..4495d0813e5 100644 --- a/clients/python/lakefs_sdk/api/import_api.py +++ b/clients/python/lakefs_sdk/api/import_api.py @@ -176,7 +176,7 @@ def import_cancel_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -334,7 +334,7 @@ def import_start_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "ImportCreationResponse", @@ -492,7 +492,7 @@ def import_status_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ImportStatus", diff --git a/clients/python/lakefs_sdk/api/internal_api.py b/clients/python/lakefs_sdk/api/internal_api.py index 0febc0689d2..6d1ae4e3ec7 100644 --- a/clients/python/lakefs_sdk/api/internal_api.py +++ b/clients/python/lakefs_sdk/api/internal_api.py @@ -183,7 +183,7 @@ def create_branch_protection_rule_preflight_with_http_info(self, repository : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -333,7 +333,7 @@ def create_commit_record_with_http_info(self, repository : StrictStr, commit_rec _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -484,7 +484,7 @@ def create_symlink_file_with_http_info(self, repository : StrictStr, branch : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "StorageURI", @@ -641,7 +641,7 @@ def delete_repository_metadata_with_http_info(self, repository : StrictStr, repo _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -776,7 +776,7 @@ def dump_refs_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRespo ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "RefsDump", @@ -1041,7 +1041,7 @@ def get_garbage_collection_config_with_http_info(self, **kwargs) -> ApiResponse: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionConfig", @@ -1175,7 +1175,7 @@ def get_lake_fs_version_with_http_info(self, **kwargs) -> ApiResponse: # noqa: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "VersionConfig", @@ -1439,7 +1439,7 @@ def get_storage_config_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageConfig", @@ -1569,7 +1569,7 @@ def get_usage_report_summary_with_http_info(self, **kwargs) -> ApiResponse: # n ['application/json', 'application/text']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "InstallationUsageReport", @@ -1727,7 +1727,7 @@ def internal_create_branch_protection_rule_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1879,7 +1879,7 @@ def internal_delete_branch_protection_rule_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2016,7 +2016,7 @@ def internal_delete_garbage_collection_rules_with_http_info(self, repository : S ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2153,7 +2153,7 @@ def internal_get_branch_protection_rules_with_http_info(self, repository : Stric ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "List[BranchProtectionRule]", @@ -2295,7 +2295,7 @@ def internal_get_garbage_collection_rules_with_http_info(self, repository : Stri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionRules", @@ -2452,7 +2452,7 @@ def internal_set_garbage_collection_rules_with_http_info(self, repository : Stri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2594,7 +2594,7 @@ def post_stats_events_with_http_info(self, stats_events_list : StatsEventsList, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2729,7 +2729,7 @@ def prepare_garbage_collection_commits_with_http_info(self, repository : StrictS ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "GarbageCollectionPrepareResponse", @@ -2885,7 +2885,7 @@ def prepare_garbage_collection_uncommitted_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "PrepareGCUncommittedResponse", @@ -3042,7 +3042,7 @@ def restore_refs_with_http_info(self, repository : StrictStr, refs_restore : Ref _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3177,7 +3177,7 @@ def set_garbage_collection_rules_preflight_with_http_info(self, repository : Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3329,7 +3329,7 @@ def set_repository_metadata_with_http_info(self, repository : StrictStr, reposit _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3786,7 +3786,7 @@ def stage_object_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", @@ -3944,7 +3944,7 @@ def upload_object_preflight_with_http_info(self, repository : StrictStr, branch ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/metadata_api.py b/clients/python/lakefs_sdk/api/metadata_api.py index f897ec3b550..e8767115845 100644 --- a/clients/python/lakefs_sdk/api/metadata_api.py +++ b/clients/python/lakefs_sdk/api/metadata_api.py @@ -166,7 +166,7 @@ def get_meta_range_with_http_info(self, repository : StrictStr, meta_range : Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageURI", @@ -314,7 +314,7 @@ def get_range_with_http_info(self, repository : StrictStr, range : StrictStr, ** ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageURI", diff --git a/clients/python/lakefs_sdk/api/objects_api.py b/clients/python/lakefs_sdk/api/objects_api.py index 11a5229f3b6..9ef5b4287b7 100644 --- a/clients/python/lakefs_sdk/api/objects_api.py +++ b/clients/python/lakefs_sdk/api/objects_api.py @@ -196,7 +196,7 @@ def copy_object_with_http_info(self, repository : StrictStr, branch : Annotated[ _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", @@ -362,7 +362,7 @@ def delete_object_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -528,7 +528,7 @@ def delete_objects_with_http_info(self, repository : StrictStr, branch : StrictS _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectErrorList", @@ -709,7 +709,7 @@ def get_object_with_http_info(self, repository : StrictStr, ref : Annotated[Stri ['application/octet-stream', 'application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "bytearray", @@ -870,7 +870,7 @@ def get_underlying_properties_with_http_info(self, repository : StrictStr, ref : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UnderlyingObjectProperties", @@ -1030,7 +1030,7 @@ def head_object_with_http_info(self, repository : StrictStr, ref : Annotated[Str # process the body parameter _body_params = None # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1221,7 +1221,7 @@ def list_objects_with_http_info(self, repository : StrictStr, ref : Annotated[St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStatsList", @@ -1393,7 +1393,7 @@ def stat_object_with_http_info(self, repository : StrictStr, ref : Annotated[Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", @@ -1590,7 +1590,7 @@ def upload_object_with_http_info(self, repository : StrictStr, branch : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", diff --git a/clients/python/lakefs_sdk/api/refs_api.py b/clients/python/lakefs_sdk/api/refs_api.py index abc0529b5f8..f938e771548 100644 --- a/clients/python/lakefs_sdk/api/refs_api.py +++ b/clients/python/lakefs_sdk/api/refs_api.py @@ -222,7 +222,7 @@ def diff_refs_with_http_info(self, repository : StrictStr, left_ref : Annotated[ ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "DiffList", @@ -378,7 +378,7 @@ def find_merge_base_with_http_info(self, repository : StrictStr, source_ref : An ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "FindMergeBaseResult", @@ -596,7 +596,7 @@ def log_commits_with_http_info(self, repository : StrictStr, ref : StrictStr, af ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CommitList", @@ -767,7 +767,7 @@ def merge_into_branch_with_http_info(self, repository : StrictStr, source_ref : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "MergeResult", diff --git a/clients/python/lakefs_sdk/api/repositories_api.py b/clients/python/lakefs_sdk/api/repositories_api.py index a2ebd9e58f2..d970a24e687 100644 --- a/clients/python/lakefs_sdk/api/repositories_api.py +++ b/clients/python/lakefs_sdk/api/repositories_api.py @@ -183,7 +183,7 @@ def create_repository_with_http_info(self, repository_creation : RepositoryCreat _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Repository", @@ -324,7 +324,7 @@ def delete_gc_rules_with_http_info(self, repository : StrictStr, **kwargs) -> Ap ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -467,7 +467,7 @@ def delete_repository_with_http_info(self, repository : StrictStr, force : Annot ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -610,7 +610,7 @@ def dump_status_with_http_info(self, repository : StrictStr, task_id : StrictStr ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryDumpStatus", @@ -751,7 +751,7 @@ def dump_submit_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRes ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "TaskInfo", @@ -891,7 +891,7 @@ def get_branch_protection_rules_with_http_info(self, repository : StrictStr, **k ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "List[BranchProtectionRule]", @@ -1031,7 +1031,7 @@ def get_gc_rules_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRe ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionRules", @@ -1171,7 +1171,7 @@ def get_repository_with_http_info(self, repository : StrictStr, **kwargs) -> Api ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Repository", @@ -1311,7 +1311,7 @@ def get_repository_metadata_with_http_info(self, repository : StrictStr, **kwarg ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Dict[str, str]", @@ -1467,7 +1467,7 @@ def list_repositories_with_http_info(self, prefix : Annotated[Optional[StrictStr ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryList", @@ -1614,7 +1614,7 @@ def restore_status_with_http_info(self, repository : StrictStr, task_id : Strict ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryRestoreStatus", @@ -1770,7 +1770,7 @@ def restore_submit_with_http_info(self, repository : StrictStr, refs_restore : R _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "TaskInfo", @@ -1934,7 +1934,7 @@ def set_branch_protection_rules_with_http_info(self, repository : StrictStr, bra _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2084,7 +2084,7 @@ def set_gc_rules_with_http_info(self, repository : StrictStr, garbage_collection _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/staging_api.py b/clients/python/lakefs_sdk/api/staging_api.py index e82c4ec395c..7a91cd32ad9 100644 --- a/clients/python/lakefs_sdk/api/staging_api.py +++ b/clients/python/lakefs_sdk/api/staging_api.py @@ -186,7 +186,7 @@ def get_physical_address_with_http_info(self, repository : StrictStr, branch : S ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StagingLocation", @@ -367,7 +367,7 @@ def link_physical_address_with_http_info(self, repository : StrictStr, branch : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", diff --git a/clients/python/lakefs_sdk/api/tags_api.py b/clients/python/lakefs_sdk/api/tags_api.py index 34533bd68ad..c4ffe8c3adb 100644 --- a/clients/python/lakefs_sdk/api/tags_api.py +++ b/clients/python/lakefs_sdk/api/tags_api.py @@ -177,7 +177,7 @@ def create_tag_with_http_info(self, repository : StrictStr, tag_creation : TagCr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Ref", @@ -336,7 +336,7 @@ def delete_tag_with_http_info(self, repository : StrictStr, tag : StrictStr, for ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -479,7 +479,7 @@ def get_tag_with_http_info(self, repository : StrictStr, tag : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Ref", @@ -643,7 +643,7 @@ def list_tags_with_http_info(self, repository : StrictStr, prefix : Annotated[Op ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RefList", diff --git a/clients/python/lakefs_sdk/configuration.py b/clients/python/lakefs_sdk/configuration.py index 201334aba2a..97b4f971566 100644 --- a/clients/python/lakefs_sdk/configuration.py +++ b/clients/python/lakefs_sdk/configuration.py @@ -436,6 +436,13 @@ def auth_settings(self): 'saml_auth', ), } + if self.username is not None and self.password is not None: + auth['external_auth'] = { + 'type': 'basic', + 'in': 'header', + 'key': 'Authorization', + 'value': self.get_basic_auth_token() + } return auth def to_debug_report(self): diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index 9c4d9af488a..78d21a7cef6 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -17,7 +17,7 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] - + - external_auth: [] components: securitySchemes: basic_auth: @@ -39,6 +39,9 @@ components: type: apiKey in: cookie name: saml_auth_session + external_auth: + type: http + scheme: basic parameters: PaginationPrefix: @@ -1830,6 +1833,10 @@ paths: responses: 200: description: successful login + headers: + Set-Cookie: + schema: + type: string content: application/json: schema: From 134ba6352a6e2d1da85578de10cee61023828153 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 20 Mar 2024 15:21:50 +0200 Subject: [PATCH 11/33] Fix PR comments --- api/authorization.yml | 9 - api/swagger.yml | 9 - clients/java-legacy/.openapi-generator/FILES | 3 - clients/java-legacy/README.md | 10 - clients/java-legacy/api/openapi.yaml | 11 - clients/java-legacy/docs/ActionsApi.md | 28 +- clients/java-legacy/docs/AuthApi.md | 246 +++----------- clients/java-legacy/docs/BranchesApi.md | 56 +--- clients/java-legacy/docs/CommitsApi.md | 14 +- clients/java-legacy/docs/ConfigApi.md | 7 +- clients/java-legacy/docs/ExperimentalApi.md | 64 +--- clients/java-legacy/docs/ExternalApi.md | 36 +- .../docs/ExternalLoginInformation.md | 13 - clients/java-legacy/docs/ImportApi.md | 21 +- clients/java-legacy/docs/InternalApi.md | 161 ++------- clients/java-legacy/docs/MetadataApi.md | 14 +- clients/java-legacy/docs/ObjectsApi.md | 63 +--- clients/java-legacy/docs/RefsApi.md | 28 +- clients/java-legacy/docs/RepositoriesApi.md | 98 +----- clients/java-legacy/docs/StagingApi.md | 14 +- clients/java-legacy/docs/TagsApi.md | 28 +- .../io/lakefs/clients/api/ActionsApi.java | 8 +- .../java/io/lakefs/clients/api/ApiClient.java | 2 - .../java/io/lakefs/clients/api/AuthApi.java | 97 +++--- .../io/lakefs/clients/api/BranchesApi.java | 16 +- .../io/lakefs/clients/api/CommitsApi.java | 4 +- .../java/io/lakefs/clients/api/ConfigApi.java | 2 +- .../lakefs/clients/api/ExperimentalApi.java | 45 ++- .../io/lakefs/clients/api/ExternalApi.java | 37 +- .../java/io/lakefs/clients/api/ImportApi.java | 6 +- .../io/lakefs/clients/api/InternalApi.java | 46 +-- .../io/lakefs/clients/api/MetadataApi.java | 4 +- .../io/lakefs/clients/api/ObjectsApi.java | 18 +- .../java/io/lakefs/clients/api/RefsApi.java | 8 +- .../lakefs/clients/api/RepositoriesApi.java | 28 +- .../io/lakefs/clients/api/StagingApi.java | 4 +- .../java/io/lakefs/clients/api/TagsApi.java | 8 +- .../api/model/ExternalLoginInformation.java | 98 ------ .../io/lakefs/clients/api/AuthApiTest.java | 5 +- .../clients/api/ExperimentalApiTest.java | 5 +- .../lakefs/clients/api/ExternalApiTest.java | 5 +- .../model/ExternalLoginInformationTest.java | 51 --- clients/java/README.md | 11 - clients/java/api/openapi.yaml | 11 - clients/java/docs/ActionsApi.md | 28 +- clients/java/docs/AuthApi.md | 246 +++----------- clients/java/docs/BranchesApi.md | 56 +--- clients/java/docs/CommitsApi.md | 14 +- clients/java/docs/ConfigApi.md | 7 +- clients/java/docs/ExperimentalApi.md | 64 +--- clients/java/docs/ExternalApi.md | 36 +- clients/java/docs/ExternalLoginInformation.md | 13 - clients/java/docs/ImportApi.md | 21 +- clients/java/docs/InternalApi.md | 161 ++------- clients/java/docs/MetadataApi.md | 14 +- clients/java/docs/ObjectsApi.md | 63 +--- clients/java/docs/RefsApi.md | 28 +- clients/java/docs/RepositoriesApi.md | 98 +----- clients/java/docs/StagingApi.md | 14 +- clients/java/docs/TagsApi.md | 28 +- .../io/lakefs/clients/sdk/ActionsApi.java | 8 +- .../java/io/lakefs/clients/sdk/ApiClient.java | 2 - .../java/io/lakefs/clients/sdk/AuthApi.java | 103 +++--- .../io/lakefs/clients/sdk/BranchesApi.java | 16 +- .../io/lakefs/clients/sdk/CommitsApi.java | 4 +- .../java/io/lakefs/clients/sdk/ConfigApi.java | 2 +- .../lakefs/clients/sdk/ExperimentalApi.java | 51 ++- .../io/lakefs/clients/sdk/ExternalApi.java | 43 ++- .../java/io/lakefs/clients/sdk/ImportApi.java | 6 +- .../io/lakefs/clients/sdk/InternalApi.java | 46 +-- .../main/java/io/lakefs/clients/sdk/JSON.java | 1 - .../io/lakefs/clients/sdk/MetadataApi.java | 4 +- .../io/lakefs/clients/sdk/ObjectsApi.java | 18 +- .../java/io/lakefs/clients/sdk/RefsApi.java | 8 +- .../lakefs/clients/sdk/RepositoriesApi.java | 28 +- .../io/lakefs/clients/sdk/StagingApi.java | 4 +- .../java/io/lakefs/clients/sdk/TagsApi.java | 8 +- .../sdk/model/ExternalLoginInformation.java | 293 ---------------- .../io/lakefs/clients/sdk/AuthApiTest.java | 5 +- .../clients/sdk/ExperimentalApiTest.java | 5 +- .../lakefs/clients/sdk/ExternalApiTest.java | 5 +- .../model/ExternalLoginInformationTest.java | 48 --- .../python-legacy/.openapi-generator/FILES | 3 - clients/python-legacy/README.md | 12 - clients/python-legacy/docs/ActionsApi.md | 36 +- clients/python-legacy/docs/AuthApi.md | 315 ++---------------- clients/python-legacy/docs/BranchesApi.md | 72 +--- clients/python-legacy/docs/CommitsApi.md | 18 +- clients/python-legacy/docs/ConfigApi.md | 9 +- clients/python-legacy/docs/ExperimentalApi.md | 81 +---- clients/python-legacy/docs/ExternalApi.md | 45 +-- .../docs/ExternalLoginInformation.md | 12 - clients/python-legacy/docs/ImportApi.md | 27 +- clients/python-legacy/docs/InternalApi.md | 207 ++---------- clients/python-legacy/docs/MetadataApi.md | 18 +- clients/python-legacy/docs/ObjectsApi.md | 81 +---- clients/python-legacy/docs/RefsApi.md | 36 +- clients/python-legacy/docs/RepositoriesApi.md | 126 +------ clients/python-legacy/docs/StagingApi.md | 18 +- clients/python-legacy/docs/TagsApi.md | 36 +- .../lakefs_client/api/actions_api.py | 4 - .../lakefs_client/api/auth_api.py | 45 +-- .../lakefs_client/api/branches_api.py | 8 - .../lakefs_client/api/commits_api.py | 2 - .../lakefs_client/api/config_api.py | 1 - .../lakefs_client/api/experimental_api.py | 19 +- .../lakefs_client/api/external_api.py | 15 +- .../lakefs_client/api/import_api.py | 3 - .../lakefs_client/api/internal_api.py | 23 -- .../lakefs_client/api/metadata_api.py | 2 - .../lakefs_client/api/objects_api.py | 9 - .../lakefs_client/api/refs_api.py | 4 - .../lakefs_client/api/repositories_api.py | 14 - .../lakefs_client/api/staging_api.py | 2 - .../lakefs_client/api/tags_api.py | 4 - .../lakefs_client/configuration.py | 7 - .../model/external_login_information.py | 262 --------------- .../lakefs_client/models/__init__.py | 1 - .../test/test_external_login_information.py | 36 -- clients/python/.openapi-generator/FILES | 3 - clients/python/README.md | 12 - clients/python/docs/ActionsApi.md | 36 +- clients/python/docs/AuthApi.md | 315 +++--------------- clients/python/docs/BranchesApi.md | 72 +--- clients/python/docs/CommitsApi.md | 18 +- clients/python/docs/ConfigApi.md | 9 +- clients/python/docs/ExperimentalApi.md | 81 +---- clients/python/docs/ExternalApi.md | 45 +-- .../python/docs/ExternalLoginInformation.md | 29 -- clients/python/docs/ImportApi.md | 27 +- clients/python/docs/InternalApi.md | 207 ++---------- clients/python/docs/MetadataApi.md | 18 +- clients/python/docs/ObjectsApi.md | 81 +---- clients/python/docs/RefsApi.md | 36 +- clients/python/docs/RepositoriesApi.md | 126 +------ clients/python/docs/StagingApi.md | 18 +- clients/python/docs/TagsApi.md | 36 +- clients/python/lakefs_sdk/__init__.py | 1 - clients/python/lakefs_sdk/api/actions_api.py | 8 +- clients/python/lakefs_sdk/api/auth_api.py | 95 +++--- clients/python/lakefs_sdk/api/branches_api.py | 16 +- clients/python/lakefs_sdk/api/commits_api.py | 4 +- clients/python/lakefs_sdk/api/config_api.py | 2 +- .../python/lakefs_sdk/api/experimental_api.py | 43 ++- clients/python/lakefs_sdk/api/external_api.py | 35 +- clients/python/lakefs_sdk/api/import_api.py | 6 +- clients/python/lakefs_sdk/api/internal_api.py | 46 +-- clients/python/lakefs_sdk/api/metadata_api.py | 4 +- clients/python/lakefs_sdk/api/objects_api.py | 18 +- clients/python/lakefs_sdk/api/refs_api.py | 8 +- .../python/lakefs_sdk/api/repositories_api.py | 28 +- clients/python/lakefs_sdk/api/staging_api.py | 4 +- clients/python/lakefs_sdk/api/tags_api.py | 8 +- clients/python/lakefs_sdk/configuration.py | 7 - clients/python/lakefs_sdk/models/__init__.py | 1 - .../models/external_login_information.py | 72 ---- .../test/test_external_login_information.py | 56 ---- docs/assets/js/swagger.yml | 9 - pkg/api/auth_middleware.go | 2 +- pkg/api/controller.go | 10 +- pkg/auth/service.go | 8 +- pkg/auth/service_test.go | 9 +- 162 files changed, 1068 insertions(+), 5265 deletions(-) delete mode 100644 clients/java-legacy/docs/ExternalLoginInformation.md delete mode 100644 clients/java-legacy/src/main/java/io/lakefs/clients/api/model/ExternalLoginInformation.java delete mode 100644 clients/java-legacy/src/test/java/io/lakefs/clients/api/model/ExternalLoginInformationTest.java delete mode 100644 clients/java/docs/ExternalLoginInformation.md delete mode 100644 clients/java/src/main/java/io/lakefs/clients/sdk/model/ExternalLoginInformation.java delete mode 100644 clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java delete mode 100644 clients/python-legacy/docs/ExternalLoginInformation.md delete mode 100644 clients/python-legacy/lakefs_client/model/external_login_information.py delete mode 100644 clients/python-legacy/test/test_external_login_information.py delete mode 100644 clients/python/docs/ExternalLoginInformation.md delete mode 100644 clients/python/lakefs_sdk/models/external_login_information.py delete mode 100644 clients/python/test/test_external_login_information.py diff --git a/api/authorization.yml b/api/authorization.yml index 3ee7b33a7b5..c26ca256601 100644 --- a/api/authorization.yml +++ b/api/authorization.yml @@ -18,9 +18,6 @@ components: type: http scheme: bearer bearerFormat: JWT - external_auth: - type: http - scheme: basic parameters: PaginationPrefix: @@ -368,12 +365,6 @@ components: ExternalLoginInformation: type: object - required: - - presigned_url - properties: - presigned_url: - type: string - paths: /auth/users: diff --git a/api/swagger.yml b/api/swagger.yml index 78d21a7cef6..c4a553a0ffc 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -17,7 +17,6 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] - - external_auth: [] components: securitySchemes: basic_auth: @@ -39,9 +38,6 @@ components: type: apiKey in: cookie name: saml_auth_session - external_auth: - type: http - scheme: basic parameters: PaginationPrefix: @@ -1057,11 +1053,6 @@ components: ExternalLoginInformation: type: object - required: - - presigned_url - properties: - presigned_url: - type: string AuthenticationToken: type: object diff --git a/clients/java-legacy/.openapi-generator/FILES b/clients/java-legacy/.openapi-generator/FILES index 114c2594fd0..2daced71191 100644 --- a/clients/java-legacy/.openapi-generator/FILES +++ b/clients/java-legacy/.openapi-generator/FILES @@ -37,7 +37,6 @@ docs/Error.md docs/ErrorNoACL.md docs/ExperimentalApi.md docs/ExternalApi.md -docs/ExternalLoginInformation.md docs/ExternalPrincipal.md docs/ExternalPrincipalCreation.md docs/ExternalPrincipalList.md @@ -186,7 +185,6 @@ src/main/java/io/lakefs/clients/api/model/Diff.java src/main/java/io/lakefs/clients/api/model/DiffList.java src/main/java/io/lakefs/clients/api/model/Error.java src/main/java/io/lakefs/clients/api/model/ErrorNoACL.java -src/main/java/io/lakefs/clients/api/model/ExternalLoginInformation.java src/main/java/io/lakefs/clients/api/model/ExternalPrincipal.java src/main/java/io/lakefs/clients/api/model/ExternalPrincipalCreation.java src/main/java/io/lakefs/clients/api/model/ExternalPrincipalList.java @@ -300,7 +298,6 @@ src/test/java/io/lakefs/clients/api/model/DiffListTest.java src/test/java/io/lakefs/clients/api/model/DiffTest.java src/test/java/io/lakefs/clients/api/model/ErrorNoACLTest.java src/test/java/io/lakefs/clients/api/model/ErrorTest.java -src/test/java/io/lakefs/clients/api/model/ExternalLoginInformationTest.java src/test/java/io/lakefs/clients/api/model/ExternalPrincipalCreationTest.java src/test/java/io/lakefs/clients/api/model/ExternalPrincipalListTest.java src/test/java/io/lakefs/clients/api/model/ExternalPrincipalTest.java diff --git a/clients/java-legacy/README.md b/clients/java-legacy/README.md index 3f7d7c55120..40fbc332558 100644 --- a/clients/java-legacy/README.md +++ b/clients/java-legacy/README.md @@ -95,11 +95,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -300,7 +295,6 @@ Class | Method | HTTP request | Description - [DiffList](docs/DiffList.md) - [Error](docs/Error.md) - [ErrorNoACL](docs/ErrorNoACL.md) - - [ExternalLoginInformation](docs/ExternalLoginInformation.md) - [ExternalPrincipal](docs/ExternalPrincipal.md) - [ExternalPrincipalCreation](docs/ExternalPrincipalCreation.md) - [ExternalPrincipalList](docs/ExternalPrincipalList.md) @@ -388,10 +382,6 @@ Authentication schemes defined for the API: - **API key parameter name**: internal_auth_session - **Location**: -### external_auth - -- **Type**: HTTP basic authentication - ### jwt_token - **Type**: HTTP basic authentication diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index a3737619dc6..b8e8b7521e9 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -15,7 +15,6 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] -- external_auth: [] paths: /setup_comm_prefs: post: @@ -8185,13 +8184,6 @@ components: - secret_access_key type: object ExternalLoginInformation: - example: - presigned_url: presigned_url - properties: - presigned_url: - type: string - required: - - presigned_url type: object AuthenticationToken: example: @@ -9112,7 +9104,4 @@ components: in: cookie name: saml_auth_session type: apiKey - external_auth: - scheme: basic - type: http diff --git a/clients/java-legacy/docs/ActionsApi.md b/clients/java-legacy/docs/ActionsApi.md index 726300dc465..76e04a9bd9f 100644 --- a/clients/java-legacy/docs/ActionsApi.md +++ b/clients/java-legacy/docs/ActionsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -93,7 +88,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -141,11 +136,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -194,7 +184,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -242,11 +232,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -299,7 +284,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -347,11 +332,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -402,7 +382,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/AuthApi.md b/clients/java-legacy/docs/AuthApi.md index 47d52258b69..dc5bf973a85 100644 --- a/clients/java-legacy/docs/AuthApi.md +++ b/clients/java-legacy/docs/AuthApi.md @@ -74,11 +74,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -124,7 +119,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -172,11 +167,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -222,7 +212,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -270,11 +260,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -320,7 +305,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -368,11 +353,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -417,7 +397,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -465,11 +445,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -514,7 +489,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -562,11 +537,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -611,7 +581,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -660,11 +630,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -709,7 +674,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -758,11 +723,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -810,7 +770,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -859,11 +819,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -909,7 +864,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -957,11 +912,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1005,7 +955,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1053,11 +1003,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1103,7 +1048,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1151,11 +1096,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1199,7 +1139,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1247,11 +1187,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1295,7 +1230,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1343,11 +1278,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1393,7 +1323,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1441,11 +1371,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1491,7 +1416,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1539,11 +1464,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1589,7 +1509,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1607,7 +1527,7 @@ null (empty response body) # **externalLogin** -> AuthenticationToken externalLogin(externalLoginInformation) +> AuthenticationToken externalLogin(body) perform a login using an external authenticator @@ -1626,9 +1546,9 @@ public class Example { defaultClient.setBasePath("http://localhost/api/v1"); AuthApi apiInstance = new AuthApi(defaultClient); - ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + Object body = null; // Object | try { - AuthenticationToken result = apiInstance.externalLogin(externalLoginInformation); + AuthenticationToken result = apiInstance.externalLogin(body); System.out.println(result); } catch (ApiException e) { System.err.println("Exception when calling AuthApi#externalLogin"); @@ -1645,7 +1565,7 @@ public class Example { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + **body** | **Object**| | [optional] ### Return type @@ -1700,11 +1620,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1751,7 +1666,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1799,11 +1714,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1844,7 +1754,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1888,11 +1798,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1937,7 +1842,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1985,11 +1890,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2034,7 +1934,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2082,11 +1982,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2131,7 +2026,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2179,11 +2074,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2228,7 +2118,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2276,11 +2166,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2325,7 +2210,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2373,11 +2258,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2428,7 +2308,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2475,11 +2355,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2530,7 +2405,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2578,11 +2453,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2631,7 +2501,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2678,11 +2548,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2731,7 +2596,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2778,11 +2643,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2833,7 +2693,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2881,11 +2741,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2936,7 +2791,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2984,11 +2839,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3039,7 +2889,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3087,11 +2937,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3144,7 +2989,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3192,11 +3037,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3245,7 +3085,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3355,11 +3195,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3405,7 +3240,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3453,11 +3288,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -3504,7 +3334,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/BranchesApi.md b/clients/java-legacy/docs/BranchesApi.md index 5a0d52c2970..c1a1fc02597 100644 --- a/clients/java-legacy/docs/BranchesApi.md +++ b/clients/java-legacy/docs/BranchesApi.md @@ -46,11 +46,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -99,7 +94,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -150,11 +145,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -201,7 +191,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -252,11 +242,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -304,7 +289,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -353,11 +338,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -412,7 +392,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -460,11 +440,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -511,7 +486,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -559,11 +534,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -614,7 +584,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -662,11 +632,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -714,7 +679,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -764,11 +729,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -816,7 +776,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/CommitsApi.md b/clients/java-legacy/docs/CommitsApi.md index 8c0ca61a9aa..904969f3f78 100644 --- a/clients/java-legacy/docs/CommitsApi.md +++ b/clients/java-legacy/docs/CommitsApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -95,7 +90,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -147,11 +142,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -198,7 +188,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ConfigApi.md b/clients/java-legacy/docs/ConfigApi.md index fe09a955ca2..df872aca7ca 100644 --- a/clients/java-legacy/docs/ConfigApi.md +++ b/clients/java-legacy/docs/ConfigApi.md @@ -41,11 +41,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -86,7 +81,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ExperimentalApi.md b/clients/java-legacy/docs/ExperimentalApi.md index 2f77eb53ca5..ed2c9a514a1 100644 --- a/clients/java-legacy/docs/ExperimentalApi.md +++ b/clients/java-legacy/docs/ExperimentalApi.md @@ -49,11 +49,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -105,7 +100,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -156,11 +151,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -213,7 +203,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -265,11 +255,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -320,7 +305,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -369,11 +354,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -421,7 +401,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -470,11 +450,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -520,7 +495,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -538,7 +513,7 @@ null (empty response body) # **externalLogin** -> AuthenticationToken externalLogin(externalLoginInformation) +> AuthenticationToken externalLogin(body) perform a login using an external authenticator @@ -557,9 +532,9 @@ public class Example { defaultClient.setBasePath("http://localhost/api/v1"); ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); - ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + Object body = null; // Object | try { - AuthenticationToken result = apiInstance.externalLogin(externalLoginInformation); + AuthenticationToken result = apiInstance.externalLogin(body); System.out.println(result); } catch (ApiException e) { System.err.println("Exception when calling ExperimentalApi#externalLogin"); @@ -576,7 +551,7 @@ public class Example { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + **body** | **Object**| | [optional] ### Return type @@ -631,11 +606,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -680,7 +650,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -730,11 +700,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -784,7 +749,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -834,11 +799,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -889,7 +849,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ExternalApi.md b/clients/java-legacy/docs/ExternalApi.md index 67cd119ced8..b863355cf66 100644 --- a/clients/java-legacy/docs/ExternalApi.md +++ b/clients/java-legacy/docs/ExternalApi.md @@ -43,11 +43,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -95,7 +90,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -144,11 +139,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -194,7 +184,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -212,7 +202,7 @@ null (empty response body) # **externalLogin** -> AuthenticationToken externalLogin(externalLoginInformation) +> AuthenticationToken externalLogin(body) perform a login using an external authenticator @@ -231,9 +221,9 @@ public class Example { defaultClient.setBasePath("http://localhost/api/v1"); ExternalApi apiInstance = new ExternalApi(defaultClient); - ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + Object body = null; // Object | try { - AuthenticationToken result = apiInstance.externalLogin(externalLoginInformation); + AuthenticationToken result = apiInstance.externalLogin(body); System.out.println(result); } catch (ApiException e) { System.err.println("Exception when calling ExternalApi#externalLogin"); @@ -250,7 +240,7 @@ public class Example { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + **body** | **Object**| | [optional] ### Return type @@ -305,11 +295,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -354,7 +339,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -402,11 +387,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -457,7 +437,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ExternalLoginInformation.md b/clients/java-legacy/docs/ExternalLoginInformation.md deleted file mode 100644 index e1f49f42df3..00000000000 --- a/clients/java-legacy/docs/ExternalLoginInformation.md +++ /dev/null @@ -1,13 +0,0 @@ - - -# ExternalLoginInformation - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**presignedUrl** | **String** | | - - - diff --git a/clients/java-legacy/docs/ImportApi.md b/clients/java-legacy/docs/ImportApi.md index 8af8426b06b..89e2170feef 100644 --- a/clients/java-legacy/docs/ImportApi.md +++ b/clients/java-legacy/docs/ImportApi.md @@ -41,11 +41,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -93,7 +88,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -143,11 +138,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -196,7 +186,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -246,11 +236,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -299,7 +284,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/InternalApi.md b/clients/java-legacy/docs/InternalApi.md index 5bb12bca642..fce1503b632 100644 --- a/clients/java-legacy/docs/InternalApi.md +++ b/clients/java-legacy/docs/InternalApi.md @@ -65,11 +65,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -113,7 +108,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -162,11 +157,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -212,7 +202,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -262,11 +252,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -315,7 +300,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -365,11 +350,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -415,7 +395,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -462,11 +442,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -511,7 +486,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -620,11 +595,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -665,7 +635,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -712,11 +682,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -757,7 +722,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -862,11 +827,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -907,7 +867,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -952,11 +912,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -997,7 +952,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1046,11 +1001,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1096,7 +1046,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1144,11 +1094,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1194,7 +1139,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1242,11 +1187,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1290,7 +1230,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1338,11 +1278,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1387,7 +1322,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1435,11 +1370,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1484,7 +1414,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1532,11 +1462,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1582,7 +1507,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1630,11 +1555,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1678,7 +1598,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1726,11 +1646,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1775,7 +1690,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1824,11 +1739,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1875,7 +1785,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1925,11 +1835,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1975,7 +1880,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2024,11 +1929,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2072,7 +1972,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2122,11 +2022,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2172,7 +2067,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2347,11 +2242,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2402,7 +2292,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2452,11 +2342,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -2504,7 +2389,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/MetadataApi.md b/clients/java-legacy/docs/MetadataApi.md index 1d0fbd9b1bc..77e7a4d2445 100644 --- a/clients/java-legacy/docs/MetadataApi.md +++ b/clients/java-legacy/docs/MetadataApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -91,7 +86,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -139,11 +134,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -190,7 +180,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/ObjectsApi.md b/clients/java-legacy/docs/ObjectsApi.md index 98a58a5766e..763634236bc 100644 --- a/clients/java-legacy/docs/ObjectsApi.md +++ b/clients/java-legacy/docs/ObjectsApi.md @@ -47,11 +47,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -102,7 +97,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -152,11 +147,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -206,7 +196,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -255,11 +245,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -310,7 +295,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -359,11 +344,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -418,7 +398,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -471,11 +451,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -524,7 +499,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -572,11 +547,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -626,7 +596,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -677,11 +647,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -740,7 +705,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -788,11 +753,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -845,7 +805,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -895,11 +855,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -956,7 +911,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/RefsApi.md b/clients/java-legacy/docs/RefsApi.md index 71103ec7415..944f4b55ee3 100644 --- a/clients/java-legacy/docs/RefsApi.md +++ b/clients/java-legacy/docs/RefsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -105,7 +100,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -153,11 +148,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -206,7 +196,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -255,11 +245,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -322,7 +307,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -370,11 +355,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -425,7 +405,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/RepositoriesApi.md b/clients/java-legacy/docs/RepositoriesApi.md index 53242d7cf58..c34ec869b6d 100644 --- a/clients/java-legacy/docs/RepositoriesApi.md +++ b/clients/java-legacy/docs/RepositoriesApi.md @@ -52,11 +52,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -103,7 +98,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -152,11 +147,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -200,7 +190,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -249,11 +239,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -299,7 +284,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -347,11 +332,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -398,7 +378,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -447,11 +427,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -496,7 +471,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -544,11 +519,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -593,7 +563,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -641,11 +611,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -690,7 +655,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -738,11 +703,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -787,7 +747,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -835,11 +795,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -884,7 +839,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -932,11 +887,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -985,7 +935,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1032,11 +982,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1083,7 +1028,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1132,11 +1077,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1183,7 +1123,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1232,11 +1172,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1284,7 +1219,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1335,11 +1270,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -1385,7 +1315,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/StagingApi.md b/clients/java-legacy/docs/StagingApi.md index 92326ebd310..6aa4318f66c 100644 --- a/clients/java-legacy/docs/StagingApi.md +++ b/clients/java-legacy/docs/StagingApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -95,7 +90,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -145,11 +140,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -202,7 +192,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/docs/TagsApi.md b/clients/java-legacy/docs/TagsApi.md index 22517d33cdf..97b0228b8d7 100644 --- a/clients/java-legacy/docs/TagsApi.md +++ b/clients/java-legacy/docs/TagsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -93,7 +88,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -144,11 +139,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -196,7 +186,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -245,11 +235,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -296,7 +281,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -344,11 +329,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure HTTP bearer authorization: jwt_token HttpBearerAuth jwt_token = (HttpBearerAuth) defaultClient.getAuthentication("jwt_token"); jwt_token.setBearerToken("BEARER TOKEN"); @@ -399,7 +379,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java index a95e043aef6..5162d6e42a7 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ActionsApi.java @@ -103,7 +103,7 @@ public okhttp3.Call getRunCall(String repository, String runId, final ApiCallbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -243,7 +243,7 @@ public okhttp3.Call getRunHookOutputCall(String repository, String runId, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -407,7 +407,7 @@ public okhttp3.Call listRepositoryRunsCall(String repository, String after, Inte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -559,7 +559,7 @@ public okhttp3.Call listRunHooksCall(String repository, String runId, String aft final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java index 79855c2c184..d469b38e79c 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ApiClient.java @@ -88,7 +88,6 @@ public ApiClient() { // Setup authentications (key: authentication name, value: authentication). authentications.put("basic_auth", new HttpBasicAuth()); authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); - authentications.put("external_auth", new HttpBasicAuth()); authentications.put("jwt_token", new HttpBearerAuth("bearer")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); @@ -107,7 +106,6 @@ public ApiClient(OkHttpClient client) { // Setup authentications (key: authentication name, value: authentication). authentications.put("basic_auth", new HttpBasicAuth()); authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); - authentications.put("external_auth", new HttpBasicAuth()); authentications.put("jwt_token", new HttpBearerAuth("bearer")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java index e1cc6c665e4..0dba460ecfe 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java @@ -35,7 +35,6 @@ import io.lakefs.clients.api.model.CurrentUser; import io.lakefs.clients.api.model.Error; import io.lakefs.clients.api.model.ErrorNoACL; -import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -119,7 +118,7 @@ public okhttp3.Call addGroupMembershipCall(String groupId, String userId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -253,7 +252,7 @@ public okhttp3.Call attachPolicyToGroupCall(String groupId, String policyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -387,7 +386,7 @@ public okhttp3.Call attachPolicyToUserCall(String userId, String policyId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -519,7 +518,7 @@ public okhttp3.Call createCredentialsCall(String userId, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -646,7 +645,7 @@ public okhttp3.Call createGroupCall(GroupCreation groupCreation, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -769,7 +768,7 @@ public okhttp3.Call createPolicyCall(Policy policy, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -900,7 +899,7 @@ public okhttp3.Call createUserCall(UserCreation userCreation, final ApiCallback final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1033,7 +1032,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1173,7 +1172,7 @@ public okhttp3.Call deleteCredentialsCall(String userId, String accessKeyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1305,7 +1304,7 @@ public okhttp3.Call deleteGroupCall(String groupId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1431,7 +1430,7 @@ public okhttp3.Call deleteGroupMembershipCall(String groupId, String userId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1563,7 +1562,7 @@ public okhttp3.Call deletePolicyCall(String policyId, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1687,7 +1686,7 @@ public okhttp3.Call deleteUserCall(String userId, final ApiCallback _callback) t final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1816,7 +1815,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1950,7 +1949,7 @@ public okhttp3.Call detachPolicyFromGroupCall(String groupId, String policyId, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2084,7 +2083,7 @@ public okhttp3.Call detachPolicyFromUserCall(String userId, String policyId, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2175,7 +2174,7 @@ public okhttp3.Call detachPolicyFromUserAsync(String userId, String policyId, fi } /** * Build call for externalLogin - * @param externalLoginInformation (optional) + * @param body (optional) * @param _callback Callback for upload/download progress * @return Call to execute * @throws ApiException If fail to serialize the request body object @@ -2188,8 +2187,8 @@ public okhttp3.Call detachPolicyFromUserAsync(String userId, String policyId, fi
Status Code Description Response Headers
200 successful login -
200 successful login * Set-Cookie -
401 Unauthorized -
420 too many requests -
0 Internal Server Error -
0 Internal Server Error -
*/ - public okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - Object localVarPostBody = externalLoginInformation; + public okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + Object localVarPostBody = body; // create path and map variables String localVarPath = "/auth/external/login"; @@ -2219,10 +2218,10 @@ public okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInfo } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginCall(externalLoginInformation, _callback); + okhttp3.Call localVarCall = externalLoginCall(body, _callback); return localVarCall; } @@ -2230,7 +2229,7 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex /** * perform a login using an external authenticator * - * @param externalLoginInformation (optional) + * @param body (optional) * @return AuthenticationToken * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -2242,15 +2241,15 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex 0 Internal Server Error - */ - public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginInformation) throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + public AuthenticationToken externalLogin(Object body) throws ApiException { + ApiResponse localVarResp = externalLoginWithHttpInfo(body); return localVarResp.getData(); } /** * perform a login using an external authenticator * - * @param externalLoginInformation (optional) + * @param body (optional) * @return ApiResponse<AuthenticationToken> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -2262,8 +2261,8 @@ public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginI 0 Internal Server Error - */ - public ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + public ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -2271,7 +2270,7 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI /** * perform a login using an external authenticator (asynchronously) * - * @param externalLoginInformation (optional) + * @param body (optional) * @param _callback The callback to be executed when the API call finishes * @return The request call * @throws ApiException If fail to process the API call, e.g. serializing the request body object @@ -2284,9 +2283,9 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI 0 Internal Server Error - */ - public okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; @@ -2336,7 +2335,7 @@ public okhttp3.Call getCredentialsCall(String userId, String accessKeyId, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2466,7 +2465,7 @@ public okhttp3.Call getCurrentUserCall(final ApiCallback _callback) throws ApiEx final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2577,7 +2576,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2705,7 +2704,7 @@ public okhttp3.Call getGroupCall(String groupId, final ApiCallback _callback) th final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2833,7 +2832,7 @@ public okhttp3.Call getGroupACLCall(String groupId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2961,7 +2960,7 @@ public okhttp3.Call getPolicyCall(String policyId, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3089,7 +3088,7 @@ public okhttp3.Call getUserCall(String userId, final ApiCallback _callback) thro final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3231,7 +3230,7 @@ public okhttp3.Call listGroupMembersCall(String groupId, String prefix, String a final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3380,7 +3379,7 @@ public okhttp3.Call listGroupPoliciesCall(String groupId, String prefix, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3529,7 +3528,7 @@ public okhttp3.Call listGroupsCall(String prefix, String after, Integer amount, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3667,7 +3666,7 @@ public okhttp3.Call listPoliciesCall(String prefix, String after, Integer amount final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3808,7 +3807,7 @@ public okhttp3.Call listUserCredentialsCall(String userId, String prefix, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3960,7 +3959,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4112,7 +4111,7 @@ public okhttp3.Call listUserGroupsCall(String userId, String prefix, String afte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4269,7 +4268,7 @@ public okhttp3.Call listUserPoliciesCall(String userId, String prefix, String af final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4421,7 +4420,7 @@ public okhttp3.Call listUsersCall(String prefix, String after, Integer amount, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4666,7 +4665,7 @@ public okhttp3.Call setGroupACLCall(String groupId, ACL ACL, final ApiCallback _ final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4800,7 +4799,7 @@ public okhttp3.Call updatePolicyCall(String policyId, Policy policy, final ApiCa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java index fc8ae5809ef..a72c0b7cf50 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/BranchesApi.java @@ -111,7 +111,7 @@ public okhttp3.Call cherryPickCall(String repository, String branch, CherryPickC final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -268,7 +268,7 @@ public okhttp3.Call createBranchCall(String repository, BranchCreation branchCre final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -421,7 +421,7 @@ public okhttp3.Call deleteBranchCall(String repository, String branch, Boolean f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -581,7 +581,7 @@ public okhttp3.Call diffBranchCall(String repository, String branch, String afte final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -731,7 +731,7 @@ public okhttp3.Call getBranchCall(String repository, String branch, final ApiCal final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -882,7 +882,7 @@ public okhttp3.Call listBranchesCall(String repository, String prefix, String af final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1024,7 +1024,7 @@ public okhttp3.Call resetBranchCall(String repository, String branch, ResetCreat final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1176,7 +1176,7 @@ public okhttp3.Call revertBranchCall(String repository, String branch, RevertCre final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java index 81e2441bea5..23f464975fe 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/CommitsApi.java @@ -111,7 +111,7 @@ public okhttp3.Call commitCall(String repository, String branch, CommitCreation final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -272,7 +272,7 @@ public okhttp3.Call getCommitCall(String repository, String commitId, final ApiC final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java index ce12a7223e0..db1b298eed7 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ConfigApi.java @@ -93,7 +93,7 @@ public okhttp3.Call getConfigCall(final ApiCallback _callback) throws ApiExcepti final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java index c1f4fcba196..2cfd24e1ecd 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java @@ -31,7 +31,6 @@ import io.lakefs.clients.api.model.AuthenticationToken; import io.lakefs.clients.api.model.CompletePresignMultipartUpload; import io.lakefs.clients.api.model.Error; -import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -118,7 +117,7 @@ public okhttp3.Call abortPresignMultipartUploadCall(String repository, String br final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -284,7 +283,7 @@ public okhttp3.Call completePresignMultipartUploadCall(String repository, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -458,7 +457,7 @@ public okhttp3.Call createPresignMultipartUploadCall(String repository, String b final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -615,7 +614,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -758,7 +757,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -849,7 +848,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ } /** * Build call for externalLogin - * @param externalLoginInformation (optional) + * @param body (optional) * @param _callback Callback for upload/download progress * @return Call to execute * @throws ApiException If fail to serialize the request body object @@ -862,8 +861,8 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ 0 Internal Server Error - */ - public okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - Object localVarPostBody = externalLoginInformation; + public okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + Object localVarPostBody = body; // create path and map variables String localVarPath = "/auth/external/login"; @@ -893,10 +892,10 @@ public okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInfo } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginCall(externalLoginInformation, _callback); + okhttp3.Call localVarCall = externalLoginCall(body, _callback); return localVarCall; } @@ -904,7 +903,7 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex /** * perform a login using an external authenticator * - * @param externalLoginInformation (optional) + * @param body (optional) * @return AuthenticationToken * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -916,15 +915,15 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex 0 Internal Server Error - */ - public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginInformation) throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + public AuthenticationToken externalLogin(Object body) throws ApiException { + ApiResponse localVarResp = externalLoginWithHttpInfo(body); return localVarResp.getData(); } /** * perform a login using an external authenticator * - * @param externalLoginInformation (optional) + * @param body (optional) * @return ApiResponse<AuthenticationToken> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -936,8 +935,8 @@ public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginI 0 Internal Server Error - */ - public ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + public ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -945,7 +944,7 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI /** * perform a login using an external authenticator (asynchronously) * - * @param externalLoginInformation (optional) + * @param body (optional) * @param _callback The callback to be executed when the API call finishes * @return The request call * @throws ApiException If fail to process the API call, e.g. serializing the request body object @@ -958,9 +957,9 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI 0 Internal Server Error - */ - public okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; @@ -1011,7 +1010,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1153,7 +1152,7 @@ public okhttp3.Call hardResetBranchCall(String repository, String branch, String final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1317,7 +1316,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java index bc691480381..d588b46c869 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java @@ -29,7 +29,6 @@ import io.lakefs.clients.api.model.AuthenticationToken; import io.lakefs.clients.api.model.Error; -import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -109,7 +108,7 @@ public okhttp3.Call createUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -252,7 +251,7 @@ public okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -343,7 +342,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ } /** * Build call for externalLogin - * @param externalLoginInformation (optional) + * @param body (optional) * @param _callback Callback for upload/download progress * @return Call to execute * @throws ApiException If fail to serialize the request body object @@ -356,8 +355,8 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ 0 Internal Server Error - */ - public okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - Object localVarPostBody = externalLoginInformation; + public okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + Object localVarPostBody = body; // create path and map variables String localVarPath = "/auth/external/login"; @@ -387,10 +386,10 @@ public okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInfo } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginCall(externalLoginInformation, _callback); + okhttp3.Call localVarCall = externalLoginCall(body, _callback); return localVarCall; } @@ -398,7 +397,7 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex /** * perform a login using an external authenticator * - * @param externalLoginInformation (optional) + * @param body (optional) * @return AuthenticationToken * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -410,15 +409,15 @@ private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation ex 0 Internal Server Error - */ - public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginInformation) throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + public AuthenticationToken externalLogin(Object body) throws ApiException { + ApiResponse localVarResp = externalLoginWithHttpInfo(body); return localVarResp.getData(); } /** * perform a login using an external authenticator * - * @param externalLoginInformation (optional) + * @param body (optional) * @return ApiResponse<AuthenticationToken> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -430,8 +429,8 @@ public AuthenticationToken externalLogin(ExternalLoginInformation externalLoginI 0 Internal Server Error - */ - public ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + public ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -439,7 +438,7 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI /** * perform a login using an external authenticator (asynchronously) * - * @param externalLoginInformation (optional) + * @param body (optional) * @param _callback The callback to be executed when the API call finishes * @return The request call * @throws ApiException If fail to process the API call, e.g. serializing the request body object @@ -452,9 +451,9 @@ public ApiResponse externalLoginWithHttpInfo(ExternalLoginI 0 Internal Server Error - */ - public okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; @@ -505,7 +504,7 @@ public okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -648,7 +647,7 @@ public okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java index 28a1367ed49..1116f52effa 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ImportApi.java @@ -109,7 +109,7 @@ public okhttp3.Call importCancelCall(String repository, String branch, String id final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -260,7 +260,7 @@ public okhttp3.Call importStartCall(String repository, String branch, ImportCrea final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -417,7 +417,7 @@ public okhttp3.Call importStatusCall(String repository, String branch, String id final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java index 1397b85d503..d041c92b55d 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/InternalApi.java @@ -122,7 +122,7 @@ public okhttp3.Call createBranchProtectionRulePreflightCall(String repository, f final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -252,7 +252,7 @@ public okhttp3.Call createCommitRecordCall(String repository, CommitRecordCreati final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -397,7 +397,7 @@ public okhttp3.Call createSymlinkFileCall(String repository, String branch, Stri final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -536,7 +536,7 @@ public okhttp3.Call deleteRepositoryMetadataCall(String repository, RepositoryMe final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -666,7 +666,7 @@ public okhttp3.Call dumpRefsCall(String repository, final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -902,7 +902,7 @@ public okhttp3.Call getGarbageCollectionConfigCall(final ApiCallback _callback) final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1010,7 +1010,7 @@ public okhttp3.Call getLakeFSVersionCall(final ApiCallback _callback) throws Api final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1235,7 +1235,7 @@ public okhttp3.Call getStorageConfigCall(final ApiCallback _callback) throws Api final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1352,7 +1352,7 @@ public okhttp3.Call getUsageReportSummaryCall(final ApiCallback _callback) throw final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1478,7 +1478,7 @@ public okhttp3.Call internalCreateBranchProtectionRuleCall(String repository, Br final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1620,7 +1620,7 @@ public okhttp3.Call internalDeleteBranchProtectionRuleCall(String repository, In final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1761,7 +1761,7 @@ public okhttp3.Call internalDeleteGarbageCollectionRulesCall(String repository, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1894,7 +1894,7 @@ public okhttp3.Call internalGetBranchProtectionRulesCall(String repository, fina final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2031,7 +2031,7 @@ public okhttp3.Call internalGetGarbageCollectionRulesCall(String repository, fin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2169,7 +2169,7 @@ public okhttp3.Call internalSetGarbageCollectionRulesCall(String repository, Gar final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2307,7 +2307,7 @@ public okhttp3.Call postStatsEventsCall(StatsEventsList statsEventsList, final A final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2432,7 +2432,7 @@ public okhttp3.Call prepareGarbageCollectionCommitsCall(String repository, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2566,7 +2566,7 @@ public okhttp3.Call prepareGarbageCollectionUncommittedCall(String repository, P final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2705,7 +2705,7 @@ public okhttp3.Call restoreRefsCall(String repository, RefsRestore refsRestore, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2840,7 +2840,7 @@ public okhttp3.Call setGarbageCollectionRulesPreflightCall(String repository, fi final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2965,7 +2965,7 @@ public okhttp3.Call setRepositoryMetadataCall(String repository, RepositoryMetad final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3359,7 +3359,7 @@ public okhttp3.Call stageObjectCall(String repository, String branch, String pat final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3532,7 +3532,7 @@ public okhttp3.Call uploadObjectPreflightCall(String repository, String branch, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java index 526d9c08ef9..86315a5d54f 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/MetadataApi.java @@ -100,7 +100,7 @@ public okhttp3.Call getMetaRangeCall(String repository, String metaRange, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -238,7 +238,7 @@ public okhttp3.Call getRangeCall(String repository, String range, final ApiCallb final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java index c391522decd..1c3ae1d2a52 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ObjectsApi.java @@ -114,7 +114,7 @@ public okhttp3.Call copyObjectCall(String repository, String branch, String dest final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -285,7 +285,7 @@ public okhttp3.Call deleteObjectCall(String repository, String branch, String pa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -440,7 +440,7 @@ public okhttp3.Call deleteObjectsCall(String repository, String branch, PathList final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -617,7 +617,7 @@ public okhttp3.Call getObjectCall(String repository, String ref, String path, St final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -792,7 +792,7 @@ public okhttp3.Call getUnderlyingPropertiesCall(String repository, String ref, S final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -951,7 +951,7 @@ public okhttp3.Call headObjectCall(String repository, String ref, String path, S final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "HEAD", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1135,7 +1135,7 @@ public okhttp3.Call listObjectsCall(String repository, String ref, Boolean userM final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1308,7 +1308,7 @@ public okhttp3.Call statObjectCall(String repository, String ref, String path, B final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1494,7 +1494,7 @@ public okhttp3.Call uploadObjectCall(String repository, String branch, String pa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java index 67396ac0994..026a3bb1b74 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RefsApi.java @@ -132,7 +132,7 @@ public okhttp3.Call diffRefsCall(String repository, String leftRef, String right final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -296,7 +296,7 @@ public okhttp3.Call findMergeBaseCall(String repository, String sourceRef, Strin final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -485,7 +485,7 @@ public okhttp3.Call logCommitsCall(String repository, String ref, String after, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -654,7 +654,7 @@ public okhttp3.Call mergeIntoBranchCall(String repository, String sourceRef, Str final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java index 18263469246..a2c19552453 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/RepositoriesApi.java @@ -111,7 +111,7 @@ public okhttp3.Call createRepositoryCall(RepositoryCreation repositoryCreation, final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -246,7 +246,7 @@ public okhttp3.Call deleteGCRulesCall(String repository, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -378,7 +378,7 @@ public okhttp3.Call deleteRepositoryCall(String repository, Boolean force, final final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -511,7 +511,7 @@ public okhttp3.Call dumpStatusCall(String repository, String taskId, final ApiCa final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -650,7 +650,7 @@ public okhttp3.Call dumpSubmitCall(String repository, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -778,7 +778,7 @@ public okhttp3.Call getBranchProtectionRulesCall(String repository, final ApiCal final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -906,7 +906,7 @@ public okhttp3.Call getGCRulesCall(String repository, final ApiCallback _callbac final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1034,7 +1034,7 @@ public okhttp3.Call getRepositoryCall(String repository, final ApiCallback _call final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1162,7 +1162,7 @@ public okhttp3.Call getRepositoryMetadataCall(String repository, final ApiCallba final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1302,7 +1302,7 @@ public okhttp3.Call listRepositoriesCall(String prefix, String after, Integer am final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1434,7 +1434,7 @@ public okhttp3.Call restoreStatusCall(String repository, String taskId, final Ap final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1575,7 +1575,7 @@ public okhttp3.Call restoreSubmitCall(String repository, RefsRestore refsRestore final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); localVarHeaderParams.put("Content-Type", localVarContentType); - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "jwt_token", "oidc_auth", "saml_auth" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "jwt_token", "oidc_auth", "saml_auth" }; return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1723,7 +1723,7 @@ public okhttp3.Call setBranchProtectionRulesCall(String repository, List -### external_auth - -- **Type**: HTTP basic authentication - ## Recommendation diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index 8b2c7993778..cb7e4734fb0 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -15,7 +15,6 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] -- external_auth: [] paths: /setup_comm_prefs: post: @@ -8159,13 +8158,6 @@ components: - secret_access_key type: object ExternalLoginInformation: - example: - presigned_url: presigned_url - properties: - presigned_url: - type: string - required: - - presigned_url type: object AuthenticationToken: example: @@ -9087,7 +9079,4 @@ components: in: cookie name: saml_auth_session type: apiKey - external_auth: - scheme: basic - type: http diff --git a/clients/java/docs/ActionsApi.md b/clients/java/docs/ActionsApi.md index 4999927c8a0..7e7b850c96f 100644 --- a/clients/java/docs/ActionsApi.md +++ b/clients/java/docs/ActionsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -94,7 +89,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -142,11 +137,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -196,7 +186,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -244,11 +234,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -306,7 +291,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -354,11 +339,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -412,7 +392,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/AuthApi.md b/clients/java/docs/AuthApi.md index e5659b16cfe..b317e959d3e 100644 --- a/clients/java/docs/AuthApi.md +++ b/clients/java/docs/AuthApi.md @@ -74,11 +74,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -125,7 +120,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -173,11 +168,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -224,7 +214,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -272,11 +262,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -323,7 +308,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -371,11 +356,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -421,7 +401,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -469,11 +449,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -520,7 +495,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -568,11 +543,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -618,7 +588,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -667,11 +637,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -718,7 +683,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -767,11 +732,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -821,7 +781,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -870,11 +830,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -921,7 +876,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -969,11 +924,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1018,7 +968,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1066,11 +1016,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1117,7 +1062,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1165,11 +1110,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1214,7 +1154,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1262,11 +1202,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1311,7 +1246,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1359,11 +1294,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1410,7 +1340,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1458,11 +1388,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1509,7 +1434,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1557,11 +1482,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1608,7 +1528,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1626,7 +1546,7 @@ null (empty response body) # **externalLogin** -> AuthenticationToken externalLogin().externalLoginInformation(externalLoginInformation).execute(); +> AuthenticationToken externalLogin().body(body).execute(); perform a login using an external authenticator @@ -1645,10 +1565,10 @@ public class Example { defaultClient.setBasePath("/api/v1"); AuthApi apiInstance = new AuthApi(defaultClient); - ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + Object body = null; // Object | try { AuthenticationToken result = apiInstance.externalLogin() - .externalLoginInformation(externalLoginInformation) + .body(body) .execute(); System.out.println(result); } catch (ApiException e) { @@ -1666,7 +1586,7 @@ public class Example { | Name | Type | Description | Notes | |------------- | ------------- | ------------- | -------------| -| **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] | +| **body** | **Object**| | [optional] | ### Return type @@ -1721,11 +1641,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1773,7 +1688,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1821,11 +1736,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1867,7 +1777,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1911,11 +1821,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1961,7 +1866,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2009,11 +1914,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2059,7 +1959,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2107,11 +2007,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2157,7 +2052,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2205,11 +2100,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2255,7 +2145,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2303,11 +2193,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2353,7 +2238,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2401,11 +2286,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2460,7 +2340,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2507,11 +2387,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2566,7 +2441,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2614,11 +2489,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2671,7 +2541,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2718,11 +2588,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2775,7 +2640,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2822,11 +2687,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2881,7 +2741,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2929,11 +2789,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2988,7 +2843,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3036,11 +2891,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3095,7 +2945,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3143,11 +2993,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3205,7 +3050,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3253,11 +3098,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3310,7 +3150,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3422,11 +3262,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3473,7 +3308,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3521,11 +3356,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -3573,7 +3403,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/BranchesApi.md b/clients/java/docs/BranchesApi.md index dc939c30521..7f46857e87b 100644 --- a/clients/java/docs/BranchesApi.md +++ b/clients/java/docs/BranchesApi.md @@ -46,11 +46,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -100,7 +95,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -151,11 +146,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -203,7 +193,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -254,11 +244,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -308,7 +293,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -357,11 +342,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -421,7 +401,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -469,11 +449,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -521,7 +496,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -569,11 +544,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -628,7 +598,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -676,11 +646,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -729,7 +694,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -779,11 +744,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -832,7 +792,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/CommitsApi.md b/clients/java/docs/CommitsApi.md index 4b6beda5ce9..a60dae05893 100644 --- a/clients/java/docs/CommitsApi.md +++ b/clients/java/docs/CommitsApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -97,7 +92,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -149,11 +144,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -201,7 +191,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ConfigApi.md b/clients/java/docs/ConfigApi.md index 43497bd9217..e629af1eb17 100644 --- a/clients/java/docs/ConfigApi.md +++ b/clients/java/docs/ConfigApi.md @@ -41,11 +41,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -87,7 +82,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ExperimentalApi.md b/clients/java/docs/ExperimentalApi.md index 48145a02814..9333088331c 100644 --- a/clients/java/docs/ExperimentalApi.md +++ b/clients/java/docs/ExperimentalApi.md @@ -49,11 +49,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -107,7 +102,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -158,11 +153,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -217,7 +207,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -269,11 +259,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -326,7 +311,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -375,11 +360,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -429,7 +409,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -478,11 +458,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -529,7 +504,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -547,7 +522,7 @@ null (empty response body) # **externalLogin** -> AuthenticationToken externalLogin().externalLoginInformation(externalLoginInformation).execute(); +> AuthenticationToken externalLogin().body(body).execute(); perform a login using an external authenticator @@ -566,10 +541,10 @@ public class Example { defaultClient.setBasePath("/api/v1"); ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); - ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + Object body = null; // Object | try { AuthenticationToken result = apiInstance.externalLogin() - .externalLoginInformation(externalLoginInformation) + .body(body) .execute(); System.out.println(result); } catch (ApiException e) { @@ -587,7 +562,7 @@ public class Example { | Name | Type | Description | Notes | |------------- | ------------- | ------------- | -------------| -| **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] | +| **body** | **Object**| | [optional] | ### Return type @@ -642,11 +617,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -692,7 +662,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -742,11 +712,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -798,7 +763,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -848,11 +813,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -907,7 +867,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ExternalApi.md b/clients/java/docs/ExternalApi.md index 782e25a75e9..42ed2f98599 100644 --- a/clients/java/docs/ExternalApi.md +++ b/clients/java/docs/ExternalApi.md @@ -43,11 +43,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -97,7 +92,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -146,11 +141,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -197,7 +187,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -215,7 +205,7 @@ null (empty response body) # **externalLogin** -> AuthenticationToken externalLogin().externalLoginInformation(externalLoginInformation).execute(); +> AuthenticationToken externalLogin().body(body).execute(); perform a login using an external authenticator @@ -234,10 +224,10 @@ public class Example { defaultClient.setBasePath("/api/v1"); ExternalApi apiInstance = new ExternalApi(defaultClient); - ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + Object body = null; // Object | try { AuthenticationToken result = apiInstance.externalLogin() - .externalLoginInformation(externalLoginInformation) + .body(body) .execute(); System.out.println(result); } catch (ApiException e) { @@ -255,7 +245,7 @@ public class Example { | Name | Type | Description | Notes | |------------- | ------------- | ------------- | -------------| -| **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] | +| **body** | **Object**| | [optional] | ### Return type @@ -310,11 +300,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -360,7 +345,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -408,11 +393,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -467,7 +447,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ExternalLoginInformation.md b/clients/java/docs/ExternalLoginInformation.md deleted file mode 100644 index eecddca1925..00000000000 --- a/clients/java/docs/ExternalLoginInformation.md +++ /dev/null @@ -1,13 +0,0 @@ - - -# ExternalLoginInformation - - -## Properties - -| Name | Type | Description | Notes | -|------------ | ------------- | ------------- | -------------| -|**presignedUrl** | **String** | | | - - - diff --git a/clients/java/docs/ImportApi.md b/clients/java/docs/ImportApi.md index c1c79fda81d..625bcd954ca 100644 --- a/clients/java/docs/ImportApi.md +++ b/clients/java/docs/ImportApi.md @@ -41,11 +41,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -94,7 +89,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -144,11 +139,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -198,7 +188,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -248,11 +238,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -302,7 +287,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/InternalApi.md b/clients/java/docs/InternalApi.md index 06f90ffc466..2298ca6a769 100644 --- a/clients/java/docs/InternalApi.md +++ b/clients/java/docs/InternalApi.md @@ -65,11 +65,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -114,7 +109,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -163,11 +158,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -214,7 +204,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -264,11 +254,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -319,7 +304,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -369,11 +354,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -420,7 +400,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -467,11 +447,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -517,7 +492,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -627,11 +602,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -673,7 +643,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -720,11 +690,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -766,7 +731,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -872,11 +837,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -918,7 +878,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -963,11 +923,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1009,7 +964,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1058,11 +1013,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1109,7 +1059,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1157,11 +1107,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1208,7 +1153,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1256,11 +1201,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1305,7 +1245,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1353,11 +1293,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1403,7 +1338,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1451,11 +1386,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1501,7 +1431,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1549,11 +1479,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1600,7 +1525,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1648,11 +1573,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1697,7 +1617,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1745,11 +1665,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1795,7 +1710,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1844,11 +1759,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1897,7 +1807,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1947,11 +1857,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1998,7 +1903,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2047,11 +1952,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2096,7 +1996,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2146,11 +2046,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2197,7 +2092,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2374,11 +2269,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2430,7 +2320,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2480,11 +2370,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -2533,7 +2418,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/MetadataApi.md b/clients/java/docs/MetadataApi.md index 490ae7f07a0..07a12c74861 100644 --- a/clients/java/docs/MetadataApi.md +++ b/clients/java/docs/MetadataApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -92,7 +87,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -140,11 +135,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -192,7 +182,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/ObjectsApi.md b/clients/java/docs/ObjectsApi.md index 8b03c9a24e1..d441235e74e 100644 --- a/clients/java/docs/ObjectsApi.md +++ b/clients/java/docs/ObjectsApi.md @@ -47,11 +47,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -103,7 +98,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -153,11 +148,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -209,7 +199,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -258,11 +248,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -315,7 +300,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -364,11 +349,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -427,7 +407,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -480,11 +460,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -534,7 +509,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -582,11 +557,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -638,7 +608,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -689,11 +659,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -759,7 +724,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -807,11 +772,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -867,7 +827,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -917,11 +877,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -983,7 +938,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/RefsApi.md b/clients/java/docs/RefsApi.md index 65da1b9e973..36100c42bf4 100644 --- a/clients/java/docs/RefsApi.md +++ b/clients/java/docs/RefsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -111,7 +106,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -159,11 +154,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -213,7 +203,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -262,11 +252,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -338,7 +323,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -386,11 +371,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -443,7 +423,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/RepositoriesApi.md b/clients/java/docs/RepositoriesApi.md index cb8559cf7db..664fcc4ef43 100644 --- a/clients/java/docs/RepositoriesApi.md +++ b/clients/java/docs/RepositoriesApi.md @@ -52,11 +52,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -105,7 +100,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -154,11 +149,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -203,7 +193,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -252,11 +242,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -304,7 +289,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -352,11 +337,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -404,7 +384,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -453,11 +433,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -503,7 +478,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -551,11 +526,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -601,7 +571,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -649,11 +619,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -699,7 +664,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -747,11 +712,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -797,7 +757,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -845,11 +805,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -895,7 +850,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -943,11 +898,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1000,7 +950,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1047,11 +997,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1099,7 +1044,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1148,11 +1093,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1200,7 +1140,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1249,11 +1189,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1303,7 +1238,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1354,11 +1289,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -1405,7 +1335,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/StagingApi.md b/clients/java/docs/StagingApi.md index ff9c5c864b0..922fab5d459 100644 --- a/clients/java/docs/StagingApi.md +++ b/clients/java/docs/StagingApi.md @@ -40,11 +40,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -97,7 +92,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -147,11 +142,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -206,7 +196,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/docs/TagsApi.md b/clients/java/docs/TagsApi.md index 0129047289b..0fb60d7a48f 100644 --- a/clients/java/docs/TagsApi.md +++ b/clients/java/docs/TagsApi.md @@ -42,11 +42,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -94,7 +89,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -145,11 +140,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -199,7 +189,7 @@ null (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -248,11 +238,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -300,7 +285,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -348,11 +333,6 @@ public class Example { // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null) //cookie_auth.setApiKeyPrefix("Token"); - // Configure HTTP basic authorization: external_auth - HttpBasicAuth external_auth = (HttpBasicAuth) defaultClient.getAuthentication("external_auth"); - external_auth.setUsername("YOUR USERNAME"); - external_auth.setPassword("YOUR PASSWORD"); - // Configure API key authorization: oidc_auth ApiKeyAuth oidc_auth = (ApiKeyAuth) defaultClient.getAuthentication("oidc_auth"); oidc_auth.setApiKey("YOUR API KEY"); @@ -407,7 +387,7 @@ public class Example { ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java index a912a91f951..3dba7a7a802 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ActionsApi.java @@ -118,7 +118,7 @@ private okhttp3.Call getRunCall(String repository, String runId, final ApiCallba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -301,7 +301,7 @@ private okhttp3.Call getRunHookOutputCall(String repository, String runId, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -505,7 +505,7 @@ private okhttp3.Call listRepositoryRunsCall(String repository, String after, Int localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -730,7 +730,7 @@ private okhttp3.Call listRunHooksCall(String repository, String runId, String af localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java index f9b3e2e6cc6..38fd1cbfcd2 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ApiClient.java @@ -104,7 +104,6 @@ public ApiClient() { authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); - authentications.put("external_auth", new HttpBasicAuth()); // Prevent the authentications from being modified. authentications = Collections.unmodifiableMap(authentications); } @@ -125,7 +124,6 @@ public ApiClient(OkHttpClient client) { authentications.put("cookie_auth", new ApiKeyAuth("cookie", "internal_auth_session")); authentications.put("oidc_auth", new ApiKeyAuth("cookie", "oidc_auth_session")); authentications.put("saml_auth", new ApiKeyAuth("cookie", "saml_auth_session")); - authentications.put("external_auth", new HttpBasicAuth()); // Prevent the authentications from being modified. authentications = Collections.unmodifiableMap(authentications); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java index 9475c4e37bb..f18148b0a73 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java @@ -35,7 +35,6 @@ import io.lakefs.clients.sdk.model.CurrentUser; import io.lakefs.clients.sdk.model.Error; import io.lakefs.clients.sdk.model.ErrorNoACL; -import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -134,7 +133,7 @@ private okhttp3.Call addGroupMembershipCall(String groupId, String userId, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -311,7 +310,7 @@ private okhttp3.Call attachPolicyToGroupCall(String groupId, String policyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -488,7 +487,7 @@ private okhttp3.Call attachPolicyToUserCall(String userId, String policyId, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -664,7 +663,7 @@ private okhttp3.Call createCredentialsCall(String userId, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -836,7 +835,7 @@ private okhttp3.Call createGroupCall(GroupCreation groupCreation, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1011,7 +1010,7 @@ private okhttp3.Call createPolicyCall(Policy policy, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1188,7 +1187,7 @@ private okhttp3.Call createUserCall(UserCreation userCreation, final ApiCallback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1373,7 +1372,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1566,7 +1565,7 @@ private okhttp3.Call deleteCredentialsCall(String userId, String accessKeyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1742,7 +1741,7 @@ private okhttp3.Call deleteGroupCall(String groupId, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1911,7 +1910,7 @@ private okhttp3.Call deleteGroupMembershipCall(String groupId, String userId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2087,7 +2086,7 @@ private okhttp3.Call deletePolicyCall(String policyId, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2255,7 +2254,7 @@ private okhttp3.Call deleteUserCall(String userId, final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2427,7 +2426,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2604,7 +2603,7 @@ private okhttp3.Call detachPolicyFromGroupCall(String groupId, String policyId, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2781,7 +2780,7 @@ private okhttp3.Call detachPolicyFromUserCall(String userId, String policyId, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2916,7 +2915,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdetachPolicyFromUserRequest detachPolicyFromUser(String userId, String policyId) { return new APIdetachPolicyFromUserRequest(userId, policyId); } - private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -2930,7 +2929,7 @@ private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInf basePath = null; } - Object localVarPostBody = externalLoginInformation; + Object localVarPostBody = body; // create path and map variables String localVarPath = "/auth/external/login"; @@ -2962,39 +2961,39 @@ private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInf } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - return externalLoginCall(externalLoginInformation, _callback); + private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + return externalLoginCall(body, _callback); } - private ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + private ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } public class APIexternalLoginRequest { - private ExternalLoginInformation externalLoginInformation; + private Object body; private APIexternalLoginRequest() { } /** - * Set externalLoginInformation - * @param externalLoginInformation (optional) + * Set body + * @param body (optional) * @return APIexternalLoginRequest */ - public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation externalLoginInformation) { - this.externalLoginInformation = externalLoginInformation; + public APIexternalLoginRequest body(Object body) { + this.body = body; return this; } @@ -3013,7 +3012,7 @@ public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation */ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { - return externalLoginCall(externalLoginInformation, _callback); + return externalLoginCall(body, _callback); } /** @@ -3030,7 +3029,7 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { */ public AuthenticationToken execute() throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + ApiResponse localVarResp = externalLoginWithHttpInfo(body); return localVarResp.getData(); } @@ -3048,7 +3047,7 @@ public AuthenticationToken execute() throws ApiException { */ public ApiResponse executeWithHttpInfo() throws ApiException { - return externalLoginWithHttpInfo(externalLoginInformation); + return externalLoginWithHttpInfo(body); } /** @@ -3066,7 +3065,7 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio */ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { - return externalLoginAsync(externalLoginInformation, _callback); + return externalLoginAsync(body, _callback); } } @@ -3128,7 +3127,7 @@ private okhttp3.Call getCredentialsCall(String userId, String accessKeyId, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3307,7 +3306,7 @@ private okhttp3.Call getCurrentUserCall(final ApiCallback _callback) throws ApiE localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3454,7 +3453,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3626,7 +3625,7 @@ private okhttp3.Call getGroupCall(String groupId, final ApiCallback _callback) t localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3798,7 +3797,7 @@ private okhttp3.Call getGroupACLCall(String groupId, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3970,7 +3969,7 @@ private okhttp3.Call getPolicyCall(String policyId, final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4142,7 +4141,7 @@ private okhttp3.Call getUserCall(String userId, final ApiCallback _callback) thr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4326,7 +4325,7 @@ private okhttp3.Call listGroupMembersCall(String groupId, String prefix, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4538,7 +4537,7 @@ private okhttp3.Call listGroupPoliciesCall(String groupId, String prefix, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4754,7 +4753,7 @@ private okhttp3.Call listGroupsCall(String prefix, String after, Integer amount, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4957,7 +4956,7 @@ private okhttp3.Call listPoliciesCall(String prefix, String after, Integer amoun localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5161,7 +5160,7 @@ private okhttp3.Call listUserCredentialsCall(String userId, String prefix, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5378,7 +5377,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5595,7 +5594,7 @@ private okhttp3.Call listUserGroupsCall(String userId, String prefix, String aft localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -5816,7 +5815,7 @@ private okhttp3.Call listUserPoliciesCall(String userId, String prefix, String a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -6043,7 +6042,7 @@ private okhttp3.Call listUsersCall(String prefix, String after, Integer amount, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -6406,7 +6405,7 @@ private okhttp3.Call setGroupACLCall(String groupId, ACL ACL, final ApiCallback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -6583,7 +6582,7 @@ private okhttp3.Call updatePolicyCall(String policyId, Policy policy, final ApiC localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java index 4cbfe887f27..4a78a796eca 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/BranchesApi.java @@ -123,7 +123,7 @@ private okhttp3.Call cherryPickCall(String repository, String branch, CherryPick localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -328,7 +328,7 @@ private okhttp3.Call createBranchCall(String repository, BranchCreation branchCr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -528,7 +528,7 @@ private okhttp3.Call deleteBranchCall(String repository, String branch, Boolean localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -737,7 +737,7 @@ private okhttp3.Call diffBranchCall(String repository, String branch, String aft localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -962,7 +962,7 @@ private okhttp3.Call getBranchCall(String repository, String branch, final ApiCa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1154,7 +1154,7 @@ private okhttp3.Call listBranchesCall(String repository, String prefix, String a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1361,7 +1361,7 @@ private okhttp3.Call resetBranchCall(String repository, String branch, ResetCrea localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1557,7 +1557,7 @@ private okhttp3.Call revertBranchCall(String repository, String branch, RevertCr localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java index 81cc5f97ead..b051276275a 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/CommitsApi.java @@ -121,7 +121,7 @@ private okhttp3.Call commitCall(String repository, String branch, CommitCreation localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -341,7 +341,7 @@ private okhttp3.Call getCommitCall(String repository, String commitId, final Api localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java index 3d654431023..6964e235fe2 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ConfigApi.java @@ -113,7 +113,7 @@ private okhttp3.Call getConfigCall(final ApiCallback _callback) throws ApiExcept localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java index 3b46a48d81f..308350cf288 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java @@ -31,7 +31,6 @@ import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.CompletePresignMultipartUpload; import io.lakefs.clients.sdk.model.Error; -import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -130,7 +129,7 @@ private okhttp3.Call abortPresignMultipartUploadCall(String repository, String b localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -345,7 +344,7 @@ private okhttp3.Call completePresignMultipartUploadCall(String repository, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -571,7 +570,7 @@ private okhttp3.Call createPresignMultipartUploadCall(String repository, String localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -780,7 +779,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -976,7 +975,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1111,7 +1110,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } - private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -1125,7 +1124,7 @@ private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInf basePath = null; } - Object localVarPostBody = externalLoginInformation; + Object localVarPostBody = body; // create path and map variables String localVarPath = "/auth/external/login"; @@ -1157,39 +1156,39 @@ private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInf } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - return externalLoginCall(externalLoginInformation, _callback); + private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + return externalLoginCall(body, _callback); } - private ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + private ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } public class APIexternalLoginRequest { - private ExternalLoginInformation externalLoginInformation; + private Object body; private APIexternalLoginRequest() { } /** - * Set externalLoginInformation - * @param externalLoginInformation (optional) + * Set body + * @param body (optional) * @return APIexternalLoginRequest */ - public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation externalLoginInformation) { - this.externalLoginInformation = externalLoginInformation; + public APIexternalLoginRequest body(Object body) { + this.body = body; return this; } @@ -1208,7 +1207,7 @@ public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation */ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { - return externalLoginCall(externalLoginInformation, _callback); + return externalLoginCall(body, _callback); } /** @@ -1225,7 +1224,7 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { */ public AuthenticationToken execute() throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + ApiResponse localVarResp = externalLoginWithHttpInfo(body); return localVarResp.getData(); } @@ -1243,7 +1242,7 @@ public AuthenticationToken execute() throws ApiException { */ public ApiResponse executeWithHttpInfo() throws ApiException { - return externalLoginWithHttpInfo(externalLoginInformation); + return externalLoginWithHttpInfo(body); } /** @@ -1261,7 +1260,7 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio */ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { - return externalLoginAsync(externalLoginInformation, _callback); + return externalLoginAsync(body, _callback); } } @@ -1325,7 +1324,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1506,7 +1505,7 @@ private okhttp3.Call hardResetBranchCall(String repository, String branch, Strin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1723,7 +1722,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java index 5f2a701d359..d337f87c4ce 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java @@ -29,7 +29,6 @@ import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.Error; -import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -123,7 +122,7 @@ private okhttp3.Call createUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -319,7 +318,7 @@ private okhttp3.Call deleteUserExternalPrincipalCall(String userId, String princ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -454,7 +453,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } - private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -468,7 +467,7 @@ private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInf basePath = null; } - Object localVarPostBody = externalLoginInformation; + Object localVarPostBody = body; // create path and map variables String localVarPath = "/auth/external/login"; @@ -500,39 +499,39 @@ private okhttp3.Call externalLoginCall(ExternalLoginInformation externalLoginInf } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - return externalLoginCall(externalLoginInformation, _callback); + private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + return externalLoginCall(body, _callback); } - private ApiResponse externalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, null); + private ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(externalLoginInformation, _callback); + okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } public class APIexternalLoginRequest { - private ExternalLoginInformation externalLoginInformation; + private Object body; private APIexternalLoginRequest() { } /** - * Set externalLoginInformation - * @param externalLoginInformation (optional) + * Set body + * @param body (optional) * @return APIexternalLoginRequest */ - public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation externalLoginInformation) { - this.externalLoginInformation = externalLoginInformation; + public APIexternalLoginRequest body(Object body) { + this.body = body; return this; } @@ -551,7 +550,7 @@ public APIexternalLoginRequest externalLoginInformation(ExternalLoginInformation */ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { - return externalLoginCall(externalLoginInformation, _callback); + return externalLoginCall(body, _callback); } /** @@ -568,7 +567,7 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { */ public AuthenticationToken execute() throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(externalLoginInformation); + ApiResponse localVarResp = externalLoginWithHttpInfo(body); return localVarResp.getData(); } @@ -586,7 +585,7 @@ public AuthenticationToken execute() throws ApiException { */ public ApiResponse executeWithHttpInfo() throws ApiException { - return externalLoginWithHttpInfo(externalLoginInformation); + return externalLoginWithHttpInfo(body); } /** @@ -604,7 +603,7 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio */ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { - return externalLoginAsync(externalLoginInformation, _callback); + return externalLoginAsync(body, _callback); } } @@ -668,7 +667,7 @@ private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -852,7 +851,7 @@ private okhttp3.Call listUserExternalPrincipalsCall(String userId, String prefix localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java index b0f4d6607a2..098f0258595 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ImportApi.java @@ -121,7 +121,7 @@ private okhttp3.Call importCancelCall(String repository, String branch, String i localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -317,7 +317,7 @@ private okhttp3.Call importStartCall(String repository, String branch, ImportCre localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -520,7 +520,7 @@ private okhttp3.Call importStatusCall(String repository, String branch, String i localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java index f419eb2f3e6..f31b348964b 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/InternalApi.java @@ -137,7 +137,7 @@ private okhttp3.Call createBranchProtectionRulePreflightCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -311,7 +311,7 @@ private okhttp3.Call createCommitRecordCall(String repository, CommitRecordCreat localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -502,7 +502,7 @@ private okhttp3.Call createSymlinkFileCall(String repository, String branch, Str localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -694,7 +694,7 @@ private okhttp3.Call deleteRepositoryMetadataCall(String repository, RepositoryM localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -865,7 +865,7 @@ private okhttp3.Call dumpRefsCall(String repository, final ApiCallback _callback localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1194,7 +1194,7 @@ private okhttp3.Call getGarbageCollectionConfigCall(final ApiCallback _callback) localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1342,7 +1342,7 @@ private okhttp3.Call getLakeFSVersionCall(final ApiCallback _callback) throws Ap localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1654,7 +1654,7 @@ private okhttp3.Call getStorageConfigCall(final ApiCallback _callback) throws Ap localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1814,7 +1814,7 @@ private okhttp3.Call getUsageReportSummaryCall(final ApiCallback _callback) thro localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1984,7 +1984,7 @@ private okhttp3.Call internalCreateBranchProtectionRuleCall(String repository, B localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2172,7 +2172,7 @@ private okhttp3.Call internalDeleteBranchProtectionRuleCall(String repository, I localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2359,7 +2359,7 @@ private okhttp3.Call internalDeleteGarbageCollectionRulesCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2538,7 +2538,7 @@ private okhttp3.Call internalGetBranchProtectionRulesCall(String repository, fin localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2721,7 +2721,7 @@ private okhttp3.Call internalGetGarbageCollectionRulesCall(String repository, fi localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2905,7 +2905,7 @@ private okhttp3.Call internalSetGarbageCollectionRulesCall(String repository, Ga localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3092,7 +3092,7 @@ private okhttp3.Call postStatsEventsCall(StatsEventsList statsEventsList, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3260,7 +3260,7 @@ private okhttp3.Call prepareGarbageCollectionCommitsCall(String repository, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3438,7 +3438,7 @@ private okhttp3.Call prepareGarbageCollectionUncommittedCall(String repository, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3632,7 +3632,7 @@ private okhttp3.Call restoreRefsCall(String repository, RefsRestore refsRestore, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3813,7 +3813,7 @@ private okhttp3.Call setGarbageCollectionRulesPreflightCall(String repository, f localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -3982,7 +3982,7 @@ private okhttp3.Call setRepositoryMetadataCall(String repository, RepositoryMeta localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4504,7 +4504,7 @@ private okhttp3.Call stageObjectCall(String repository, String branch, String pa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "PUT", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -4726,7 +4726,7 @@ private okhttp3.Call uploadObjectPreflightCall(String repository, String branch, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java b/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java index 753267e0a6c..b0b1f6dea02 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java @@ -118,7 +118,6 @@ private static Class getClassByDiscriminator(Map classByDiscriminatorValue, Stri gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.DiffList.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.Error.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ErrorNoACL.CustomTypeAdapterFactory()); - gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalLoginInformation.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalPrincipal.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalPrincipalCreation.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalPrincipalList.CustomTypeAdapterFactory()); diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java index b72d096e83a..8d8e51f62fa 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/MetadataApi.java @@ -115,7 +115,7 @@ private okhttp3.Call getMetaRangeCall(String repository, String metaRange, final localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -296,7 +296,7 @@ private okhttp3.Call getRangeCall(String repository, String range, final ApiCall localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java index a45c23100e4..8f2ea7cc92d 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ObjectsApi.java @@ -126,7 +126,7 @@ private okhttp3.Call copyObjectCall(String repository, String branch, String des localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -341,7 +341,7 @@ private okhttp3.Call deleteObjectCall(String repository, String branch, String p localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -547,7 +547,7 @@ private okhttp3.Call deleteObjectsCall(String repository, String branch, PathLis localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -769,7 +769,7 @@ private okhttp3.Call getObjectCall(String repository, String ref, String path, S localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1020,7 +1020,7 @@ private okhttp3.Call getUnderlyingPropertiesCall(String repository, String ref, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1216,7 +1216,7 @@ private okhttp3.Call headObjectCall(String repository, String ref, String path, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "HEAD", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1451,7 +1451,7 @@ private okhttp3.Call listObjectsCall(String repository, String ref, Boolean user localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1710,7 +1710,7 @@ private okhttp3.Call statObjectCall(String repository, String ref, String path, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1953,7 +1953,7 @@ private okhttp3.Call uploadObjectCall(String repository, String branch, String p localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java index 23892e0a897..e266e9d9cd4 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/RefsApi.java @@ -141,7 +141,7 @@ private okhttp3.Call diffRefsCall(String repository, String leftRef, String righ localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -386,7 +386,7 @@ private okhttp3.Call findMergeBaseCall(String repository, String sourceRef, Stri localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -612,7 +612,7 @@ private okhttp3.Call logCommitsCall(String repository, String ref, String after, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -883,7 +883,7 @@ private okhttp3.Call mergeIntoBranchCall(String repository, String sourceRef, St localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java index d1b4d94a3c0..2b45a54a744 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/RepositoriesApi.java @@ -126,7 +126,7 @@ private okhttp3.Call createRepositoryCall(RepositoryCreation repositoryCreation, localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -314,7 +314,7 @@ private okhttp3.Call deleteGCRulesCall(String repository, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -491,7 +491,7 @@ private okhttp3.Call deleteRepositoryCall(String repository, Boolean force, fina localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "DELETE", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -674,7 +674,7 @@ private okhttp3.Call dumpStatusCall(String repository, String taskId, final ApiC localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -859,7 +859,7 @@ private okhttp3.Call dumpSubmitCall(String repository, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1031,7 +1031,7 @@ private okhttp3.Call getBranchProtectionRulesCall(String repository, final ApiCa localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1203,7 +1203,7 @@ private okhttp3.Call getGCRulesCall(String repository, final ApiCallback _callba localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1375,7 +1375,7 @@ private okhttp3.Call getRepositoryCall(String repository, final ApiCallback _cal localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1547,7 +1547,7 @@ private okhttp3.Call getRepositoryMetadataCall(String repository, final ApiCallb localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1730,7 +1730,7 @@ private okhttp3.Call listRepositoriesCall(String prefix, String after, Integer a localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -1926,7 +1926,7 @@ private okhttp3.Call restoreStatusCall(String repository, String taskId, final A localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "GET", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2112,7 +2112,7 @@ private okhttp3.Call restoreSubmitCall(String repository, RefsRestore refsRestor localVarHeaderParams.put("Content-Type", localVarContentType); } - String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "external_auth", "oidc_auth", "saml_auth", "jwt_token" }; + String[] localVarAuthNames = new String[] { "basic_auth", "cookie_auth", "oidc_auth", "saml_auth", "jwt_token" }; return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); } @@ -2302,7 +2302,7 @@ private okhttp3.Call setBranchProtectionRulesCall(String repository, List additionalProperties; - - /** - * Set the additional (undeclared) property with the specified name and value. - * If the property does not already exist, create it otherwise replace it. - * - * @param key name of the property - * @param value value of the property - * @return the ExternalLoginInformation instance itself - */ - public ExternalLoginInformation putAdditionalProperty(String key, Object value) { - if (this.additionalProperties == null) { - this.additionalProperties = new HashMap(); - } - this.additionalProperties.put(key, value); - return this; - } - - /** - * Return the additional (undeclared) property. - * - * @return a map of objects - */ - public Map getAdditionalProperties() { - return additionalProperties; - } - - /** - * Return the additional (undeclared) property with the specified name. - * - * @param key name of the property - * @return an object - */ - public Object getAdditionalProperty(String key) { - if (this.additionalProperties == null) { - return null; - } - return this.additionalProperties.get(key); - } - - - @Override - public boolean equals(Object o) { - if (this == o) { - return true; - } - if (o == null || getClass() != o.getClass()) { - return false; - } - ExternalLoginInformation externalLoginInformation = (ExternalLoginInformation) o; - return Objects.equals(this.presignedUrl, externalLoginInformation.presignedUrl)&& - Objects.equals(this.additionalProperties, externalLoginInformation.additionalProperties); - } - - @Override - public int hashCode() { - return Objects.hash(presignedUrl, additionalProperties); - } - - @Override - public String toString() { - StringBuilder sb = new StringBuilder(); - sb.append("class ExternalLoginInformation {\n"); - sb.append(" presignedUrl: ").append(toIndentedString(presignedUrl)).append("\n"); - sb.append(" additionalProperties: ").append(toIndentedString(additionalProperties)).append("\n"); - sb.append("}"); - return sb.toString(); - } - - /** - * Convert the given object to string with each line indented by 4 spaces - * (except the first line). - */ - private String toIndentedString(Object o) { - if (o == null) { - return "null"; - } - return o.toString().replace("\n", "\n "); - } - - - public static HashSet openapiFields; - public static HashSet openapiRequiredFields; - - static { - // a set of all properties/fields (JSON key names) - openapiFields = new HashSet(); - openapiFields.add("presigned_url"); - - // a set of required properties/fields (JSON key names) - openapiRequiredFields = new HashSet(); - openapiRequiredFields.add("presigned_url"); - } - - /** - * Validates the JSON Element and throws an exception if issues found - * - * @param jsonElement JSON Element - * @throws IOException if the JSON Element is invalid with respect to ExternalLoginInformation - */ - public static void validateJsonElement(JsonElement jsonElement) throws IOException { - if (jsonElement == null) { - if (!ExternalLoginInformation.openapiRequiredFields.isEmpty()) { // has required fields but JSON element is null - throw new IllegalArgumentException(String.format("The required field(s) %s in ExternalLoginInformation is not found in the empty JSON string", ExternalLoginInformation.openapiRequiredFields.toString())); - } - } - - // check to make sure all required properties/fields are present in the JSON string - for (String requiredField : ExternalLoginInformation.openapiRequiredFields) { - if (jsonElement.getAsJsonObject().get(requiredField) == null) { - throw new IllegalArgumentException(String.format("The required field `%s` is not found in the JSON string: %s", requiredField, jsonElement.toString())); - } - } - JsonObject jsonObj = jsonElement.getAsJsonObject(); - if (!jsonObj.get("presigned_url").isJsonPrimitive()) { - throw new IllegalArgumentException(String.format("Expected the field `presigned_url` to be a primitive type in the JSON string but got `%s`", jsonObj.get("presigned_url").toString())); - } - } - - public static class CustomTypeAdapterFactory implements TypeAdapterFactory { - @SuppressWarnings("unchecked") - @Override - public TypeAdapter create(Gson gson, TypeToken type) { - if (!ExternalLoginInformation.class.isAssignableFrom(type.getRawType())) { - return null; // this class only serializes 'ExternalLoginInformation' and its subtypes - } - final TypeAdapter elementAdapter = gson.getAdapter(JsonElement.class); - final TypeAdapter thisAdapter - = gson.getDelegateAdapter(this, TypeToken.get(ExternalLoginInformation.class)); - - return (TypeAdapter) new TypeAdapter() { - @Override - public void write(JsonWriter out, ExternalLoginInformation value) throws IOException { - JsonObject obj = thisAdapter.toJsonTree(value).getAsJsonObject(); - obj.remove("additionalProperties"); - // serialize additional properties - if (value.getAdditionalProperties() != null) { - for (Map.Entry entry : value.getAdditionalProperties().entrySet()) { - if (entry.getValue() instanceof String) - obj.addProperty(entry.getKey(), (String) entry.getValue()); - else if (entry.getValue() instanceof Number) - obj.addProperty(entry.getKey(), (Number) entry.getValue()); - else if (entry.getValue() instanceof Boolean) - obj.addProperty(entry.getKey(), (Boolean) entry.getValue()); - else if (entry.getValue() instanceof Character) - obj.addProperty(entry.getKey(), (Character) entry.getValue()); - else { - obj.add(entry.getKey(), gson.toJsonTree(entry.getValue()).getAsJsonObject()); - } - } - } - elementAdapter.write(out, obj); - } - - @Override - public ExternalLoginInformation read(JsonReader in) throws IOException { - JsonElement jsonElement = elementAdapter.read(in); - validateJsonElement(jsonElement); - JsonObject jsonObj = jsonElement.getAsJsonObject(); - // store additional fields in the deserialized instance - ExternalLoginInformation instance = thisAdapter.fromJsonTree(jsonObj); - for (Map.Entry entry : jsonObj.entrySet()) { - if (!openapiFields.contains(entry.getKey())) { - if (entry.getValue().isJsonPrimitive()) { // primitive type - if (entry.getValue().getAsJsonPrimitive().isString()) - instance.putAdditionalProperty(entry.getKey(), entry.getValue().getAsString()); - else if (entry.getValue().getAsJsonPrimitive().isNumber()) - instance.putAdditionalProperty(entry.getKey(), entry.getValue().getAsNumber()); - else if (entry.getValue().getAsJsonPrimitive().isBoolean()) - instance.putAdditionalProperty(entry.getKey(), entry.getValue().getAsBoolean()); - else - throw new IllegalArgumentException(String.format("The field `%s` has unknown primitive type. Value: %s", entry.getKey(), entry.getValue().toString())); - } else if (entry.getValue().isJsonArray()) { - instance.putAdditionalProperty(entry.getKey(), gson.fromJson(entry.getValue(), List.class)); - } else { // JSON object - instance.putAdditionalProperty(entry.getKey(), gson.fromJson(entry.getValue(), HashMap.class)); - } - } - } - return instance; - } - - }.nullSafe(); - } - } - - /** - * Create an instance of ExternalLoginInformation given an JSON string - * - * @param jsonString JSON string - * @return An instance of ExternalLoginInformation - * @throws IOException if the JSON string is invalid with respect to ExternalLoginInformation - */ - public static ExternalLoginInformation fromJson(String jsonString) throws IOException { - return JSON.getGson().fromJson(jsonString, ExternalLoginInformation.class); - } - - /** - * Convert an instance of ExternalLoginInformation to an JSON string - * - * @return JSON string - */ - public String toJson() { - return JSON.getGson().toJson(this); - } -} - diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java index 734633761f9..22a266e0f45 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java @@ -22,7 +22,6 @@ import io.lakefs.clients.sdk.model.CurrentUser; import io.lakefs.clients.sdk.model.Error; import io.lakefs.clients.sdk.model.ErrorNoACL; -import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -279,9 +278,9 @@ public void detachPolicyFromUserTest() throws ApiException { */ @Test public void externalLoginTest() throws ApiException { - ExternalLoginInformation externalLoginInformation = null; + Object body = null; AuthenticationToken response = api.externalLogin() - .externalLoginInformation(externalLoginInformation) + .body(body) .execute(); // TODO: test validations } diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java index 215ae08a3f4..69736eeecda 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java @@ -18,7 +18,6 @@ import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.CompletePresignMultipartUpload; import io.lakefs.clients.sdk.model.Error; -import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -137,9 +136,9 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalLoginTest() throws ApiException { - ExternalLoginInformation externalLoginInformation = null; + Object body = null; AuthenticationToken response = api.externalLogin() - .externalLoginInformation(externalLoginInformation) + .body(body) .execute(); // TODO: test validations } diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java index 37826f0117b..43573391b0f 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java @@ -16,7 +16,6 @@ import io.lakefs.clients.sdk.ApiException; import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.Error; -import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -73,9 +72,9 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalLoginTest() throws ApiException { - ExternalLoginInformation externalLoginInformation = null; + Object body = null; AuthenticationToken response = api.externalLogin() - .externalLoginInformation(externalLoginInformation) + .body(body) .execute(); // TODO: test validations } diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java deleted file mode 100644 index e31664cb104..00000000000 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java +++ /dev/null @@ -1,48 +0,0 @@ -/* - * lakeFS API - * lakeFS HTTP API - * - * The version of the OpenAPI document: 1.0.0 - * - * - * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). - * https://openapi-generator.tech - * Do not edit the class manually. - */ - - -package io.lakefs.clients.sdk.model; - -import com.google.gson.TypeAdapter; -import com.google.gson.annotations.JsonAdapter; -import com.google.gson.annotations.SerializedName; -import com.google.gson.stream.JsonReader; -import com.google.gson.stream.JsonWriter; -import java.io.IOException; -import java.util.Arrays; -import org.junit.jupiter.api.Disabled; -import org.junit.jupiter.api.Test; - -/** - * Model tests for ExternalLoginInformation - */ -public class ExternalLoginInformationTest { - private final ExternalLoginInformation model = new ExternalLoginInformation(); - - /** - * Model tests for ExternalLoginInformation - */ - @Test - public void testExternalLoginInformation() { - // TODO: test ExternalLoginInformation - } - - /** - * Test the property 'presignedUrl' - */ - @Test - public void presignedUrlTest() { - // TODO: test presignedUrl - } - -} diff --git a/clients/python-legacy/.openapi-generator/FILES b/clients/python-legacy/.openapi-generator/FILES index 28b715a94e3..e80cce0a23f 100644 --- a/clients/python-legacy/.openapi-generator/FILES +++ b/clients/python-legacy/.openapi-generator/FILES @@ -34,7 +34,6 @@ docs/Error.md docs/ErrorNoACL.md docs/ExperimentalApi.md docs/ExternalApi.md -docs/ExternalLoginInformation.md docs/ExternalPrincipal.md docs/ExternalPrincipalCreation.md docs/ExternalPrincipalList.md @@ -169,7 +168,6 @@ lakefs_client/model/diff.py lakefs_client/model/diff_list.py lakefs_client/model/error.py lakefs_client/model/error_no_acl.py -lakefs_client/model/external_login_information.py lakefs_client/model/external_principal.py lakefs_client/model/external_principal_creation.py lakefs_client/model/external_principal_list.py @@ -285,7 +283,6 @@ test/test_error.py test/test_error_no_acl.py test/test_experimental_api.py test/test_external_api.py -test/test_external_login_information.py test/test_external_principal.py test/test_external_principal_creation.py test/test_external_principal_list.py diff --git a/clients/python-legacy/README.md b/clients/python-legacy/README.md index 7bf2a129ca9..4a205865707 100644 --- a/clients/python-legacy/README.md +++ b/clients/python-legacy/README.md @@ -77,12 +77,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -282,7 +276,6 @@ Class | Method | HTTP request | Description - [DiffList](docs/DiffList.md) - [Error](docs/Error.md) - [ErrorNoACL](docs/ErrorNoACL.md) - - [ExternalLoginInformation](docs/ExternalLoginInformation.md) - [ExternalPrincipal](docs/ExternalPrincipal.md) - [ExternalPrincipalCreation](docs/ExternalPrincipalCreation.md) - [ExternalPrincipalList](docs/ExternalPrincipalList.md) @@ -375,11 +368,6 @@ Class | Method | HTTP request | Description - **Location**: -## external_auth - -- **Type**: HTTP basic authentication - - ## jwt_token - **Type**: Bearer authentication (JWT) diff --git a/clients/python-legacy/docs/ActionsApi.md b/clients/python-legacy/docs/ActionsApi.md index b4793486d81..d31d3f25d47 100644 --- a/clients/python-legacy/docs/ActionsApi.md +++ b/clients/python-legacy/docs/ActionsApi.md @@ -19,7 +19,6 @@ get a run * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -54,12 +53,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -107,7 +100,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -136,7 +129,6 @@ get run hook output * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -170,12 +162,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -225,7 +211,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -254,7 +240,6 @@ list runs * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -289,12 +274,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -357,7 +336,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -386,7 +365,6 @@ list run hooks * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -421,12 +399,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -487,7 +459,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/AuthApi.md b/clients/python-legacy/docs/AuthApi.md index 7ccf094a0a2..d049b9af394 100644 --- a/clients/python-legacy/docs/AuthApi.md +++ b/clients/python-legacy/docs/AuthApi.md @@ -51,7 +51,6 @@ add group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -85,12 +84,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -137,7 +130,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -166,7 +159,6 @@ attach policy to group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -200,12 +192,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -252,7 +238,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -281,7 +267,6 @@ attach policy to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -315,12 +300,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -367,7 +346,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -396,7 +375,6 @@ create credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -431,12 +409,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -482,7 +454,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -511,7 +483,6 @@ create group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -547,12 +518,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -601,7 +566,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -630,7 +595,6 @@ create policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -665,12 +629,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -728,7 +686,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -758,7 +716,6 @@ create user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -794,12 +751,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -849,7 +800,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -879,7 +830,6 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -914,12 +864,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -982,7 +926,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1012,7 +956,6 @@ delete credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1046,12 +989,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1098,7 +1035,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1127,7 +1064,6 @@ delete group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1161,12 +1097,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1211,7 +1141,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1240,7 +1170,6 @@ delete group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1274,12 +1203,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1326,7 +1249,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1355,7 +1278,6 @@ delete policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1389,12 +1311,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1439,7 +1355,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1468,7 +1384,6 @@ delete user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1502,12 +1417,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1552,7 +1461,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1581,7 +1490,6 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1615,12 +1523,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1667,7 +1569,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1696,7 +1598,6 @@ detach policy from group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1730,12 +1631,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1782,7 +1677,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1811,7 +1706,6 @@ detach policy from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1845,12 +1739,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1897,7 +1785,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1930,7 +1818,6 @@ import time import lakefs_client from lakefs_client.api import auth_api from lakefs_client.model.authentication_token import AuthenticationToken -from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.error import Error from pprint import pprint # Defining the host is optional and defaults to http://localhost/api/v1 @@ -1944,15 +1831,13 @@ configuration = lakefs_client.Configuration( with lakefs_client.ApiClient() as api_client: # Create an instance of the API class api_instance = auth_api.AuthApi(api_client) - external_login_information = ExternalLoginInformation( - presigned_url="presigned_url_example", - ) # ExternalLoginInformation | (optional) + body = {} # {str: (bool, date, datetime, dict, float, int, list, str, none_type)} | (optional) # example passing only required values which don't have defaults set # and optional values try: # perform a login using an external authenticator - api_response = api_instance.external_login(external_login_information=external_login_information) + api_response = api_instance.external_login(body=body) pprint(api_response) except lakefs_client.ApiException as e: print("Exception when calling AuthApi->external_login: %s\n" % e) @@ -1963,7 +1848,7 @@ with lakefs_client.ApiClient() as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + **body** | **{str: (bool, date, datetime, dict, float, int, list, str, none_type)}**| | [optional] ### Return type @@ -1999,7 +1884,6 @@ get credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2034,12 +1918,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2087,7 +1965,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2116,7 +1994,6 @@ get current user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2150,12 +2027,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2197,7 +2068,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2222,7 +2093,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2257,12 +2127,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2308,7 +2172,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2337,7 +2201,6 @@ get group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2372,12 +2235,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2423,7 +2280,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2452,7 +2309,6 @@ get ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2488,12 +2344,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2539,7 +2389,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2568,7 +2418,6 @@ get policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2603,12 +2452,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2654,7 +2497,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2683,7 +2526,6 @@ get user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2718,12 +2560,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2769,7 +2605,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2798,7 +2634,6 @@ list group members * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2833,12 +2668,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2899,7 +2728,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2927,7 +2756,6 @@ list group policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2962,12 +2790,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3028,7 +2850,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3057,7 +2879,6 @@ list groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3092,12 +2913,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3148,7 +2963,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3176,7 +2991,6 @@ list policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3211,12 +3025,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3267,7 +3075,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3295,7 +3103,6 @@ list user credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3330,12 +3137,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3396,7 +3197,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3425,7 +3226,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3460,12 +3260,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3526,7 +3320,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3555,7 +3349,6 @@ list user groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3590,12 +3383,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3656,7 +3443,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3685,7 +3472,6 @@ list user policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3720,12 +3506,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3788,7 +3568,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -3817,7 +3597,6 @@ list users * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -3852,12 +3631,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3908,7 +3681,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -4010,7 +3783,6 @@ set ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -4045,12 +3817,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -4099,7 +3865,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -4128,7 +3894,6 @@ update policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -4163,12 +3928,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -4228,7 +3987,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/BranchesApi.md b/clients/python-legacy/docs/BranchesApi.md index 72c241149cb..3cfc39c1b24 100644 --- a/clients/python-legacy/docs/BranchesApi.md +++ b/clients/python-legacy/docs/BranchesApi.md @@ -23,7 +23,6 @@ Replay the changes from the given commit on the branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -59,12 +58,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -118,7 +111,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -150,7 +143,6 @@ create branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -185,12 +177,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -242,7 +228,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -274,7 +260,6 @@ delete branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -308,12 +293,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -370,7 +349,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -400,7 +379,6 @@ diff branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -435,12 +413,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -505,7 +477,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -534,7 +506,6 @@ get branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -569,12 +540,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -622,7 +587,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -651,7 +616,6 @@ list branches * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -686,12 +650,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -752,7 +710,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -781,7 +739,6 @@ reset branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -816,12 +773,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -874,7 +825,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -905,7 +856,6 @@ revert * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -940,12 +890,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -999,7 +943,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/CommitsApi.md b/clients/python-legacy/docs/CommitsApi.md index 1aca799f978..85fa23f1a64 100644 --- a/clients/python-legacy/docs/CommitsApi.md +++ b/clients/python-legacy/docs/CommitsApi.md @@ -17,7 +17,6 @@ create commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -53,12 +52,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -127,7 +120,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -160,7 +153,6 @@ get commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -195,12 +187,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -248,7 +234,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ConfigApi.md b/clients/python-legacy/docs/ConfigApi.md index 572ebb14bb1..dd037b3ae89 100644 --- a/clients/python-legacy/docs/ConfigApi.md +++ b/clients/python-legacy/docs/ConfigApi.md @@ -18,7 +18,6 @@ retrieve lakeFS configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -53,12 +52,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -99,7 +92,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ExperimentalApi.md b/clients/python-legacy/docs/ExperimentalApi.md index 17c8f8e0d06..aa0a9ecb32a 100644 --- a/clients/python-legacy/docs/ExperimentalApi.md +++ b/clients/python-legacy/docs/ExperimentalApi.md @@ -26,7 +26,6 @@ Aborts a presign multipart upload. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -61,12 +60,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -129,7 +122,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -161,7 +154,6 @@ Completes a presign multipart upload by assembling the uploaded parts. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -198,12 +190,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -278,7 +264,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -311,7 +297,6 @@ Initiates a multipart upload and returns an upload ID with presigned URLs for ea * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -346,12 +331,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -412,7 +391,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -442,7 +421,6 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -477,12 +455,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -545,7 +517,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -575,7 +547,6 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -609,12 +580,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -661,7 +626,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -694,7 +659,6 @@ import time import lakefs_client from lakefs_client.api import experimental_api from lakefs_client.model.authentication_token import AuthenticationToken -from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.error import Error from pprint import pprint # Defining the host is optional and defaults to http://localhost/api/v1 @@ -708,15 +672,13 @@ configuration = lakefs_client.Configuration( with lakefs_client.ApiClient() as api_client: # Create an instance of the API class api_instance = experimental_api.ExperimentalApi(api_client) - external_login_information = ExternalLoginInformation( - presigned_url="presigned_url_example", - ) # ExternalLoginInformation | (optional) + body = {} # {str: (bool, date, datetime, dict, float, int, list, str, none_type)} | (optional) # example passing only required values which don't have defaults set # and optional values try: # perform a login using an external authenticator - api_response = api_instance.external_login(external_login_information=external_login_information) + api_response = api_instance.external_login(body=body) pprint(api_response) except lakefs_client.ApiException as e: print("Exception when calling ExperimentalApi->external_login: %s\n" % e) @@ -727,7 +689,7 @@ with lakefs_client.ApiClient() as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + **body** | **{str: (bool, date, datetime, dict, float, int, list, str, none_type)}**| | [optional] ### Return type @@ -763,7 +725,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -798,12 +759,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -849,7 +804,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -880,7 +835,6 @@ Relocate branch to refer to ref. Branch must not contain uncommitted data. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -914,12 +868,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -978,7 +926,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1009,7 +957,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1044,12 +991,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1110,7 +1051,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ExternalApi.md b/clients/python-legacy/docs/ExternalApi.md index 3f5d31d575f..7be8498f216 100644 --- a/clients/python-legacy/docs/ExternalApi.md +++ b/clients/python-legacy/docs/ExternalApi.md @@ -20,7 +20,6 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -55,12 +54,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -123,7 +116,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -153,7 +146,6 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -187,12 +179,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -239,7 +225,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -272,7 +258,6 @@ import time import lakefs_client from lakefs_client.api import external_api from lakefs_client.model.authentication_token import AuthenticationToken -from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.error import Error from pprint import pprint # Defining the host is optional and defaults to http://localhost/api/v1 @@ -286,15 +271,13 @@ configuration = lakefs_client.Configuration( with lakefs_client.ApiClient() as api_client: # Create an instance of the API class api_instance = external_api.ExternalApi(api_client) - external_login_information = ExternalLoginInformation( - presigned_url="presigned_url_example", - ) # ExternalLoginInformation | (optional) + body = {} # {str: (bool, date, datetime, dict, float, int, list, str, none_type)} | (optional) # example passing only required values which don't have defaults set # and optional values try: # perform a login using an external authenticator - api_response = api_instance.external_login(external_login_information=external_login_information) + api_response = api_instance.external_login(body=body) pprint(api_response) except lakefs_client.ApiException as e: print("Exception when calling ExternalApi->external_login: %s\n" % e) @@ -305,7 +288,7 @@ with lakefs_client.ApiClient() as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + **body** | **{str: (bool, date, datetime, dict, float, int, list, str, none_type)}**| | [optional] ### Return type @@ -341,7 +324,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -376,12 +358,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -427,7 +403,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -456,7 +432,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -491,12 +466,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -557,7 +526,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ExternalLoginInformation.md b/clients/python-legacy/docs/ExternalLoginInformation.md deleted file mode 100644 index ded5ae9c6ca..00000000000 --- a/clients/python-legacy/docs/ExternalLoginInformation.md +++ /dev/null @@ -1,12 +0,0 @@ -# ExternalLoginInformation - - -## Properties -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**presigned_url** | **str** | | -**any string name** | **bool, date, datetime, dict, float, int, list, str, none_type** | any string name can be used but the value must be the correct type | [optional] - -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/clients/python-legacy/docs/ImportApi.md b/clients/python-legacy/docs/ImportApi.md index ae2e9977f92..8e693aa4e4a 100644 --- a/clients/python-legacy/docs/ImportApi.md +++ b/clients/python-legacy/docs/ImportApi.md @@ -18,7 +18,6 @@ cancel ongoing import * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -52,12 +51,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -106,7 +99,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -137,7 +130,6 @@ import data from object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -173,12 +165,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -246,7 +232,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -277,7 +263,6 @@ get import status * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -312,12 +297,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -367,7 +346,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/InternalApi.md b/clients/python-legacy/docs/InternalApi.md index 2989fa1fb75..e191241d951 100644 --- a/clients/python-legacy/docs/InternalApi.md +++ b/clients/python-legacy/docs/InternalApi.md @@ -42,7 +42,6 @@ Method | HTTP request | Description * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -76,12 +75,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -125,7 +118,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -155,7 +148,6 @@ create commit record * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -190,12 +182,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -257,7 +243,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -288,7 +274,6 @@ creates symlink files corresponding to the given directory * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -323,12 +308,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -387,7 +366,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -418,7 +397,6 @@ Delete specified keys from the repository's metadata. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -453,12 +431,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -509,7 +481,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -537,7 +509,6 @@ Dump repository refs (tags, commits, branches) to object store Deprecated: a new * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -572,12 +543,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -623,7 +588,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -719,7 +684,6 @@ get information of gc settings * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -754,12 +718,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -800,7 +758,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -828,7 +786,6 @@ get version of lakeFS server * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -863,12 +820,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -909,7 +860,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1001,7 +952,6 @@ retrieve lakeFS storage configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1036,12 +986,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1082,7 +1026,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1108,7 +1052,6 @@ get usage report summary * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1143,12 +1086,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1190,7 +1127,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1220,7 +1157,6 @@ This endpoint does not need any parameter. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1255,12 +1191,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1308,7 +1238,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1337,7 +1267,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1372,12 +1301,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1425,7 +1348,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1454,7 +1377,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1488,12 +1410,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1537,7 +1453,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1566,7 +1482,6 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1601,12 +1516,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1652,7 +1561,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1681,7 +1590,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1716,12 +1624,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1766,7 +1668,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1795,7 +1697,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1830,12 +1731,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1889,7 +1784,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1918,7 +1813,6 @@ post stats events, this endpoint is meant for internal use only * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1953,12 +1847,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2011,7 +1899,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2040,7 +1928,6 @@ save lists of active commits for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2075,12 +1962,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2126,7 +2007,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2156,7 +2037,6 @@ save repository uncommitted metadata for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2192,12 +2072,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2256,7 +2130,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2287,7 +2161,6 @@ Restore repository refs (tags, commits, branches) from object store. Deprecated: * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2322,12 +2195,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2379,7 +2246,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2409,7 +2276,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2443,12 +2309,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2492,7 +2352,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2523,7 +2383,6 @@ Set repository metadata. This will only add or update the provided keys, and wil * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2558,12 +2417,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2614,7 +2467,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2793,7 +2646,6 @@ stage an object's metadata for the given branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2829,12 +2681,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -2896,7 +2742,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -2927,7 +2773,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -2961,12 +2806,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -3014,7 +2853,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/MetadataApi.md b/clients/python-legacy/docs/MetadataApi.md index 37b4dfbc2a2..9b443620338 100644 --- a/clients/python-legacy/docs/MetadataApi.md +++ b/clients/python-legacy/docs/MetadataApi.md @@ -17,7 +17,6 @@ return URI to a meta-range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -52,12 +51,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -105,7 +98,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -134,7 +127,6 @@ return URI to a range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -169,12 +161,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -222,7 +208,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/ObjectsApi.md b/clients/python-legacy/docs/ObjectsApi.md index 8509add8cb8..e84269d94c9 100644 --- a/clients/python-legacy/docs/ObjectsApi.md +++ b/clients/python-legacy/docs/ObjectsApi.md @@ -24,7 +24,6 @@ create a copy of an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -60,12 +59,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -121,7 +114,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -152,7 +145,6 @@ delete object. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -186,12 +178,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -250,7 +236,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -280,7 +266,6 @@ delete objects. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -316,12 +301,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -386,7 +365,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -416,7 +395,6 @@ get object content * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -450,12 +428,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -520,7 +492,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -554,7 +526,6 @@ get object properties on underlying storage * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -589,12 +560,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -644,7 +609,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -673,7 +638,6 @@ check if object exists * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -706,12 +670,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -770,7 +728,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -802,7 +760,6 @@ list objects under a given prefix * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -837,12 +794,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -911,7 +862,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -940,7 +891,6 @@ get object metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -975,12 +925,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1043,7 +987,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1074,7 +1018,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1109,12 +1052,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1179,7 +1116,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/RefsApi.md b/clients/python-legacy/docs/RefsApi.md index 73df34a2325..b66a3d0afa8 100644 --- a/clients/python-legacy/docs/RefsApi.md +++ b/clients/python-legacy/docs/RefsApi.md @@ -19,7 +19,6 @@ diff references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -54,12 +53,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -128,7 +121,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -157,7 +150,6 @@ find the merge base for 2 references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -192,12 +184,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -247,7 +233,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -277,7 +263,6 @@ get commit log from ref. If both objects and prefixes are empty, return all comm * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -312,12 +297,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -394,7 +373,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -423,7 +402,6 @@ merge references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -459,12 +437,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -532,7 +504,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/RepositoriesApi.md b/clients/python-legacy/docs/RepositoriesApi.md index cff989d7d17..55c47f970df 100644 --- a/clients/python-legacy/docs/RepositoriesApi.md +++ b/clients/python-legacy/docs/RepositoriesApi.md @@ -29,7 +29,6 @@ create repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -65,12 +64,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -133,7 +126,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -163,7 +156,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -197,12 +189,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -246,7 +232,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -276,7 +262,6 @@ delete repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -310,12 +295,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -370,7 +349,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -399,7 +378,6 @@ Status of a repository dump task * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -434,12 +412,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -487,7 +459,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -517,7 +489,6 @@ Backup the repository metadata (tags, commits, branches) and save the backup to * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -552,12 +523,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -603,7 +568,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -632,7 +597,6 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -667,12 +631,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -718,7 +676,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -747,7 +705,6 @@ get repository GC rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -782,12 +739,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -833,7 +784,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -862,7 +813,6 @@ get repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -897,12 +847,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -948,7 +892,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -977,7 +921,6 @@ get repository metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1012,12 +955,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1063,7 +1000,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1092,7 +1029,6 @@ list repositories * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1127,12 +1063,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1183,7 +1113,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1211,7 +1141,6 @@ Status of a restore request * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1246,12 +1175,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1299,7 +1222,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1329,7 +1252,6 @@ Restore repository from a dump in the object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1365,12 +1287,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1423,7 +1339,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1453,7 +1369,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1488,12 +1403,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1552,7 +1461,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -1584,7 +1493,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -1619,12 +1527,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -1678,7 +1580,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/StagingApi.md b/clients/python-legacy/docs/StagingApi.md index beea3d69b80..4049f989555 100644 --- a/clients/python-legacy/docs/StagingApi.md +++ b/clients/python-legacy/docs/StagingApi.md @@ -17,7 +17,6 @@ generate an address to which the client can upload an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -52,12 +51,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -118,7 +111,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -149,7 +142,6 @@ Link the physical address with the path in lakeFS, creating an uncommitted chang * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -186,12 +178,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -267,7 +253,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/docs/TagsApi.md b/clients/python-legacy/docs/TagsApi.md index f29449edd29..35dcada5852 100644 --- a/clients/python-legacy/docs/TagsApi.md +++ b/clients/python-legacy/docs/TagsApi.md @@ -19,7 +19,6 @@ create tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -55,12 +54,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -112,7 +105,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -144,7 +137,6 @@ delete tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -178,12 +170,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -240,7 +226,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -270,7 +256,6 @@ get tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -305,12 +290,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -358,7 +337,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers @@ -387,7 +366,6 @@ list tags * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Bearer (JWT) Authentication (jwt_token): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): @@ -422,12 +400,6 @@ configuration.api_key['cookie_auth'] = 'YOUR_API_KEY' # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_client.Configuration( - username = 'YOUR_USERNAME', - password = 'YOUR_PASSWORD' -) - # Configure Bearer authorization (JWT): jwt_token configuration = lakefs_client.Configuration( access_token = 'YOUR_BEARER_TOKEN' @@ -488,7 +460,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [jwt_token](../README.md#jwt_token), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth) ### HTTP request headers diff --git a/clients/python-legacy/lakefs_client/api/actions_api.py b/clients/python-legacy/lakefs_client/api/actions_api.py index 5d6b95e4161..1d64126e2fd 100644 --- a/clients/python-legacy/lakefs_client/api/actions_api.py +++ b/clients/python-legacy/lakefs_client/api/actions_api.py @@ -45,7 +45,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -107,7 +106,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -176,7 +174,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -258,7 +255,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/auth_api.py b/clients/python-legacy/lakefs_client/api/auth_api.py index 39a79d71e3d..646de80ac51 100644 --- a/clients/python-legacy/lakefs_client/api/auth_api.py +++ b/clients/python-legacy/lakefs_client/api/auth_api.py @@ -30,7 +30,6 @@ from lakefs_client.model.current_user import CurrentUser from lakefs_client.model.error import Error from lakefs_client.model.error_no_acl import ErrorNoACL -from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList @@ -62,7 +61,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -124,7 +122,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -186,7 +183,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -248,7 +244,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -304,7 +299,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -359,7 +353,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -416,7 +409,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -471,7 +463,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -539,7 +530,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -601,7 +591,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -657,7 +646,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -719,7 +707,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -775,7 +762,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -831,7 +817,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -893,7 +878,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -955,7 +939,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1022,7 +1005,7 @@ def __init__(self, api_client=None): }, params_map={ 'all': [ - 'external_login_information', + 'body', ], 'required': [], 'nullable': [ @@ -1038,13 +1021,13 @@ def __init__(self, api_client=None): 'allowed_values': { }, 'openapi_types': { - 'external_login_information': - (ExternalLoginInformation,), + 'body': + ({str: (bool, date, datetime, dict, float, int, list, str, none_type)},), }, 'attribute_map': { }, 'location_map': { - 'external_login_information': 'body', + 'body': 'body', }, 'collection_format_map': { } @@ -1065,7 +1048,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1127,7 +1109,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1176,7 +1157,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1232,7 +1212,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1288,7 +1267,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1344,7 +1322,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1400,7 +1377,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1456,7 +1432,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1533,7 +1508,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1610,7 +1584,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1680,7 +1653,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1750,7 +1722,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1827,7 +1798,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1904,7 +1874,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1981,7 +1950,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -2063,7 +2031,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -2181,7 +2148,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -2244,7 +2210,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -3385,7 +3350,7 @@ def external_login( Keyword Args: - external_login_information (ExternalLoginInformation): [optional] + body ({str: (bool, date, datetime, dict, float, int, list, str, none_type)}): [optional] _return_http_data_only (bool): response data without head status code and headers. Default is True. _preload_content (bool): if False, the urllib3.HTTPResponse object diff --git a/clients/python-legacy/lakefs_client/api/branches_api.py b/clients/python-legacy/lakefs_client/api/branches_api.py index 34d4149ac0d..aa2a208efd5 100644 --- a/clients/python-legacy/lakefs_client/api/branches_api.py +++ b/clients/python-legacy/lakefs_client/api/branches_api.py @@ -50,7 +50,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -119,7 +118,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -183,7 +181,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -250,7 +247,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -338,7 +334,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -400,7 +395,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -477,7 +471,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -546,7 +539,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/commits_api.py b/clients/python-legacy/lakefs_client/api/commits_api.py index 9b831a15f0c..25012848d0b 100644 --- a/clients/python-legacy/lakefs_client/api/commits_api.py +++ b/clients/python-legacy/lakefs_client/api/commits_api.py @@ -44,7 +44,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -118,7 +117,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/config_api.py b/clients/python-legacy/lakefs_client/api/config_api.py index a2fa0ef7f86..5fd9bfc6eaa 100644 --- a/clients/python-legacy/lakefs_client/api/config_api.py +++ b/clients/python-legacy/lakefs_client/api/config_api.py @@ -43,7 +43,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/experimental_api.py b/clients/python-legacy/lakefs_client/api/experimental_api.py index 3047dabc63b..e7f28253837 100644 --- a/clients/python-legacy/lakefs_client/api/experimental_api.py +++ b/clients/python-legacy/lakefs_client/api/experimental_api.py @@ -26,7 +26,6 @@ from lakefs_client.model.authentication_token import AuthenticationToken from lakefs_client.model.complete_presign_multipart_upload import CompletePresignMultipartUpload from lakefs_client.model.error import Error -from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList @@ -52,7 +51,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -132,7 +130,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -212,7 +209,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -285,7 +281,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -353,7 +348,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -420,7 +414,7 @@ def __init__(self, api_client=None): }, params_map={ 'all': [ - 'external_login_information', + 'body', ], 'required': [], 'nullable': [ @@ -436,13 +430,13 @@ def __init__(self, api_client=None): 'allowed_values': { }, 'openapi_types': { - 'external_login_information': - (ExternalLoginInformation,), + 'body': + ({str: (bool, date, datetime, dict, float, int, list, str, none_type)},), }, 'attribute_map': { }, 'location_map': { - 'external_login_information': 'body', + 'body': 'body', }, 'collection_format_map': { } @@ -463,7 +457,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -519,7 +512,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -592,7 +584,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1050,7 +1041,7 @@ def external_login( Keyword Args: - external_login_information (ExternalLoginInformation): [optional] + body ({str: (bool, date, datetime, dict, float, int, list, str, none_type)}): [optional] _return_http_data_only (bool): response data without head status code and headers. Default is True. _preload_content (bool): if False, the urllib3.HTTPResponse object diff --git a/clients/python-legacy/lakefs_client/api/external_api.py b/clients/python-legacy/lakefs_client/api/external_api.py index b521b1e18f1..1fbc9c9d6a6 100644 --- a/clients/python-legacy/lakefs_client/api/external_api.py +++ b/clients/python-legacy/lakefs_client/api/external_api.py @@ -24,7 +24,6 @@ ) from lakefs_client.model.authentication_token import AuthenticationToken from lakefs_client.model.error import Error -from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList @@ -47,7 +46,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -115,7 +113,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -182,7 +179,7 @@ def __init__(self, api_client=None): }, params_map={ 'all': [ - 'external_login_information', + 'body', ], 'required': [], 'nullable': [ @@ -198,13 +195,13 @@ def __init__(self, api_client=None): 'allowed_values': { }, 'openapi_types': { - 'external_login_information': - (ExternalLoginInformation,), + 'body': + ({str: (bool, date, datetime, dict, float, int, list, str, none_type)},), }, 'attribute_map': { }, 'location_map': { - 'external_login_information': 'body', + 'body': 'body', }, 'collection_format_map': { } @@ -225,7 +222,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -281,7 +277,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -506,7 +501,7 @@ def external_login( Keyword Args: - external_login_information (ExternalLoginInformation): [optional] + body ({str: (bool, date, datetime, dict, float, int, list, str, none_type)}): [optional] _return_http_data_only (bool): response data without head status code and headers. Default is True. _preload_content (bool): if False, the urllib3.HTTPResponse object diff --git a/clients/python-legacy/lakefs_client/api/import_api.py b/clients/python-legacy/lakefs_client/api/import_api.py index d858de45773..e53cc50f152 100644 --- a/clients/python-legacy/lakefs_client/api/import_api.py +++ b/clients/python-legacy/lakefs_client/api/import_api.py @@ -45,7 +45,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -113,7 +112,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -182,7 +180,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/internal_api.py b/clients/python-legacy/lakefs_client/api/internal_api.py index 272c0fcf49a..dee2ff16cc4 100644 --- a/clients/python-legacy/lakefs_client/api/internal_api.py +++ b/clients/python-legacy/lakefs_client/api/internal_api.py @@ -66,7 +66,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -122,7 +121,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -185,7 +183,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -252,7 +249,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -315,7 +311,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -413,7 +408,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -462,7 +456,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -553,7 +546,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -602,7 +594,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -652,7 +643,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -715,7 +705,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -778,7 +767,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -834,7 +822,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -890,7 +877,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -946,7 +932,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1009,7 +994,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1066,7 +1050,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1122,7 +1105,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1184,7 +1166,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1247,7 +1228,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1303,7 +1283,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1466,7 +1445,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -1541,7 +1519,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/metadata_api.py b/clients/python-legacy/lakefs_client/api/metadata_api.py index e790581922a..849c5493623 100644 --- a/clients/python-legacy/lakefs_client/api/metadata_api.py +++ b/clients/python-legacy/lakefs_client/api/metadata_api.py @@ -43,7 +43,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -105,7 +104,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/objects_api.py b/clients/python-legacy/lakefs_client/api/objects_api.py index 1308d59e9d4..5941b74039c 100644 --- a/clients/python-legacy/lakefs_client/api/objects_api.py +++ b/clients/python-legacy/lakefs_client/api/objects_api.py @@ -48,7 +48,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -123,7 +122,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -196,7 +194,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -270,7 +267,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -361,7 +357,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -429,7 +424,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -507,7 +501,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -605,7 +598,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -683,7 +675,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/refs_api.py b/clients/python-legacy/lakefs_client/api/refs_api.py index 0e466922df6..1b6549c4c77 100644 --- a/clients/python-legacy/lakefs_client/api/refs_api.py +++ b/clients/python-legacy/lakefs_client/api/refs_api.py @@ -47,7 +47,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -152,7 +151,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -220,7 +218,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -330,7 +327,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/repositories_api.py b/clients/python-legacy/lakefs_client/api/repositories_api.py index 62c4345021f..0f8b582acdd 100644 --- a/clients/python-legacy/lakefs_client/api/repositories_api.py +++ b/clients/python-legacy/lakefs_client/api/repositories_api.py @@ -52,7 +52,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -114,7 +113,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -170,7 +168,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -231,7 +228,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -293,7 +289,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -349,7 +344,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -405,7 +399,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -461,7 +454,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -517,7 +509,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -573,7 +564,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -643,7 +633,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -705,7 +694,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -768,7 +756,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -836,7 +823,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/staging_api.py b/clients/python-legacy/lakefs_client/api/staging_api.py index 29095e52235..f2e3e3c4d51 100644 --- a/clients/python-legacy/lakefs_client/api/staging_api.py +++ b/clients/python-legacy/lakefs_client/api/staging_api.py @@ -45,7 +45,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -118,7 +117,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/api/tags_api.py b/clients/python-legacy/lakefs_client/api/tags_api.py index 6c3cb65fe96..3ef623ce6e8 100644 --- a/clients/python-legacy/lakefs_client/api/tags_api.py +++ b/clients/python-legacy/lakefs_client/api/tags_api.py @@ -45,7 +45,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -108,7 +107,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -175,7 +173,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' @@ -237,7 +234,6 @@ def __init__(self, api_client=None): 'auth': [ 'basic_auth', 'cookie_auth', - 'external_auth', 'jwt_token', 'oidc_auth', 'saml_auth' diff --git a/clients/python-legacy/lakefs_client/configuration.py b/clients/python-legacy/lakefs_client/configuration.py index 803c8596028..2dfcc040680 100644 --- a/clients/python-legacy/lakefs_client/configuration.py +++ b/clients/python-legacy/lakefs_client/configuration.py @@ -419,13 +419,6 @@ def auth_settings(self): 'cookie_auth', ), } - if self.username is not None and self.password is not None: - auth['external_auth'] = { - 'type': 'basic', - 'in': 'header', - 'key': 'Authorization', - 'value': self.get_basic_auth_token() - } if self.access_token is not None: auth['jwt_token'] = { 'type': 'bearer', diff --git a/clients/python-legacy/lakefs_client/model/external_login_information.py b/clients/python-legacy/lakefs_client/model/external_login_information.py deleted file mode 100644 index 88c096c408b..00000000000 --- a/clients/python-legacy/lakefs_client/model/external_login_information.py +++ /dev/null @@ -1,262 +0,0 @@ -""" - lakeFS API - - lakeFS HTTP API # noqa: E501 - - The version of the OpenAPI document: 1.0.0 - Contact: services@treeverse.io - Generated by: https://openapi-generator.tech -""" - - -import re # noqa: F401 -import sys # noqa: F401 - -from lakefs_client.model_utils import ( # noqa: F401 - ApiTypeError, - ModelComposed, - ModelNormal, - ModelSimple, - cached_property, - change_keys_js_to_python, - convert_js_args_to_python_args, - date, - datetime, - file_type, - none_type, - validate_get_composed_info, -) -from ..model_utils import OpenApiModel -from lakefs_client.exceptions import ApiAttributeError - - - -class ExternalLoginInformation(ModelNormal): - """NOTE: This class is auto generated by OpenAPI Generator. - Ref: https://openapi-generator.tech - - Do not edit the class manually. - - Attributes: - allowed_values (dict): The key is the tuple path to the attribute - and the for var_name this is (var_name,). The value is a dict - with a capitalized key describing the allowed value and an allowed - value. These dicts store the allowed enum values. - attribute_map (dict): The key is attribute name - and the value is json key in definition. - discriminator_value_class_map (dict): A dict to go from the discriminator - variable value to the discriminator class name. - validations (dict): The key is the tuple path to the attribute - and the for var_name this is (var_name,). The value is a dict - that stores validations for max_length, min_length, max_items, - min_items, exclusive_maximum, inclusive_maximum, exclusive_minimum, - inclusive_minimum, and regex. - additional_properties_type (tuple): A tuple of classes accepted - as additional properties values. - """ - - allowed_values = { - } - - validations = { - } - - @cached_property - def additional_properties_type(): - """ - This must be a method because a model may have properties that are - of type self, this must run after the class is loaded - """ - return (bool, date, datetime, dict, float, int, list, str, none_type,) # noqa: E501 - - _nullable = False - - @cached_property - def openapi_types(): - """ - This must be a method because a model may have properties that are - of type self, this must run after the class is loaded - - Returns - openapi_types (dict): The key is attribute name - and the value is attribute type. - """ - return { - 'presigned_url': (str,), # noqa: E501 - } - - @cached_property - def discriminator(): - return None - - - attribute_map = { - 'presigned_url': 'presigned_url', # noqa: E501 - } - - read_only_vars = { - } - - _composed_schemas = {} - - @classmethod - @convert_js_args_to_python_args - def _from_openapi_data(cls, presigned_url, *args, **kwargs): # noqa: E501 - """ExternalLoginInformation - a model defined in OpenAPI - - Args: - presigned_url (str): - - Keyword Args: - _check_type (bool): if True, values for parameters in openapi_types - will be type checked and a TypeError will be - raised if the wrong type is input. - Defaults to True - _path_to_item (tuple/list): This is a list of keys or values to - drill down to the model in received_data - when deserializing a response - _spec_property_naming (bool): True if the variable names in the input data - are serialized names, as specified in the OpenAPI document. - False if the variable names in the input data - are pythonic names, e.g. snake case (default) - _configuration (Configuration): the instance to use when - deserializing a file_type parameter. - If passed, type conversion is attempted - If omitted no type conversion is done. - _visited_composed_classes (tuple): This stores a tuple of - classes that we have traveled through so that - if we see that class again we will not use its - discriminator again. - When traveling through a discriminator, the - composed schema that is - is traveled through is added to this set. - For example if Animal has a discriminator - petType and we pass in "Dog", and the class Dog - allOf includes Animal, we move through Animal - once using the discriminator, and pick Dog. - Then in Dog, we will make an instance of the - Animal class but this time we won't travel - through its discriminator because we passed in - _visited_composed_classes = (Animal,) - """ - - _check_type = kwargs.pop('_check_type', True) - _spec_property_naming = kwargs.pop('_spec_property_naming', False) - _path_to_item = kwargs.pop('_path_to_item', ()) - _configuration = kwargs.pop('_configuration', None) - _visited_composed_classes = kwargs.pop('_visited_composed_classes', ()) - - self = super(OpenApiModel, cls).__new__(cls) - - if args: - raise ApiTypeError( - "Invalid positional arguments=%s passed to %s. Remove those invalid positional arguments." % ( - args, - self.__class__.__name__, - ), - path_to_item=_path_to_item, - valid_classes=(self.__class__,), - ) - - self._data_store = {} - self._check_type = _check_type - self._spec_property_naming = _spec_property_naming - self._path_to_item = _path_to_item - self._configuration = _configuration - self._visited_composed_classes = _visited_composed_classes + (self.__class__,) - - self.presigned_url = presigned_url - for var_name, var_value in kwargs.items(): - if var_name not in self.attribute_map and \ - self._configuration is not None and \ - self._configuration.discard_unknown_keys and \ - self.additional_properties_type is None: - # discard variable. - continue - setattr(self, var_name, var_value) - return self - - required_properties = set([ - '_data_store', - '_check_type', - '_spec_property_naming', - '_path_to_item', - '_configuration', - '_visited_composed_classes', - ]) - - @convert_js_args_to_python_args - def __init__(self, presigned_url, *args, **kwargs): # noqa: E501 - """ExternalLoginInformation - a model defined in OpenAPI - - Args: - presigned_url (str): - - Keyword Args: - _check_type (bool): if True, values for parameters in openapi_types - will be type checked and a TypeError will be - raised if the wrong type is input. - Defaults to True - _path_to_item (tuple/list): This is a list of keys or values to - drill down to the model in received_data - when deserializing a response - _spec_property_naming (bool): True if the variable names in the input data - are serialized names, as specified in the OpenAPI document. - False if the variable names in the input data - are pythonic names, e.g. snake case (default) - _configuration (Configuration): the instance to use when - deserializing a file_type parameter. - If passed, type conversion is attempted - If omitted no type conversion is done. - _visited_composed_classes (tuple): This stores a tuple of - classes that we have traveled through so that - if we see that class again we will not use its - discriminator again. - When traveling through a discriminator, the - composed schema that is - is traveled through is added to this set. - For example if Animal has a discriminator - petType and we pass in "Dog", and the class Dog - allOf includes Animal, we move through Animal - once using the discriminator, and pick Dog. - Then in Dog, we will make an instance of the - Animal class but this time we won't travel - through its discriminator because we passed in - _visited_composed_classes = (Animal,) - """ - - _check_type = kwargs.pop('_check_type', True) - _spec_property_naming = kwargs.pop('_spec_property_naming', False) - _path_to_item = kwargs.pop('_path_to_item', ()) - _configuration = kwargs.pop('_configuration', None) - _visited_composed_classes = kwargs.pop('_visited_composed_classes', ()) - - if args: - raise ApiTypeError( - "Invalid positional arguments=%s passed to %s. Remove those invalid positional arguments." % ( - args, - self.__class__.__name__, - ), - path_to_item=_path_to_item, - valid_classes=(self.__class__,), - ) - - self._data_store = {} - self._check_type = _check_type - self._spec_property_naming = _spec_property_naming - self._path_to_item = _path_to_item - self._configuration = _configuration - self._visited_composed_classes = _visited_composed_classes + (self.__class__,) - - self.presigned_url = presigned_url - for var_name, var_value in kwargs.items(): - if var_name not in self.attribute_map and \ - self._configuration is not None and \ - self._configuration.discard_unknown_keys and \ - self.additional_properties_type is None: - # discard variable. - continue - setattr(self, var_name, var_value) - if var_name in self.read_only_vars: - raise ApiAttributeError(f"`{var_name}` is a read-only attribute. Use `from_openapi_data` to instantiate " - f"class with read only attributes.") diff --git a/clients/python-legacy/lakefs_client/models/__init__.py b/clients/python-legacy/lakefs_client/models/__init__.py index 15bb55c34d6..a75a5e24e39 100644 --- a/clients/python-legacy/lakefs_client/models/__init__.py +++ b/clients/python-legacy/lakefs_client/models/__init__.py @@ -34,7 +34,6 @@ from lakefs_client.model.diff_list import DiffList from lakefs_client.model.error import Error from lakefs_client.model.error_no_acl import ErrorNoACL -from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList diff --git a/clients/python-legacy/test/test_external_login_information.py b/clients/python-legacy/test/test_external_login_information.py deleted file mode 100644 index 2660def38f1..00000000000 --- a/clients/python-legacy/test/test_external_login_information.py +++ /dev/null @@ -1,36 +0,0 @@ -""" - lakeFS API - - lakeFS HTTP API # noqa: E501 - - The version of the OpenAPI document: 1.0.0 - Contact: services@treeverse.io - Generated by: https://openapi-generator.tech -""" - - -import sys -import unittest - -import lakefs_client -from lakefs_client.model.external_login_information import ExternalLoginInformation - - -class TestExternalLoginInformation(unittest.TestCase): - """ExternalLoginInformation unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def testExternalLoginInformation(self): - """Test ExternalLoginInformation""" - # FIXME: construct object with mandatory attributes with example values - # model = ExternalLoginInformation() # noqa: E501 - pass - - -if __name__ == '__main__': - unittest.main() diff --git a/clients/python/.openapi-generator/FILES b/clients/python/.openapi-generator/FILES index 44b67709ea4..96d21e6a69e 100644 --- a/clients/python/.openapi-generator/FILES +++ b/clients/python/.openapi-generator/FILES @@ -32,7 +32,6 @@ docs/Error.md docs/ErrorNoACL.md docs/ExperimentalApi.md docs/ExternalApi.md -docs/ExternalLoginInformation.md docs/ExternalPrincipal.md docs/ExternalPrincipalCreation.md docs/ExternalPrincipalList.md @@ -162,7 +161,6 @@ lakefs_sdk/models/diff.py lakefs_sdk/models/diff_list.py lakefs_sdk/models/error.py lakefs_sdk/models/error_no_acl.py -lakefs_sdk/models/external_login_information.py lakefs_sdk/models/external_principal.py lakefs_sdk/models/external_principal_creation.py lakefs_sdk/models/external_principal_list.py @@ -274,7 +272,6 @@ test/test_error.py test/test_error_no_acl.py test/test_experimental_api.py test/test_external_api.py -test/test_external_login_information.py test/test_external_principal.py test/test_external_principal_creation.py test/test_external_principal_list.py diff --git a/clients/python/README.md b/clients/python/README.md index 1dff72e5c2f..e865c7cc8f0 100644 --- a/clients/python/README.md +++ b/clients/python/README.md @@ -78,12 +78,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -285,7 +279,6 @@ Class | Method | HTTP request | Description - [DiffList](docs/DiffList.md) - [Error](docs/Error.md) - [ErrorNoACL](docs/ErrorNoACL.md) - - [ExternalLoginInformation](docs/ExternalLoginInformation.md) - [ExternalPrincipal](docs/ExternalPrincipal.md) - [ExternalPrincipalCreation](docs/ExternalPrincipalCreation.md) - [ExternalPrincipalList](docs/ExternalPrincipalList.md) @@ -395,11 +388,6 @@ Authentication schemes defined for the API: - **API key parameter name**: saml_auth_session - **Location**: - -### external_auth - -- **Type**: HTTP basic authentication - ## Author diff --git a/clients/python/docs/ActionsApi.md b/clients/python/docs/ActionsApi.md index 0be0301241f..a35752995f8 100644 --- a/clients/python/docs/ActionsApi.md +++ b/clients/python/docs/ActionsApi.md @@ -19,7 +19,6 @@ get a run * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -55,12 +54,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -110,7 +103,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -138,7 +131,6 @@ get run hook output * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -173,12 +165,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -230,7 +216,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -258,7 +244,6 @@ list runs * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -294,12 +279,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -355,7 +334,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -383,7 +362,6 @@ list run hooks * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -419,12 +397,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -478,7 +450,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/AuthApi.md b/clients/python/docs/AuthApi.md index 674654803b6..73743a1afee 100644 --- a/clients/python/docs/AuthApi.md +++ b/clients/python/docs/AuthApi.md @@ -51,7 +51,6 @@ add group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -86,12 +85,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -139,7 +132,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -167,7 +160,6 @@ attach policy to group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -202,12 +194,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -255,7 +241,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -283,7 +269,6 @@ attach policy to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -318,12 +303,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -371,7 +350,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -399,7 +378,6 @@ create credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -435,12 +413,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -488,7 +460,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -516,7 +488,6 @@ create group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -553,12 +524,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -606,7 +571,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -634,7 +599,6 @@ create policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -670,12 +634,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -723,7 +681,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -752,7 +710,6 @@ create user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -789,12 +746,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -842,7 +793,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -871,7 +822,6 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -907,12 +857,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -962,7 +906,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -991,7 +935,6 @@ delete credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1026,12 +969,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1079,7 +1016,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1107,7 +1044,6 @@ delete group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1142,12 +1078,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1193,7 +1123,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1221,7 +1151,6 @@ delete group membership * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1256,12 +1185,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1309,7 +1232,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1337,7 +1260,6 @@ delete policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1372,12 +1294,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1423,7 +1339,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1451,7 +1367,6 @@ delete user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1486,12 +1401,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1537,7 +1446,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1565,7 +1474,6 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1600,12 +1508,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1653,7 +1555,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1681,7 +1583,6 @@ detach policy from group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1716,12 +1617,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1769,7 +1664,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1797,7 +1692,6 @@ detach policy from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1832,12 +1726,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1885,7 +1773,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1905,7 +1793,7 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **external_login** -> AuthenticationToken external_login(external_login_information=external_login_information) +> AuthenticationToken external_login(body=body) perform a login using an external authenticator @@ -1917,7 +1805,6 @@ import time import os import lakefs_sdk from lakefs_sdk.models.authentication_token import AuthenticationToken -from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.rest import ApiException from pprint import pprint @@ -1932,11 +1819,11 @@ configuration = lakefs_sdk.Configuration( with lakefs_sdk.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = lakefs_sdk.AuthApi(api_client) - external_login_information = lakefs_sdk.ExternalLoginInformation() # ExternalLoginInformation | (optional) + body = None # object | (optional) try: # perform a login using an external authenticator - api_response = api_instance.external_login(external_login_information=external_login_information) + api_response = api_instance.external_login(body=body) print("The response of AuthApi->external_login:\n") pprint(api_response) except Exception as e: @@ -1950,7 +1837,7 @@ with lakefs_sdk.ApiClient(configuration) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + **body** | **object**| | [optional] ### Return type @@ -1985,7 +1872,6 @@ get credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2021,12 +1907,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2076,7 +1956,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2104,7 +1984,6 @@ get current user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2140,12 +2019,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2189,7 +2062,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2213,7 +2086,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2249,12 +2121,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2302,7 +2168,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2330,7 +2196,6 @@ get group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2366,12 +2231,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2419,7 +2278,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2447,7 +2306,6 @@ get ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2483,12 +2341,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2536,7 +2388,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2564,7 +2416,6 @@ get policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2600,12 +2451,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2653,7 +2498,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2681,7 +2526,6 @@ get user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2717,12 +2561,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2770,7 +2608,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2798,7 +2636,6 @@ list group members * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2834,12 +2671,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2893,7 +2724,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2920,7 +2751,6 @@ list group policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2956,12 +2786,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3015,7 +2839,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3043,7 +2867,6 @@ list groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3079,12 +2902,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3136,7 +2953,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3163,7 +2980,6 @@ list policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3199,12 +3015,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3256,7 +3066,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3283,7 +3093,6 @@ list user credentials * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3319,12 +3128,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3378,7 +3181,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3406,7 +3209,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3442,12 +3244,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3501,7 +3297,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3529,7 +3325,6 @@ list user groups * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3565,12 +3360,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3624,7 +3413,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3652,7 +3441,6 @@ list user policies * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3688,12 +3476,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3749,7 +3531,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3777,7 +3559,6 @@ list users * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -3813,12 +3594,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -3870,7 +3645,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -3969,7 +3744,6 @@ set ACL of group * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -4005,12 +3779,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -4058,7 +3826,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -4086,7 +3854,6 @@ update policy * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -4122,12 +3889,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -4177,7 +3938,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/BranchesApi.md b/clients/python/docs/BranchesApi.md index 9d4487c73d6..33c09474b8f 100644 --- a/clients/python/docs/BranchesApi.md +++ b/clients/python/docs/BranchesApi.md @@ -23,7 +23,6 @@ Replay the changes from the given commit on the branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -60,12 +59,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -117,7 +110,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -148,7 +141,6 @@ create branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -184,12 +176,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -239,7 +225,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -270,7 +256,6 @@ delete branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -305,12 +290,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -360,7 +339,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -389,7 +368,6 @@ diff branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -425,12 +403,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -488,7 +460,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -516,7 +488,6 @@ get branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -552,12 +523,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -607,7 +572,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -635,7 +600,6 @@ list branches * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -671,12 +635,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -730,7 +688,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -758,7 +716,6 @@ reset branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -794,12 +751,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -849,7 +800,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -879,7 +830,6 @@ revert * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -915,12 +865,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -970,7 +914,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/CommitsApi.md b/clients/python/docs/CommitsApi.md index 35b354efbce..067f4bdaf84 100644 --- a/clients/python/docs/CommitsApi.md +++ b/clients/python/docs/CommitsApi.md @@ -17,7 +17,6 @@ create commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -54,12 +53,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -113,7 +106,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -145,7 +138,6 @@ get commit * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -181,12 +173,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -236,7 +222,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ConfigApi.md b/clients/python/docs/ConfigApi.md index 26600fb0385..bb153b51290 100644 --- a/clients/python/docs/ConfigApi.md +++ b/clients/python/docs/ConfigApi.md @@ -18,7 +18,6 @@ retrieve lakeFS configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -54,12 +53,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -102,7 +95,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ExperimentalApi.md b/clients/python/docs/ExperimentalApi.md index 29b10bee524..25a3b2e9201 100644 --- a/clients/python/docs/ExperimentalApi.md +++ b/clients/python/docs/ExperimentalApi.md @@ -26,7 +26,6 @@ Aborts a presign multipart upload. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -62,12 +61,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -121,7 +114,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -152,7 +145,6 @@ Completes a presign multipart upload by assembling the uploaded parts. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -189,12 +181,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -250,7 +236,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -282,7 +268,6 @@ Initiates a multipart upload and returns an upload ID with presigned URLs for ea * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -318,12 +303,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -377,7 +356,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -406,7 +385,6 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -442,12 +420,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -497,7 +469,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -526,7 +498,6 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -561,12 +532,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -614,7 +579,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -634,7 +599,7 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **external_login** -> AuthenticationToken external_login(external_login_information=external_login_information) +> AuthenticationToken external_login(body=body) perform a login using an external authenticator @@ -646,7 +611,6 @@ import time import os import lakefs_sdk from lakefs_sdk.models.authentication_token import AuthenticationToken -from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.rest import ApiException from pprint import pprint @@ -661,11 +625,11 @@ configuration = lakefs_sdk.Configuration( with lakefs_sdk.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = lakefs_sdk.ExperimentalApi(api_client) - external_login_information = lakefs_sdk.ExternalLoginInformation() # ExternalLoginInformation | (optional) + body = None # object | (optional) try: # perform a login using an external authenticator - api_response = api_instance.external_login(external_login_information=external_login_information) + api_response = api_instance.external_login(body=body) print("The response of ExperimentalApi->external_login:\n") pprint(api_response) except Exception as e: @@ -679,7 +643,7 @@ with lakefs_sdk.ApiClient(configuration) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + **body** | **object**| | [optional] ### Return type @@ -714,7 +678,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -750,12 +713,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -803,7 +760,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -833,7 +790,6 @@ Relocate branch to refer to ref. Branch must not contain uncommitted data. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -868,12 +824,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -925,7 +875,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -955,7 +905,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -991,12 +940,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1050,7 +993,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ExternalApi.md b/clients/python/docs/ExternalApi.md index de30ab65db5..6877b706b82 100644 --- a/clients/python/docs/ExternalApi.md +++ b/clients/python/docs/ExternalApi.md @@ -20,7 +20,6 @@ attach external principal to user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -56,12 +55,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -111,7 +104,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -140,7 +133,6 @@ delete external principal from user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -175,12 +167,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -228,7 +214,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -248,7 +234,7 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **external_login** -> AuthenticationToken external_login(external_login_information=external_login_information) +> AuthenticationToken external_login(body=body) perform a login using an external authenticator @@ -260,7 +246,6 @@ import time import os import lakefs_sdk from lakefs_sdk.models.authentication_token import AuthenticationToken -from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.rest import ApiException from pprint import pprint @@ -275,11 +260,11 @@ configuration = lakefs_sdk.Configuration( with lakefs_sdk.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = lakefs_sdk.ExternalApi(api_client) - external_login_information = lakefs_sdk.ExternalLoginInformation() # ExternalLoginInformation | (optional) + body = None # object | (optional) try: # perform a login using an external authenticator - api_response = api_instance.external_login(external_login_information=external_login_information) + api_response = api_instance.external_login(body=body) print("The response of ExternalApi->external_login:\n") pprint(api_response) except Exception as e: @@ -293,7 +278,7 @@ with lakefs_sdk.ApiClient(configuration) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + **body** | **object**| | [optional] ### Return type @@ -328,7 +313,6 @@ describe external principal by id * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -364,12 +348,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -417,7 +395,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -445,7 +423,6 @@ list user external policies attached to a user * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -481,12 +458,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -540,7 +511,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ExternalLoginInformation.md b/clients/python/docs/ExternalLoginInformation.md deleted file mode 100644 index f82d24bb6d3..00000000000 --- a/clients/python/docs/ExternalLoginInformation.md +++ /dev/null @@ -1,29 +0,0 @@ -# ExternalLoginInformation - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**presigned_url** | **str** | | - -## Example - -```python -from lakefs_sdk.models.external_login_information import ExternalLoginInformation - -# TODO update the JSON string below -json = "{}" -# create an instance of ExternalLoginInformation from a JSON string -external_login_information_instance = ExternalLoginInformation.from_json(json) -# print the JSON string representation of the object -print ExternalLoginInformation.to_json() - -# convert the object into a dict -external_login_information_dict = external_login_information_instance.to_dict() -# create an instance of ExternalLoginInformation from a dict -external_login_information_form_dict = external_login_information.from_dict(external_login_information_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/clients/python/docs/ImportApi.md b/clients/python/docs/ImportApi.md index 689c79485d2..496f2ac4369 100644 --- a/clients/python/docs/ImportApi.md +++ b/clients/python/docs/ImportApi.md @@ -18,7 +18,6 @@ cancel ongoing import * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -53,12 +52,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -108,7 +101,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -138,7 +131,6 @@ import data from object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -175,12 +167,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -232,7 +218,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -262,7 +248,6 @@ get import status * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -298,12 +283,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -355,7 +334,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/InternalApi.md b/clients/python/docs/InternalApi.md index ea8fd1e8219..d45cfa5599c 100644 --- a/clients/python/docs/InternalApi.md +++ b/clients/python/docs/InternalApi.md @@ -42,7 +42,6 @@ Method | HTTP request | Description * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -77,12 +76,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -127,7 +120,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -156,7 +149,6 @@ create commit record * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -192,12 +184,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -245,7 +231,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -275,7 +261,6 @@ creates symlink files corresponding to the given directory * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -311,12 +296,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -368,7 +347,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -398,7 +377,6 @@ Delete specified keys from the repository's metadata. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -434,12 +412,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -487,7 +459,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -514,7 +486,6 @@ Dump repository refs (tags, commits, branches) to object store Deprecated: a new * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -550,12 +521,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -603,7 +568,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -700,7 +665,6 @@ get information of gc settings * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -736,12 +700,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -784,7 +742,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -811,7 +769,6 @@ get version of lakeFS server * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -847,12 +804,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -895,7 +846,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -988,7 +939,6 @@ retrieve lakeFS storage configuration * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1024,12 +974,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1072,7 +1016,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1097,7 +1041,6 @@ get usage report summary * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1133,12 +1076,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1182,7 +1119,7 @@ This endpoint does not need any parameter. ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1211,7 +1148,6 @@ This endpoint does not need any parameter. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1247,12 +1183,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1299,7 +1229,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1327,7 +1257,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1363,12 +1292,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1415,7 +1338,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1443,7 +1366,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1478,12 +1400,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1528,7 +1444,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1556,7 +1472,6 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1592,12 +1507,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1645,7 +1554,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1673,7 +1582,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1709,12 +1617,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1761,7 +1663,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1789,7 +1691,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1825,12 +1726,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1877,7 +1772,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1905,7 +1800,6 @@ post stats events, this endpoint is meant for internal use only * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1941,12 +1835,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1992,7 +1880,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2020,7 +1908,6 @@ save lists of active commits for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2056,12 +1943,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2109,7 +1990,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2138,7 +2019,6 @@ save repository uncommitted metadata for garbage collection * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2175,12 +2055,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2230,7 +2104,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2260,7 +2134,6 @@ Restore repository refs (tags, commits, branches) from object store. Deprecated: * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2296,12 +2169,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2349,7 +2216,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2378,7 +2245,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2413,12 +2279,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2463,7 +2323,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2493,7 +2353,6 @@ Set repository metadata. This will only add or update the provided keys, and wil * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2529,12 +2388,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2582,7 +2435,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2753,7 +2606,6 @@ stage an object's metadata for the given branch * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2790,12 +2642,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2849,7 +2695,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -2879,7 +2725,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -2914,12 +2759,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -2968,7 +2807,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/MetadataApi.md b/clients/python/docs/MetadataApi.md index ba9973040b3..248e02e2629 100644 --- a/clients/python/docs/MetadataApi.md +++ b/clients/python/docs/MetadataApi.md @@ -17,7 +17,6 @@ return URI to a meta-range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -53,12 +52,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -108,7 +101,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -136,7 +129,6 @@ return URI to a range file * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -172,12 +164,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -227,7 +213,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/ObjectsApi.md b/clients/python/docs/ObjectsApi.md index 5e28ff4ac24..a9ab5b4e74a 100644 --- a/clients/python/docs/ObjectsApi.md +++ b/clients/python/docs/ObjectsApi.md @@ -24,7 +24,6 @@ create a copy of an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -61,12 +60,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -120,7 +113,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -150,7 +143,6 @@ delete object. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -185,12 +177,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -242,7 +228,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -271,7 +257,6 @@ delete objects. Missing objects will not return a NotFound error. * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -308,12 +293,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -367,7 +346,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -396,7 +375,6 @@ get object content * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -431,12 +409,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -494,7 +466,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -527,7 +499,6 @@ get object properties on underlying storage * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -563,12 +534,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -620,7 +585,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -648,7 +613,6 @@ check if object exists * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -683,12 +647,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -740,7 +698,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -771,7 +729,6 @@ list objects under a given prefix * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -807,12 +764,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -874,7 +825,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -902,7 +853,6 @@ get object metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -938,12 +888,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -999,7 +943,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1029,7 +973,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1065,12 +1008,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1129,7 +1066,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/RefsApi.md b/clients/python/docs/RefsApi.md index 1c1a9df2118..ac999a2ff24 100644 --- a/clients/python/docs/RefsApi.md +++ b/clients/python/docs/RefsApi.md @@ -19,7 +19,6 @@ diff references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -55,12 +54,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -122,7 +115,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -150,7 +143,6 @@ find the merge base for 2 references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -186,12 +178,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -243,7 +229,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -272,7 +258,6 @@ get commit log from ref. If both objects and prefixes are empty, return all comm * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -308,12 +293,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -379,7 +358,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -407,7 +386,6 @@ merge references * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -444,12 +422,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -503,7 +475,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/RepositoriesApi.md b/clients/python/docs/RepositoriesApi.md index a0407f7aafd..6db6216fc8d 100644 --- a/clients/python/docs/RepositoriesApi.md +++ b/clients/python/docs/RepositoriesApi.md @@ -29,7 +29,6 @@ create repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -66,12 +65,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -121,7 +114,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -150,7 +143,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -185,12 +177,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -235,7 +221,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -264,7 +250,6 @@ delete repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -299,12 +284,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -352,7 +331,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -380,7 +359,6 @@ Status of a repository dump task * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -416,12 +394,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -471,7 +443,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -500,7 +472,6 @@ Backup the repository metadata (tags, commits, branches) and save the backup to * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -536,12 +507,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -589,7 +554,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -617,7 +582,6 @@ get branch protection rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -653,12 +617,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -706,7 +664,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -734,7 +692,6 @@ get repository GC rules * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -770,12 +727,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -823,7 +774,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -851,7 +802,6 @@ get repository * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -887,12 +837,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -940,7 +884,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -968,7 +912,6 @@ get repository metadata * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1003,12 +946,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1056,7 +993,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1084,7 +1021,6 @@ list repositories * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1120,12 +1056,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1177,7 +1107,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1204,7 +1134,6 @@ Status of a restore request * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1240,12 +1169,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1295,7 +1218,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1324,7 +1247,6 @@ Restore repository from a dump in the object store * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1361,12 +1283,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1416,7 +1332,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1445,7 +1361,6 @@ Name | Type | Description | Notes * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1481,12 +1396,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1535,7 +1444,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -1566,7 +1475,6 @@ void (empty response body) * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -1602,12 +1510,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -1654,7 +1556,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/StagingApi.md b/clients/python/docs/StagingApi.md index fc9aca5cf3e..ae82b69ba5f 100644 --- a/clients/python/docs/StagingApi.md +++ b/clients/python/docs/StagingApi.md @@ -17,7 +17,6 @@ generate an address to which the client can upload an object * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -53,12 +52,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -112,7 +105,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -142,7 +135,6 @@ Link the physical address with the path in lakeFS, creating an uncommitted chang * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -179,12 +171,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -240,7 +226,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/docs/TagsApi.md b/clients/python/docs/TagsApi.md index 41edd868455..8deb20e8598 100644 --- a/clients/python/docs/TagsApi.md +++ b/clients/python/docs/TagsApi.md @@ -19,7 +19,6 @@ create tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -56,12 +55,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -111,7 +104,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -142,7 +135,6 @@ delete tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -177,12 +169,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -232,7 +218,7 @@ void (empty response body) ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -261,7 +247,6 @@ get tag * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -297,12 +282,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -352,7 +331,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers @@ -380,7 +359,6 @@ list tags * Basic Authentication (basic_auth): * Api Key Authentication (cookie_auth): -* Basic Authentication (external_auth): * Api Key Authentication (oidc_auth): * Api Key Authentication (saml_auth): * Bearer (JWT) Authentication (jwt_token): @@ -416,12 +394,6 @@ configuration.api_key['cookie_auth'] = os.environ["API_KEY"] # Uncomment below to setup prefix (e.g. Bearer) for API key, if needed # configuration.api_key_prefix['cookie_auth'] = 'Bearer' -# Configure HTTP basic authorization: external_auth -configuration = lakefs_sdk.Configuration( - username = os.environ["USERNAME"], - password = os.environ["PASSWORD"] -) - # Configure API key authorization: oidc_auth configuration.api_key['oidc_auth'] = os.environ["API_KEY"] @@ -475,7 +447,7 @@ Name | Type | Description | Notes ### Authorization -[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [external_auth](../README.md#external_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) +[basic_auth](../README.md#basic_auth), [cookie_auth](../README.md#cookie_auth), [oidc_auth](../README.md#oidc_auth), [saml_auth](../README.md#saml_auth), [jwt_token](../README.md#jwt_token) ### HTTP request headers diff --git a/clients/python/lakefs_sdk/__init__.py b/clients/python/lakefs_sdk/__init__.py index 5d95d822050..e3df21d13b5 100644 --- a/clients/python/lakefs_sdk/__init__.py +++ b/clients/python/lakefs_sdk/__init__.py @@ -72,7 +72,6 @@ from lakefs_sdk.models.diff_list import DiffList from lakefs_sdk.models.error import Error from lakefs_sdk.models.error_no_acl import ErrorNoACL -from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList diff --git a/clients/python/lakefs_sdk/api/actions_api.py b/clients/python/lakefs_sdk/api/actions_api.py index f39c48d2091..f60b970d603 100644 --- a/clients/python/lakefs_sdk/api/actions_api.py +++ b/clients/python/lakefs_sdk/api/actions_api.py @@ -170,7 +170,7 @@ def get_run_with_http_info(self, repository : StrictStr, run_id : StrictStr, **k ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ActionRun", @@ -326,7 +326,7 @@ def get_run_hook_output_with_http_info(self, repository : StrictStr, run_id : St ['application/octet-stream', 'application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "bytearray", @@ -498,7 +498,7 @@ def list_repository_runs_with_http_info(self, repository : StrictStr, after : An ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ActionRunList", @@ -662,7 +662,7 @@ def list_run_hooks_with_http_info(self, repository : StrictStr, run_id : StrictS ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "HookRunList", diff --git a/clients/python/lakefs_sdk/api/auth_api.py b/clients/python/lakefs_sdk/api/auth_api.py index ae451be79ad..7af2b774550 100644 --- a/clients/python/lakefs_sdk/api/auth_api.py +++ b/clients/python/lakefs_sdk/api/auth_api.py @@ -22,7 +22,7 @@ from pydantic import Field, StrictBool, StrictStr, conint -from typing import Optional +from typing import Any, Dict, Optional from lakefs_sdk.models.acl import ACL from lakefs_sdk.models.authentication_token import AuthenticationToken @@ -30,7 +30,6 @@ from lakefs_sdk.models.credentials_list import CredentialsList from lakefs_sdk.models.credentials_with_secret import CredentialsWithSecret from lakefs_sdk.models.current_user import CurrentUser -from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList @@ -186,7 +185,7 @@ def add_group_membership_with_http_info(self, group_id : StrictStr, user_id : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -329,7 +328,7 @@ def attach_policy_to_group_with_http_info(self, group_id : StrictStr, policy_id ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -472,7 +471,7 @@ def attach_policy_to_user_with_http_info(self, user_id : StrictStr, policy_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -607,7 +606,7 @@ def create_credentials_with_http_info(self, user_id : StrictStr, **kwargs) -> Ap ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "CredentialsWithSecret", @@ -754,7 +753,7 @@ def create_group_with_http_info(self, group_creation : Optional[GroupCreation] = _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Group", @@ -901,7 +900,7 @@ def create_policy_with_http_info(self, policy : Policy, **kwargs) -> ApiResponse _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Policy", @@ -1049,7 +1048,7 @@ def create_user_with_http_info(self, user_creation : Optional[UserCreation] = No _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "User", @@ -1213,7 +1212,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1356,7 +1355,7 @@ def delete_credentials_with_http_info(self, user_id : StrictStr, access_key_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1491,7 +1490,7 @@ def delete_group_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiResp ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1634,7 +1633,7 @@ def delete_group_membership_with_http_info(self, group_id : StrictStr, user_id : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1769,7 +1768,7 @@ def delete_policy_with_http_info(self, policy_id : StrictStr, **kwargs) -> ApiRe ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1904,7 +1903,7 @@ def delete_user_with_http_info(self, user_id : StrictStr, **kwargs) -> ApiRespon ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2047,7 +2046,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2190,7 +2189,7 @@ def detach_policy_from_group_with_http_info(self, group_id : StrictStr, policy_i ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2333,7 +2332,7 @@ def detach_policy_from_user_with_http_info(self, user_id : StrictStr, policy_id ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2355,17 +2354,17 @@ def detach_policy_from_user_with_http_info(self, user_id : StrictStr, policy_id _request_auth=_params.get('_request_auth')) @validate_arguments - def external_login(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login(external_login_information, async_req=True) + >>> thread = api.external_login(body, async_req=True) >>> result = thread.get() - :param external_login_information: - :type external_login_information: ExternalLoginInformation + :param body: + :type body: object :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _request_timeout: timeout setting for this request. If one @@ -2380,20 +2379,20 @@ def external_login(self, external_login_information : Optional[ExternalLoginInfo kwargs['_return_http_data_only'] = True if '_preload_content' in kwargs: raise ValueError("Error! Please call the external_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") - return self.external_login_with_http_info(external_login_information, **kwargs) # noqa: E501 + return self.external_login_with_http_info(body, **kwargs) # noqa: E501 @validate_arguments - def external_login_with_http_info(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login_with_http_info(external_login_information, async_req=True) + >>> thread = api.external_login_with_http_info(body, async_req=True) >>> result = thread.get() - :param external_login_information: - :type external_login_information: ExternalLoginInformation + :param body: + :type body: object :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _preload_content: if False, the ApiResponse.data will @@ -2422,7 +2421,7 @@ def external_login_with_http_info(self, external_login_information : Optional[Ex _params = locals() _all_params = [ - 'external_login_information' + 'body' ] _all_params.extend( [ @@ -2460,8 +2459,8 @@ def external_login_with_http_info(self, external_login_information : Optional[Ex _files = {} # process the body parameter _body_params = None - if _params['external_login_information'] is not None: - _body_params = _params['external_login_information'] + if _params['body'] is not None: + _body_params = _params['body'] # set the HTTP header `Accept` _header_params['Accept'] = self.api_client.select_header_accept( @@ -2622,7 +2621,7 @@ def get_credentials_with_http_info(self, user_id : StrictStr, access_key_id : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Credentials", @@ -2754,7 +2753,7 @@ def get_current_user_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E50 ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CurrentUser", @@ -2891,7 +2890,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -3031,7 +3030,7 @@ def get_group_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiRespons ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Group", @@ -3171,7 +3170,7 @@ def get_group_acl_with_http_info(self, group_id : StrictStr, **kwargs) -> ApiRes ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ACL", @@ -3311,7 +3310,7 @@ def get_policy_with_http_info(self, policy_id : StrictStr, **kwargs) -> ApiRespo ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Policy", @@ -3451,7 +3450,7 @@ def get_user_with_http_info(self, user_id : StrictStr, **kwargs) -> ApiResponse: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "User", @@ -3615,7 +3614,7 @@ def list_group_members_with_http_info(self, group_id : StrictStr, prefix : Annot ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UserList", @@ -3778,7 +3777,7 @@ def list_group_policies_with_http_info(self, group_id : StrictStr, prefix : Anno ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -3934,7 +3933,7 @@ def list_groups_with_http_info(self, prefix : Annotated[Optional[StrictStr], Fie ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GroupList", @@ -4089,7 +4088,7 @@ def list_policies_with_http_info(self, prefix : Annotated[Optional[StrictStr], F ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -4252,7 +4251,7 @@ def list_user_credentials_with_http_info(self, user_id : StrictStr, prefix : Ann ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CredentialsList", @@ -4416,7 +4415,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", @@ -4580,7 +4579,7 @@ def list_user_groups_with_http_info(self, user_id : StrictStr, prefix : Annotate ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GroupList", @@ -4752,7 +4751,7 @@ def list_user_policies_with_http_info(self, user_id : StrictStr, prefix : Annota ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "PolicyList", @@ -4908,7 +4907,7 @@ def list_users_with_http_info(self, prefix : Annotated[Optional[StrictStr], Fiel ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UserList", @@ -5208,7 +5207,7 @@ def set_group_acl_with_http_info(self, group_id : StrictStr, acl : ACL, **kwargs _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -5358,7 +5357,7 @@ def update_policy_with_http_info(self, policy_id : StrictStr, policy : Policy, * _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Policy", diff --git a/clients/python/lakefs_sdk/api/branches_api.py b/clients/python/lakefs_sdk/api/branches_api.py index 2a58833faf1..ffb552796e2 100644 --- a/clients/python/lakefs_sdk/api/branches_api.py +++ b/clients/python/lakefs_sdk/api/branches_api.py @@ -190,7 +190,7 @@ def cherry_pick_with_http_info(self, repository : StrictStr, branch : StrictStr, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Commit", @@ -348,7 +348,7 @@ def create_branch_with_http_info(self, repository : StrictStr, branch_creation : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "str", @@ -507,7 +507,7 @@ def delete_branch_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -682,7 +682,7 @@ def diff_branch_with_http_info(self, repository : StrictStr, branch : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "DiffList", @@ -830,7 +830,7 @@ def get_branch_with_http_info(self, repository : StrictStr, branch : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Ref", @@ -994,7 +994,7 @@ def list_branches_with_http_info(self, repository : StrictStr, prefix : Annotate ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RefList", @@ -1157,7 +1157,7 @@ def reset_branch_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1315,7 +1315,7 @@ def revert_branch_with_http_info(self, repository : StrictStr, branch : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/commits_api.py b/clients/python/lakefs_sdk/api/commits_api.py index 369af5fb8a6..02bea4c6a84 100644 --- a/clients/python/lakefs_sdk/api/commits_api.py +++ b/clients/python/lakefs_sdk/api/commits_api.py @@ -192,7 +192,7 @@ def commit_with_http_info(self, repository : StrictStr, branch : StrictStr, comm _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Commit", @@ -344,7 +344,7 @@ def get_commit_with_http_info(self, repository : StrictStr, commit_id : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Commit", diff --git a/clients/python/lakefs_sdk/api/config_api.py b/clients/python/lakefs_sdk/api/config_api.py index cc1e2e78b21..028f68fcd36 100644 --- a/clients/python/lakefs_sdk/api/config_api.py +++ b/clients/python/lakefs_sdk/api/config_api.py @@ -150,7 +150,7 @@ def get_config_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E501 ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Config", diff --git a/clients/python/lakefs_sdk/api/experimental_api.py b/clients/python/lakefs_sdk/api/experimental_api.py index e7521284a81..dff22edd71f 100644 --- a/clients/python/lakefs_sdk/api/experimental_api.py +++ b/clients/python/lakefs_sdk/api/experimental_api.py @@ -22,12 +22,11 @@ from pydantic import Field, StrictBool, StrictInt, StrictStr, conint -from typing import Optional +from typing import Any, Dict, Optional from lakefs_sdk.models.abort_presign_multipart_upload import AbortPresignMultipartUpload from lakefs_sdk.models.authentication_token import AuthenticationToken from lakefs_sdk.models.complete_presign_multipart_upload import CompletePresignMultipartUpload -from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList @@ -209,7 +208,7 @@ def abort_presign_multipart_upload_with_http_info(self, repository : StrictStr, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -385,7 +384,7 @@ def complete_presign_multipart_upload_with_http_info(self, repository : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", @@ -553,7 +552,7 @@ def create_presign_multipart_upload_with_http_info(self, repository : StrictStr, ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "PresignMultipartUpload", @@ -717,7 +716,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -860,7 +859,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -882,17 +881,17 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri _request_auth=_params.get('_request_auth')) @validate_arguments - def external_login(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login(external_login_information, async_req=True) + >>> thread = api.external_login(body, async_req=True) >>> result = thread.get() - :param external_login_information: - :type external_login_information: ExternalLoginInformation + :param body: + :type body: object :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _request_timeout: timeout setting for this request. If one @@ -907,20 +906,20 @@ def external_login(self, external_login_information : Optional[ExternalLoginInfo kwargs['_return_http_data_only'] = True if '_preload_content' in kwargs: raise ValueError("Error! Please call the external_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") - return self.external_login_with_http_info(external_login_information, **kwargs) # noqa: E501 + return self.external_login_with_http_info(body, **kwargs) # noqa: E501 @validate_arguments - def external_login_with_http_info(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login_with_http_info(external_login_information, async_req=True) + >>> thread = api.external_login_with_http_info(body, async_req=True) >>> result = thread.get() - :param external_login_information: - :type external_login_information: ExternalLoginInformation + :param body: + :type body: object :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _preload_content: if False, the ApiResponse.data will @@ -949,7 +948,7 @@ def external_login_with_http_info(self, external_login_information : Optional[Ex _params = locals() _all_params = [ - 'external_login_information' + 'body' ] _all_params.extend( [ @@ -987,8 +986,8 @@ def external_login_with_http_info(self, external_login_information : Optional[Ex _files = {} # process the body parameter _body_params = None - if _params['external_login_information'] is not None: - _body_params = _params['external_login_information'] + if _params['body'] is not None: + _body_params = _params['body'] # set the HTTP header `Accept` _header_params['Accept'] = self.api_client.select_header_accept( @@ -1141,7 +1140,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -1307,7 +1306,7 @@ def hard_reset_branch_with_http_info(self, repository : StrictStr, branch : Stri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1466,7 +1465,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", diff --git a/clients/python/lakefs_sdk/api/external_api.py b/clients/python/lakefs_sdk/api/external_api.py index 93f2afe1df9..411c826613c 100644 --- a/clients/python/lakefs_sdk/api/external_api.py +++ b/clients/python/lakefs_sdk/api/external_api.py @@ -22,10 +22,9 @@ from pydantic import Field, StrictStr, conint -from typing import Optional +from typing import Any, Dict, Optional from lakefs_sdk.models.authentication_token import AuthenticationToken -from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList @@ -187,7 +186,7 @@ def create_user_external_principal_with_http_info(self, user_id : StrictStr, pri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -330,7 +329,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -352,17 +351,17 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri _request_auth=_params.get('_request_auth')) @validate_arguments - def external_login(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login(external_login_information, async_req=True) + >>> thread = api.external_login(body, async_req=True) >>> result = thread.get() - :param external_login_information: - :type external_login_information: ExternalLoginInformation + :param body: + :type body: object :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _request_timeout: timeout setting for this request. If one @@ -377,20 +376,20 @@ def external_login(self, external_login_information : Optional[ExternalLoginInfo kwargs['_return_http_data_only'] = True if '_preload_content' in kwargs: raise ValueError("Error! Please call the external_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") - return self.external_login_with_http_info(external_login_information, **kwargs) # noqa: E501 + return self.external_login_with_http_info(body, **kwargs) # noqa: E501 @validate_arguments - def external_login_with_http_info(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login_with_http_info(external_login_information, async_req=True) + >>> thread = api.external_login_with_http_info(body, async_req=True) >>> result = thread.get() - :param external_login_information: - :type external_login_information: ExternalLoginInformation + :param body: + :type body: object :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _preload_content: if False, the ApiResponse.data will @@ -419,7 +418,7 @@ def external_login_with_http_info(self, external_login_information : Optional[Ex _params = locals() _all_params = [ - 'external_login_information' + 'body' ] _all_params.extend( [ @@ -457,8 +456,8 @@ def external_login_with_http_info(self, external_login_information : Optional[Ex _files = {} # process the body parameter _body_params = None - if _params['external_login_information'] is not None: - _body_params = _params['external_login_information'] + if _params['body'] is not None: + _body_params = _params['body'] # set the HTTP header `Accept` _header_params['Accept'] = self.api_client.select_header_accept( @@ -611,7 +610,7 @@ def get_external_principal_with_http_info(self, principal_id : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipal", @@ -775,7 +774,7 @@ def list_user_external_principals_with_http_info(self, user_id : StrictStr, pref ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ExternalPrincipalList", diff --git a/clients/python/lakefs_sdk/api/import_api.py b/clients/python/lakefs_sdk/api/import_api.py index 4495d0813e5..4e0b25708f3 100644 --- a/clients/python/lakefs_sdk/api/import_api.py +++ b/clients/python/lakefs_sdk/api/import_api.py @@ -176,7 +176,7 @@ def import_cancel_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -334,7 +334,7 @@ def import_start_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "ImportCreationResponse", @@ -492,7 +492,7 @@ def import_status_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ImportStatus", diff --git a/clients/python/lakefs_sdk/api/internal_api.py b/clients/python/lakefs_sdk/api/internal_api.py index 6d1ae4e3ec7..0febc0689d2 100644 --- a/clients/python/lakefs_sdk/api/internal_api.py +++ b/clients/python/lakefs_sdk/api/internal_api.py @@ -183,7 +183,7 @@ def create_branch_protection_rule_preflight_with_http_info(self, repository : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -333,7 +333,7 @@ def create_commit_record_with_http_info(self, repository : StrictStr, commit_rec _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -484,7 +484,7 @@ def create_symlink_file_with_http_info(self, repository : StrictStr, branch : St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "StorageURI", @@ -641,7 +641,7 @@ def delete_repository_metadata_with_http_info(self, repository : StrictStr, repo _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -776,7 +776,7 @@ def dump_refs_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRespo ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "RefsDump", @@ -1041,7 +1041,7 @@ def get_garbage_collection_config_with_http_info(self, **kwargs) -> ApiResponse: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionConfig", @@ -1175,7 +1175,7 @@ def get_lake_fs_version_with_http_info(self, **kwargs) -> ApiResponse: # noqa: ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "VersionConfig", @@ -1439,7 +1439,7 @@ def get_storage_config_with_http_info(self, **kwargs) -> ApiResponse: # noqa: E ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageConfig", @@ -1569,7 +1569,7 @@ def get_usage_report_summary_with_http_info(self, **kwargs) -> ApiResponse: # n ['application/json', 'application/text']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "InstallationUsageReport", @@ -1727,7 +1727,7 @@ def internal_create_branch_protection_rule_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1879,7 +1879,7 @@ def internal_delete_branch_protection_rule_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2016,7 +2016,7 @@ def internal_delete_garbage_collection_rules_with_http_info(self, repository : S ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2153,7 +2153,7 @@ def internal_get_branch_protection_rules_with_http_info(self, repository : Stric ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "List[BranchProtectionRule]", @@ -2295,7 +2295,7 @@ def internal_get_garbage_collection_rules_with_http_info(self, repository : Stri ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionRules", @@ -2452,7 +2452,7 @@ def internal_set_garbage_collection_rules_with_http_info(self, repository : Stri _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2594,7 +2594,7 @@ def post_stats_events_with_http_info(self, stats_events_list : StatsEventsList, _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2729,7 +2729,7 @@ def prepare_garbage_collection_commits_with_http_info(self, repository : StrictS ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "GarbageCollectionPrepareResponse", @@ -2885,7 +2885,7 @@ def prepare_garbage_collection_uncommitted_with_http_info(self, repository : Str _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "PrepareGCUncommittedResponse", @@ -3042,7 +3042,7 @@ def restore_refs_with_http_info(self, repository : StrictStr, refs_restore : Ref _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3177,7 +3177,7 @@ def set_garbage_collection_rules_preflight_with_http_info(self, repository : Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3329,7 +3329,7 @@ def set_repository_metadata_with_http_info(self, repository : StrictStr, reposit _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -3786,7 +3786,7 @@ def stage_object_with_http_info(self, repository : StrictStr, branch : StrictStr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", @@ -3944,7 +3944,7 @@ def upload_object_preflight_with_http_info(self, repository : StrictStr, branch ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/metadata_api.py b/clients/python/lakefs_sdk/api/metadata_api.py index e8767115845..f897ec3b550 100644 --- a/clients/python/lakefs_sdk/api/metadata_api.py +++ b/clients/python/lakefs_sdk/api/metadata_api.py @@ -166,7 +166,7 @@ def get_meta_range_with_http_info(self, repository : StrictStr, meta_range : Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageURI", @@ -314,7 +314,7 @@ def get_range_with_http_info(self, repository : StrictStr, range : StrictStr, ** ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StorageURI", diff --git a/clients/python/lakefs_sdk/api/objects_api.py b/clients/python/lakefs_sdk/api/objects_api.py index 9ef5b4287b7..11a5229f3b6 100644 --- a/clients/python/lakefs_sdk/api/objects_api.py +++ b/clients/python/lakefs_sdk/api/objects_api.py @@ -196,7 +196,7 @@ def copy_object_with_http_info(self, repository : StrictStr, branch : Annotated[ _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", @@ -362,7 +362,7 @@ def delete_object_with_http_info(self, repository : StrictStr, branch : StrictSt ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -528,7 +528,7 @@ def delete_objects_with_http_info(self, repository : StrictStr, branch : StrictS _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectErrorList", @@ -709,7 +709,7 @@ def get_object_with_http_info(self, repository : StrictStr, ref : Annotated[Stri ['application/octet-stream', 'application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "bytearray", @@ -870,7 +870,7 @@ def get_underlying_properties_with_http_info(self, repository : StrictStr, ref : ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "UnderlyingObjectProperties", @@ -1030,7 +1030,7 @@ def head_object_with_http_info(self, repository : StrictStr, ref : Annotated[Str # process the body parameter _body_params = None # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -1221,7 +1221,7 @@ def list_objects_with_http_info(self, repository : StrictStr, ref : Annotated[St ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStatsList", @@ -1393,7 +1393,7 @@ def stat_object_with_http_info(self, repository : StrictStr, ref : Annotated[Str ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", @@ -1590,7 +1590,7 @@ def upload_object_with_http_info(self, repository : StrictStr, branch : StrictSt _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "ObjectStats", diff --git a/clients/python/lakefs_sdk/api/refs_api.py b/clients/python/lakefs_sdk/api/refs_api.py index f938e771548..abc0529b5f8 100644 --- a/clients/python/lakefs_sdk/api/refs_api.py +++ b/clients/python/lakefs_sdk/api/refs_api.py @@ -222,7 +222,7 @@ def diff_refs_with_http_info(self, repository : StrictStr, left_ref : Annotated[ ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "DiffList", @@ -378,7 +378,7 @@ def find_merge_base_with_http_info(self, repository : StrictStr, source_ref : An ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "FindMergeBaseResult", @@ -596,7 +596,7 @@ def log_commits_with_http_info(self, repository : StrictStr, ref : StrictStr, af ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "CommitList", @@ -767,7 +767,7 @@ def merge_into_branch_with_http_info(self, repository : StrictStr, source_ref : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "MergeResult", diff --git a/clients/python/lakefs_sdk/api/repositories_api.py b/clients/python/lakefs_sdk/api/repositories_api.py index d970a24e687..a2ebd9e58f2 100644 --- a/clients/python/lakefs_sdk/api/repositories_api.py +++ b/clients/python/lakefs_sdk/api/repositories_api.py @@ -183,7 +183,7 @@ def create_repository_with_http_info(self, repository_creation : RepositoryCreat _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Repository", @@ -324,7 +324,7 @@ def delete_gc_rules_with_http_info(self, repository : StrictStr, **kwargs) -> Ap ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -467,7 +467,7 @@ def delete_repository_with_http_info(self, repository : StrictStr, force : Annot ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -610,7 +610,7 @@ def dump_status_with_http_info(self, repository : StrictStr, task_id : StrictStr ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryDumpStatus", @@ -751,7 +751,7 @@ def dump_submit_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRes ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "TaskInfo", @@ -891,7 +891,7 @@ def get_branch_protection_rules_with_http_info(self, repository : StrictStr, **k ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "List[BranchProtectionRule]", @@ -1031,7 +1031,7 @@ def get_gc_rules_with_http_info(self, repository : StrictStr, **kwargs) -> ApiRe ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "GarbageCollectionRules", @@ -1171,7 +1171,7 @@ def get_repository_with_http_info(self, repository : StrictStr, **kwargs) -> Api ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Repository", @@ -1311,7 +1311,7 @@ def get_repository_metadata_with_http_info(self, repository : StrictStr, **kwarg ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Dict[str, str]", @@ -1467,7 +1467,7 @@ def list_repositories_with_http_info(self, prefix : Annotated[Optional[StrictStr ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryList", @@ -1614,7 +1614,7 @@ def restore_status_with_http_info(self, repository : StrictStr, task_id : Strict ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RepositoryRestoreStatus", @@ -1770,7 +1770,7 @@ def restore_submit_with_http_info(self, repository : StrictStr, refs_restore : R _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '202': "TaskInfo", @@ -1934,7 +1934,7 @@ def set_branch_protection_rules_with_http_info(self, repository : StrictStr, bra _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -2084,7 +2084,7 @@ def set_gc_rules_with_http_info(self, repository : StrictStr, garbage_collection _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} diff --git a/clients/python/lakefs_sdk/api/staging_api.py b/clients/python/lakefs_sdk/api/staging_api.py index 7a91cd32ad9..e82c4ec395c 100644 --- a/clients/python/lakefs_sdk/api/staging_api.py +++ b/clients/python/lakefs_sdk/api/staging_api.py @@ -186,7 +186,7 @@ def get_physical_address_with_http_info(self, repository : StrictStr, branch : S ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "StagingLocation", @@ -367,7 +367,7 @@ def link_physical_address_with_http_info(self, repository : StrictStr, branch : _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "ObjectStats", diff --git a/clients/python/lakefs_sdk/api/tags_api.py b/clients/python/lakefs_sdk/api/tags_api.py index c4ffe8c3adb..34533bd68ad 100644 --- a/clients/python/lakefs_sdk/api/tags_api.py +++ b/clients/python/lakefs_sdk/api/tags_api.py @@ -177,7 +177,7 @@ def create_tag_with_http_info(self, repository : StrictStr, tag_creation : TagCr _header_params['Content-Type'] = _content_types_list # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '201': "Ref", @@ -336,7 +336,7 @@ def delete_tag_with_http_info(self, repository : StrictStr, tag : StrictStr, for ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = {} @@ -479,7 +479,7 @@ def get_tag_with_http_info(self, repository : StrictStr, tag : StrictStr, **kwar ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "Ref", @@ -643,7 +643,7 @@ def list_tags_with_http_info(self, repository : StrictStr, prefix : Annotated[Op ['application/json']) # noqa: E501 # authentication setting - _auth_settings = ['basic_auth', 'cookie_auth', 'external_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 + _auth_settings = ['basic_auth', 'cookie_auth', 'oidc_auth', 'saml_auth', 'jwt_token'] # noqa: E501 _response_types_map = { '200': "RefList", diff --git a/clients/python/lakefs_sdk/configuration.py b/clients/python/lakefs_sdk/configuration.py index 97b4f971566..201334aba2a 100644 --- a/clients/python/lakefs_sdk/configuration.py +++ b/clients/python/lakefs_sdk/configuration.py @@ -436,13 +436,6 @@ def auth_settings(self): 'saml_auth', ), } - if self.username is not None and self.password is not None: - auth['external_auth'] = { - 'type': 'basic', - 'in': 'header', - 'key': 'Authorization', - 'value': self.get_basic_auth_token() - } return auth def to_debug_report(self): diff --git a/clients/python/lakefs_sdk/models/__init__.py b/clients/python/lakefs_sdk/models/__init__.py index b6a0573f318..eba3f9a1860 100644 --- a/clients/python/lakefs_sdk/models/__init__.py +++ b/clients/python/lakefs_sdk/models/__init__.py @@ -40,7 +40,6 @@ from lakefs_sdk.models.diff_list import DiffList from lakefs_sdk.models.error import Error from lakefs_sdk.models.error_no_acl import ErrorNoACL -from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList diff --git a/clients/python/lakefs_sdk/models/external_login_information.py b/clients/python/lakefs_sdk/models/external_login_information.py deleted file mode 100644 index 0f6d5114212..00000000000 --- a/clients/python/lakefs_sdk/models/external_login_information.py +++ /dev/null @@ -1,72 +0,0 @@ -# coding: utf-8 - -""" - lakeFS API - - lakeFS HTTP API - - The version of the OpenAPI document: 1.0.0 - Contact: services@treeverse.io - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - - - -from pydantic import BaseModel, Field, StrictStr - -class ExternalLoginInformation(BaseModel): - """ - ExternalLoginInformation - """ - presigned_url: StrictStr = Field(...) - __properties = ["presigned_url"] - - class Config: - """Pydantic configuration""" - allow_population_by_field_name = True - validate_assignment = True - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.dict(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> ExternalLoginInformation: - """Create an instance of ExternalLoginInformation from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self): - """Returns the dictionary representation of the model using alias""" - _dict = self.dict(by_alias=True, - exclude={ - }, - exclude_none=True) - return _dict - - @classmethod - def from_dict(cls, obj: dict) -> ExternalLoginInformation: - """Create an instance of ExternalLoginInformation from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return ExternalLoginInformation.parse_obj(obj) - - _obj = ExternalLoginInformation.parse_obj({ - "presigned_url": obj.get("presigned_url") - }) - return _obj - - diff --git a/clients/python/test/test_external_login_information.py b/clients/python/test/test_external_login_information.py deleted file mode 100644 index d85b2731404..00000000000 --- a/clients/python/test/test_external_login_information.py +++ /dev/null @@ -1,56 +0,0 @@ -# coding: utf-8 - -""" - lakeFS API - - lakeFS HTTP API - - The version of the OpenAPI document: 1.0.0 - Contact: services@treeverse.io - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest -import datetime - -import lakefs_sdk -from lakefs_sdk.models.external_login_information import ExternalLoginInformation # noqa: E501 -from lakefs_sdk.rest import ApiException - -class TestExternalLoginInformation(unittest.TestCase): - """ExternalLoginInformation unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional): - """Test ExternalLoginInformation - include_option is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `ExternalLoginInformation` - """ - model = lakefs_sdk.models.external_login_information.ExternalLoginInformation() # noqa: E501 - if include_optional : - return ExternalLoginInformation( - presigned_url = '' - ) - else : - return ExternalLoginInformation( - presigned_url = '', - ) - """ - - def testExternalLoginInformation(self): - """Test ExternalLoginInformation""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index 78d21a7cef6..c4a553a0ffc 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -17,7 +17,6 @@ security: - cookie_auth: [] - oidc_auth: [] - saml_auth: [] - - external_auth: [] components: securitySchemes: basic_auth: @@ -39,9 +38,6 @@ components: type: apiKey in: cookie name: saml_auth_session - external_auth: - type: http - scheme: basic parameters: PaginationPrefix: @@ -1057,11 +1053,6 @@ components: ExternalLoginInformation: type: object - required: - - presigned_url - properties: - presigned_url: - type: string AuthenticationToken: type: object diff --git a/pkg/api/auth_middleware.go b/pkg/api/auth_middleware.go index 2d90172be28..21f95c0d26b 100644 --- a/pkg/api/auth_middleware.go +++ b/pkg/api/auth_middleware.go @@ -130,7 +130,7 @@ func checkSecurityRequirements(r *http.Request, for _, securityRequirement := range securityRequirements { for provider := range securityRequirement { switch provider { - case "jwt_token", "external_auth": + case "jwt_token": // validate jwt token from header authHeaderValue := r.Header.Get("Authorization") if authHeaderValue == "" { diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 5c1d546db06..76b9c8c15ce 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -563,7 +563,7 @@ func (c *Controller) ExternalLogin(w http.ResponseWriter, r *http.Request, body c.LogAction(ctx, "external_login", r, "", "", "") - userID, err := c.Auth.ExternalLogin(ctx, body.PresignedUrl) + userID, err := c.Auth.ExternalLogin(ctx, body) if c.handleAPIError(ctx, w, r, err) { if errors.Is(err, ErrAuthenticatingRequest) { writeResponse(w, r, http.StatusUnauthorized, http.StatusText(http.StatusUnauthorized)) @@ -580,14 +580,6 @@ func (c *Controller) ExternalLogin(w http.ResponseWriter, r *http.Request, body writeError(w, r, http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError)) return } - internalAuthSession, _ := c.sessionStore.Get(r, InternalAuthSessionName) - internalAuthSession.Values[TokenSessionKeyName] = tokenString - err = c.sessionStore.Save(r, w, internalAuthSession) - if err != nil { - c.Logger.WithError(err).Error("Failed to save internal auth session") - writeError(w, r, http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError)) - return - } response := apigen.AuthenticationToken{ Token: tokenString, TokenExpiration: swag.Int64(expires.Unix()), diff --git a/pkg/auth/service.go b/pkg/auth/service.go index e952dc0d893..17f3877dd2f 100644 --- a/pkg/auth/service.go +++ b/pkg/auth/service.go @@ -85,7 +85,7 @@ type ExternalPrincipalsService interface { DeleteUserExternalPrincipal(ctx context.Context, userID, principalID string) error GetExternalPrincipal(ctx context.Context, principalID string) (*model.ExternalPrincipal, error) ListUserExternalPrincipals(ctx context.Context, userID string, params *model.PaginationParams) ([]*model.ExternalPrincipal, *model.Paginator, error) - ExternalLogin(ctx context.Context, presignedURL string) (string, error) + ExternalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) } type Service interface { @@ -1131,7 +1131,7 @@ func (s *AuthService) GetExternalPrincipal(ctx context.Context, principalID stri return nil, ErrNotImplemented } -func (s *AuthService) ExternalLogin(ctx context.Context, presignedURL string) (string, error) { +func (s *AuthService) ExternalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) { return "", ErrNotImplemented } @@ -2048,11 +2048,11 @@ func (a *APIAuthService) ListUserExternalPrincipals(ctx context.Context, userID return principals, toPagination(resp.JSON200.Pagination), nil } -func (a *APIAuthService) ExternalLogin(ctx context.Context, presignedURL string) (string, error) { +func (a *APIAuthService) ExternalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) { if !a.IsExternalPrincipalsEnabled(ctx) { return "", fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) } - resp, err := a.apiClient.ExternalLoginWithResponse(ctx, ExternalLoginJSONRequestBody{PresignedUrl: presignedURL}) + resp, err := a.apiClient.ExternalLoginWithResponse(ctx, externalLoginInfo) if err != nil { return "", fmt.Errorf("get external principal: %w", err) } diff --git a/pkg/auth/service_test.go b/pkg/auth/service_test.go index 0f2a8ea60fd..9e4eaf0ce46 100644 --- a/pkg/auth/service_test.go +++ b/pkg/auth/service_test.go @@ -2747,13 +2747,12 @@ func TestAPIAuthService_DeleteExternalPrincipalAttachedToUserDelete(t *testing.T func TestAPIAuthService_ExternalLogin(t *testing.T) { mockClient, s := NewTestApiService(t, false) + ctx := context.Background() userId := "user" presignedURL := "PresignedUrl" - ctx := context.Background() + externalLoginInfo := map[string]interface{}{"IdentityToken": presignedURL} - mockClient.EXPECT().ExternalLoginWithResponse(gomock.Any(), gomock.Eq(auth.ExternalLoginJSONRequestBody{ - PresignedUrl: presignedURL, - })).Return( + mockClient.EXPECT().ExternalLoginWithResponse(gomock.Any(), gomock.Eq(externalLoginInfo)).Return( &auth.ExternalLoginResponse{ HTTPResponse: &http.Response{ StatusCode: http.StatusOK, @@ -2761,7 +2760,7 @@ func TestAPIAuthService_ExternalLogin(t *testing.T) { JSON200: &auth.User{Username: userId}, }, nil) - resp, err := s.ExternalLogin(ctx, presignedURL) + resp, err := s.ExternalLogin(ctx, externalLoginInfo) require.NoError(t, err) require.Equal(t, userId, resp) } From 5cb4a8d41ef788ae1676109bec47dc756d562bdf Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 20 Mar 2024 16:48:10 +0200 Subject: [PATCH 12/33] Fix --- api/authorization.yml | 2 +- api/swagger.yml | 2 +- clients/java-legacy/README.md | 6 +-- clients/java-legacy/api/openapi.yaml | 2 +- clients/java-legacy/docs/AuthApi.md | 12 ++--- clients/java-legacy/docs/ExperimentalApi.md | 12 ++--- clients/java-legacy/docs/ExternalApi.md | 12 ++--- .../java/io/lakefs/clients/api/AuthApi.java | 20 ++++----- .../lakefs/clients/api/ExperimentalApi.java | 20 ++++----- .../io/lakefs/clients/api/ExternalApi.java | 20 ++++----- .../io/lakefs/clients/api/AuthApiTest.java | 4 +- .../clients/api/ExperimentalApiTest.java | 4 +- .../lakefs/clients/api/ExternalApiTest.java | 4 +- clients/java/README.md | 6 +-- clients/java/api/openapi.yaml | 2 +- clients/java/docs/AuthApi.md | 12 ++--- clients/java/docs/ExperimentalApi.md | 12 ++--- clients/java/docs/ExternalApi.md | 12 ++--- .../java/io/lakefs/clients/sdk/AuthApi.java | 44 +++++++++---------- .../lakefs/clients/sdk/ExperimentalApi.java | 44 +++++++++---------- .../io/lakefs/clients/sdk/ExternalApi.java | 44 +++++++++---------- .../io/lakefs/clients/sdk/AuthApiTest.java | 4 +- .../clients/sdk/ExperimentalApiTest.java | 4 +- .../lakefs/clients/sdk/ExternalApiTest.java | 4 +- clients/python-legacy/README.md | 6 +-- clients/python-legacy/docs/AuthApi.md | 10 ++--- clients/python-legacy/docs/ExperimentalApi.md | 10 ++--- clients/python-legacy/docs/ExternalApi.md | 10 ++--- .../lakefs_client/api/auth_api.py | 10 ++--- .../lakefs_client/api/experimental_api.py | 10 ++--- .../lakefs_client/api/external_api.py | 10 ++--- clients/python-legacy/test/test_auth_api.py | 4 +- .../test/test_experimental_api.py | 4 +- .../python-legacy/test/test_external_api.py | 4 +- clients/python/README.md | 6 +-- clients/python/docs/AuthApi.md | 12 ++--- clients/python/docs/ExperimentalApi.md | 12 ++--- clients/python/docs/ExternalApi.md | 12 ++--- clients/python/lakefs_sdk/api/auth_api.py | 14 +++--- .../python/lakefs_sdk/api/experimental_api.py | 14 +++--- clients/python/lakefs_sdk/api/external_api.py | 14 +++--- clients/python/test/test_auth_api.py | 4 +- clients/python/test/test_experimental_api.py | 4 +- clients/python/test/test_external_api.py | 4 +- docs/assets/js/swagger.yml | 2 +- pkg/api/controller.go | 6 +-- pkg/auth/mock/mock_auth_client.go | 28 ++++++------ pkg/auth/service.go | 8 ++-- pkg/auth/service_test.go | 6 +-- 49 files changed, 266 insertions(+), 266 deletions(-) diff --git a/api/authorization.yml b/api/authorization.yml index c26ca256601..95cda24edfe 100644 --- a/api/authorization.yml +++ b/api/authorization.yml @@ -1221,7 +1221,7 @@ paths: - auth - external - experimental - operationId: externalLogin + operationId: externalPrincipalLogin summary: perform a login using an external authenticator security: [] requestBody: diff --git a/api/swagger.yml b/api/swagger.yml index c4a553a0ffc..685824f4037 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -1813,7 +1813,7 @@ paths: - auth - external - experimental - operationId: externalLogin + operationId: externalPrincipalLogin summary: perform a login using an external authenticator security: [] requestBody: diff --git a/clients/java-legacy/README.md b/clients/java-legacy/README.md index 40fbc332558..f0d4f4493f7 100644 --- a/clients/java-legacy/README.md +++ b/clients/java-legacy/README.md @@ -155,7 +155,7 @@ Class | Method | HTTP request | Description *AuthApi* | [**deleteUserExternalPrincipal**](docs/AuthApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user *AuthApi* | [**detachPolicyFromGroup**](docs/AuthApi.md#detachPolicyFromGroup) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group *AuthApi* | [**detachPolicyFromUser**](docs/AuthApi.md#detachPolicyFromUser) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user -*AuthApi* | [**externalLogin**](docs/AuthApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +*AuthApi* | [**externalPrincipalLogin**](docs/AuthApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator *AuthApi* | [**getCredentials**](docs/AuthApi.md#getCredentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials *AuthApi* | [**getCurrentUser**](docs/AuthApi.md#getCurrentUser) | **GET** /user | get current user *AuthApi* | [**getExternalPrincipal**](docs/AuthApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id @@ -191,13 +191,13 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**createPresignMultipartUpload**](docs/ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**createUserExternalPrincipal**](docs/ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**deleteUserExternalPrincipal**](docs/ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExperimentalApi* | [**externalLogin**](docs/ExperimentalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +*ExperimentalApi* | [**externalPrincipalLogin**](docs/ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator *ExperimentalApi* | [**getExternalPrincipal**](docs/ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hardResetBranch**](docs/ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**listUserExternalPrincipals**](docs/ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExternalApi* | [**createUserExternalPrincipal**](docs/ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**deleteUserExternalPrincipal**](docs/ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExternalApi* | [**externalLogin**](docs/ExternalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +*ExternalApi* | [**externalPrincipalLogin**](docs/ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator *ExternalApi* | [**getExternalPrincipal**](docs/ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**listUserExternalPrincipals**](docs/ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**healthCheck**](docs/HealthCheckApi.md#healthCheck) | **GET** /healthcheck | diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index b8e8b7521e9..32913091898 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -176,7 +176,7 @@ paths: x-accepts: application/json /auth/external/login: post: - operationId: externalLogin + operationId: externalPrincipalLogin requestBody: content: application/json: diff --git a/clients/java-legacy/docs/AuthApi.md b/clients/java-legacy/docs/AuthApi.md index dc5bf973a85..76de040b169 100644 --- a/clients/java-legacy/docs/AuthApi.md +++ b/clients/java-legacy/docs/AuthApi.md @@ -20,7 +20,7 @@ Method | HTTP request | Description [**deleteUserExternalPrincipal**](AuthApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user [**detachPolicyFromGroup**](AuthApi.md#detachPolicyFromGroup) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group [**detachPolicyFromUser**](AuthApi.md#detachPolicyFromUser) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user -[**externalLogin**](AuthApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +[**externalPrincipalLogin**](AuthApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator [**getCredentials**](AuthApi.md#getCredentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials [**getCurrentUser**](AuthApi.md#getCurrentUser) | **GET** /user | get current user [**getExternalPrincipal**](AuthApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id @@ -1525,9 +1525,9 @@ null (empty response body) **420** | too many requests | - | **0** | Internal Server Error | - | - -# **externalLogin** -> AuthenticationToken externalLogin(body) + +# **externalPrincipalLogin** +> AuthenticationToken externalPrincipalLogin(body) perform a login using an external authenticator @@ -1548,10 +1548,10 @@ public class Example { AuthApi apiInstance = new AuthApi(defaultClient); Object body = null; // Object | try { - AuthenticationToken result = apiInstance.externalLogin(body); + AuthenticationToken result = apiInstance.externalPrincipalLogin(body); System.out.println(result); } catch (ApiException e) { - System.err.println("Exception when calling AuthApi#externalLogin"); + System.err.println("Exception when calling AuthApi#externalPrincipalLogin"); System.err.println("Status code: " + e.getCode()); System.err.println("Reason: " + e.getResponseBody()); System.err.println("Response headers: " + e.getResponseHeaders()); diff --git a/clients/java-legacy/docs/ExperimentalApi.md b/clients/java-legacy/docs/ExperimentalApi.md index ed2c9a514a1..cdc7e8c6edf 100644 --- a/clients/java-legacy/docs/ExperimentalApi.md +++ b/clients/java-legacy/docs/ExperimentalApi.md @@ -9,7 +9,7 @@ Method | HTTP request | Description [**createPresignMultipartUpload**](ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload [**createUserExternalPrincipal**](ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**deleteUserExternalPrincipal**](ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**externalLogin**](ExperimentalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +[**externalPrincipalLogin**](ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator [**getExternalPrincipal**](ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id [**hardResetBranch**](ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch [**listUserExternalPrincipals**](ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -511,9 +511,9 @@ null (empty response body) **420** | too many requests | - | **0** | Internal Server Error | - | - -# **externalLogin** -> AuthenticationToken externalLogin(body) + +# **externalPrincipalLogin** +> AuthenticationToken externalPrincipalLogin(body) perform a login using an external authenticator @@ -534,10 +534,10 @@ public class Example { ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); Object body = null; // Object | try { - AuthenticationToken result = apiInstance.externalLogin(body); + AuthenticationToken result = apiInstance.externalPrincipalLogin(body); System.out.println(result); } catch (ApiException e) { - System.err.println("Exception when calling ExperimentalApi#externalLogin"); + System.err.println("Exception when calling ExperimentalApi#externalPrincipalLogin"); System.err.println("Status code: " + e.getCode()); System.err.println("Reason: " + e.getResponseBody()); System.err.println("Response headers: " + e.getResponseHeaders()); diff --git a/clients/java-legacy/docs/ExternalApi.md b/clients/java-legacy/docs/ExternalApi.md index b863355cf66..5454e739d5b 100644 --- a/clients/java-legacy/docs/ExternalApi.md +++ b/clients/java-legacy/docs/ExternalApi.md @@ -6,7 +6,7 @@ Method | HTTP request | Description ------------- | ------------- | ------------- [**createUserExternalPrincipal**](ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**deleteUserExternalPrincipal**](ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**externalLogin**](ExternalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +[**externalPrincipalLogin**](ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator [**getExternalPrincipal**](ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id [**listUserExternalPrincipals**](ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -200,9 +200,9 @@ null (empty response body) **420** | too many requests | - | **0** | Internal Server Error | - | - -# **externalLogin** -> AuthenticationToken externalLogin(body) + +# **externalPrincipalLogin** +> AuthenticationToken externalPrincipalLogin(body) perform a login using an external authenticator @@ -223,10 +223,10 @@ public class Example { ExternalApi apiInstance = new ExternalApi(defaultClient); Object body = null; // Object | try { - AuthenticationToken result = apiInstance.externalLogin(body); + AuthenticationToken result = apiInstance.externalPrincipalLogin(body); System.out.println(result); } catch (ApiException e) { - System.err.println("Exception when calling ExternalApi#externalLogin"); + System.err.println("Exception when calling ExternalApi#externalPrincipalLogin"); System.err.println("Status code: " + e.getCode()); System.err.println("Reason: " + e.getResponseBody()); System.err.println("Response headers: " + e.getResponseHeaders()); diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java index 0dba460ecfe..01ef9c02199 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java @@ -2173,7 +2173,7 @@ public okhttp3.Call detachPolicyFromUserAsync(String userId, String policyId, fi return localVarCall; } /** - * Build call for externalLogin + * Build call for externalPrincipalLogin * @param body (optional) * @param _callback Callback for upload/download progress * @return Call to execute @@ -2187,7 +2187,7 @@ public okhttp3.Call detachPolicyFromUserAsync(String userId, String policyId, fi 0 Internal Server Error - */ - public okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { Object localVarPostBody = body; // create path and map variables @@ -2218,10 +2218,10 @@ public okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginCall(body, _callback); return localVarCall; } @@ -2241,8 +2241,8 @@ private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallb 0 Internal Server Error - */ - public AuthenticationToken externalLogin(Object body) throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(body); + public AuthenticationToken externalPrincipalLogin(Object body) throws ApiException { + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); return localVarResp.getData(); } @@ -2261,8 +2261,8 @@ public AuthenticationToken externalLogin(Object body) throws ApiException { 0 Internal Server Error - */ - public ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); + public ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -2283,9 +2283,9 @@ public ApiResponse externalLoginWithHttpInfo(Object body) t 0 Internal Server Error - */ - public okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java index 2cfd24e1ecd..42488dfb173 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java @@ -847,7 +847,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ return localVarCall; } /** - * Build call for externalLogin + * Build call for externalPrincipalLogin * @param body (optional) * @param _callback Callback for upload/download progress * @return Call to execute @@ -861,7 +861,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ 0 Internal Server Error - */ - public okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { Object localVarPostBody = body; // create path and map variables @@ -892,10 +892,10 @@ public okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginCall(body, _callback); return localVarCall; } @@ -915,8 +915,8 @@ private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallb 0 Internal Server Error - */ - public AuthenticationToken externalLogin(Object body) throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(body); + public AuthenticationToken externalPrincipalLogin(Object body) throws ApiException { + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); return localVarResp.getData(); } @@ -935,8 +935,8 @@ public AuthenticationToken externalLogin(Object body) throws ApiException { 0 Internal Server Error - */ - public ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); + public ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -957,9 +957,9 @@ public ApiResponse externalLoginWithHttpInfo(Object body) t 0 Internal Server Error - */ - public okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java index d588b46c869..12ae0c45f1a 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java @@ -341,7 +341,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ return localVarCall; } /** - * Build call for externalLogin + * Build call for externalPrincipalLogin * @param body (optional) * @param _callback Callback for upload/download progress * @return Call to execute @@ -355,7 +355,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ 0 Internal Server Error - */ - public okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { Object localVarPostBody = body; // create path and map variables @@ -386,10 +386,10 @@ public okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginCall(body, _callback); return localVarCall; } @@ -409,8 +409,8 @@ private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallb 0 Internal Server Error - */ - public AuthenticationToken externalLogin(Object body) throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(body); + public AuthenticationToken externalPrincipalLogin(Object body) throws ApiException { + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); return localVarResp.getData(); } @@ -429,8 +429,8 @@ public AuthenticationToken externalLogin(Object body) throws ApiException { 0 Internal Server Error - */ - public ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); + public ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -451,9 +451,9 @@ public ApiResponse externalLoginWithHttpInfo(Object body) t 0 Internal Server Error - */ - public okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/AuthApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/AuthApiTest.java index 493474be8db..7e953eac1cc 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/AuthApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/AuthApiTest.java @@ -310,9 +310,9 @@ public void detachPolicyFromUserTest() throws ApiException { * if the Api call fails */ @Test - public void externalLoginTest() throws ApiException { + public void externalPrincipalLoginTest() throws ApiException { Object body = null; - AuthenticationToken response = api.externalLogin(body); + AuthenticationToken response = api.externalPrincipalLogin(body); // TODO: test validations } diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java index 5ab091cf04b..9fa60a25522 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java @@ -139,9 +139,9 @@ public void deleteUserExternalPrincipalTest() throws ApiException { * if the Api call fails */ @Test - public void externalLoginTest() throws ApiException { + public void externalPrincipalLoginTest() throws ApiException { Object body = null; - AuthenticationToken response = api.externalLogin(body); + AuthenticationToken response = api.externalPrincipalLogin(body); // TODO: test validations } diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java index 36164c125a3..78ebb40a433 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java @@ -78,9 +78,9 @@ public void deleteUserExternalPrincipalTest() throws ApiException { * if the Api call fails */ @Test - public void externalLoginTest() throws ApiException { + public void externalPrincipalLoginTest() throws ApiException { Object body = null; - AuthenticationToken response = api.externalLogin(body); + AuthenticationToken response = api.externalPrincipalLogin(body); // TODO: test validations } diff --git a/clients/java/README.md b/clients/java/README.md index 285c3a6db39..8abb93c0bb4 100644 --- a/clients/java/README.md +++ b/clients/java/README.md @@ -163,7 +163,7 @@ Class | Method | HTTP request | Description *AuthApi* | [**deleteUserExternalPrincipal**](docs/AuthApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user *AuthApi* | [**detachPolicyFromGroup**](docs/AuthApi.md#detachPolicyFromGroup) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group *AuthApi* | [**detachPolicyFromUser**](docs/AuthApi.md#detachPolicyFromUser) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user -*AuthApi* | [**externalLogin**](docs/AuthApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +*AuthApi* | [**externalPrincipalLogin**](docs/AuthApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator *AuthApi* | [**getCredentials**](docs/AuthApi.md#getCredentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials *AuthApi* | [**getCurrentUser**](docs/AuthApi.md#getCurrentUser) | **GET** /user | get current user *AuthApi* | [**getExternalPrincipal**](docs/AuthApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id @@ -199,13 +199,13 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**createPresignMultipartUpload**](docs/ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**createUserExternalPrincipal**](docs/ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**deleteUserExternalPrincipal**](docs/ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExperimentalApi* | [**externalLogin**](docs/ExperimentalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +*ExperimentalApi* | [**externalPrincipalLogin**](docs/ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator *ExperimentalApi* | [**getExternalPrincipal**](docs/ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hardResetBranch**](docs/ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**listUserExternalPrincipals**](docs/ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExternalApi* | [**createUserExternalPrincipal**](docs/ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**deleteUserExternalPrincipal**](docs/ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExternalApi* | [**externalLogin**](docs/ExternalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +*ExternalApi* | [**externalPrincipalLogin**](docs/ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator *ExternalApi* | [**getExternalPrincipal**](docs/ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**listUserExternalPrincipals**](docs/ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**healthCheck**](docs/HealthCheckApi.md#healthCheck) | **GET** /healthcheck | diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index cb7e4734fb0..7c83312209d 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -176,7 +176,7 @@ paths: x-accepts: application/json /auth/external/login: post: - operationId: externalLogin + operationId: externalPrincipalLogin requestBody: content: application/json: diff --git a/clients/java/docs/AuthApi.md b/clients/java/docs/AuthApi.md index b317e959d3e..74b2d3f5628 100644 --- a/clients/java/docs/AuthApi.md +++ b/clients/java/docs/AuthApi.md @@ -20,7 +20,7 @@ All URIs are relative to */api/v1* | [**deleteUserExternalPrincipal**](AuthApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user | | [**detachPolicyFromGroup**](AuthApi.md#detachPolicyFromGroup) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group | | [**detachPolicyFromUser**](AuthApi.md#detachPolicyFromUser) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user | -| [**externalLogin**](AuthApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator | +| [**externalPrincipalLogin**](AuthApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator | | [**getCredentials**](AuthApi.md#getCredentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials | | [**getCurrentUser**](AuthApi.md#getCurrentUser) | **GET** /user | get current user | | [**getExternalPrincipal**](AuthApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id | @@ -1544,9 +1544,9 @@ null (empty response body) | **420** | too many requests | - | | **0** | Internal Server Error | - | - -# **externalLogin** -> AuthenticationToken externalLogin().body(body).execute(); + +# **externalPrincipalLogin** +> AuthenticationToken externalPrincipalLogin().body(body).execute(); perform a login using an external authenticator @@ -1567,12 +1567,12 @@ public class Example { AuthApi apiInstance = new AuthApi(defaultClient); Object body = null; // Object | try { - AuthenticationToken result = apiInstance.externalLogin() + AuthenticationToken result = apiInstance.externalPrincipalLogin() .body(body) .execute(); System.out.println(result); } catch (ApiException e) { - System.err.println("Exception when calling AuthApi#externalLogin"); + System.err.println("Exception when calling AuthApi#externalPrincipalLogin"); System.err.println("Status code: " + e.getCode()); System.err.println("Reason: " + e.getResponseBody()); System.err.println("Response headers: " + e.getResponseHeaders()); diff --git a/clients/java/docs/ExperimentalApi.md b/clients/java/docs/ExperimentalApi.md index 9333088331c..4e1806feac5 100644 --- a/clients/java/docs/ExperimentalApi.md +++ b/clients/java/docs/ExperimentalApi.md @@ -9,7 +9,7 @@ All URIs are relative to */api/v1* | [**createPresignMultipartUpload**](ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload | | [**createUserExternalPrincipal**](ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user | | [**deleteUserExternalPrincipal**](ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user | -| [**externalLogin**](ExperimentalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator | +| [**externalPrincipalLogin**](ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator | | [**getExternalPrincipal**](ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id | | [**hardResetBranch**](ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch | | [**listUserExternalPrincipals**](ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user | @@ -520,9 +520,9 @@ null (empty response body) | **420** | too many requests | - | | **0** | Internal Server Error | - | - -# **externalLogin** -> AuthenticationToken externalLogin().body(body).execute(); + +# **externalPrincipalLogin** +> AuthenticationToken externalPrincipalLogin().body(body).execute(); perform a login using an external authenticator @@ -543,12 +543,12 @@ public class Example { ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); Object body = null; // Object | try { - AuthenticationToken result = apiInstance.externalLogin() + AuthenticationToken result = apiInstance.externalPrincipalLogin() .body(body) .execute(); System.out.println(result); } catch (ApiException e) { - System.err.println("Exception when calling ExperimentalApi#externalLogin"); + System.err.println("Exception when calling ExperimentalApi#externalPrincipalLogin"); System.err.println("Status code: " + e.getCode()); System.err.println("Reason: " + e.getResponseBody()); System.err.println("Response headers: " + e.getResponseHeaders()); diff --git a/clients/java/docs/ExternalApi.md b/clients/java/docs/ExternalApi.md index 42ed2f98599..8b9cdad781a 100644 --- a/clients/java/docs/ExternalApi.md +++ b/clients/java/docs/ExternalApi.md @@ -6,7 +6,7 @@ All URIs are relative to */api/v1* |------------- | ------------- | -------------| | [**createUserExternalPrincipal**](ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user | | [**deleteUserExternalPrincipal**](ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user | -| [**externalLogin**](ExternalApi.md#externalLogin) | **POST** /auth/external/login | perform a login using an external authenticator | +| [**externalPrincipalLogin**](ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator | | [**getExternalPrincipal**](ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id | | [**listUserExternalPrincipals**](ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user | @@ -203,9 +203,9 @@ null (empty response body) | **420** | too many requests | - | | **0** | Internal Server Error | - | - -# **externalLogin** -> AuthenticationToken externalLogin().body(body).execute(); + +# **externalPrincipalLogin** +> AuthenticationToken externalPrincipalLogin().body(body).execute(); perform a login using an external authenticator @@ -226,12 +226,12 @@ public class Example { ExternalApi apiInstance = new ExternalApi(defaultClient); Object body = null; // Object | try { - AuthenticationToken result = apiInstance.externalLogin() + AuthenticationToken result = apiInstance.externalPrincipalLogin() .body(body) .execute(); System.out.println(result); } catch (ApiException e) { - System.err.println("Exception when calling ExternalApi#externalLogin"); + System.err.println("Exception when calling ExternalApi#externalPrincipalLogin"); System.err.println("Status code: " + e.getCode()); System.err.println("Reason: " + e.getResponseBody()); System.err.println("Response headers: " + e.getResponseHeaders()); diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java index f18148b0a73..5eeef2153fa 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java @@ -2915,7 +2915,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdetachPolicyFromUserRequest detachPolicyFromUser(String userId, String policyId) { return new APIdetachPolicyFromUserRequest(userId, policyId); } - private okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -2961,44 +2961,44 @@ private okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { - return externalLoginCall(body, _callback); + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + return externalPrincipalLoginCall(body, _callback); } - private ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); + private ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } - public class APIexternalLoginRequest { + public class APIexternalPrincipalLoginRequest { private Object body; - private APIexternalLoginRequest() { + private APIexternalPrincipalLoginRequest() { } /** * Set body * @param body (optional) - * @return APIexternalLoginRequest + * @return APIexternalPrincipalLoginRequest */ - public APIexternalLoginRequest body(Object body) { + public APIexternalPrincipalLoginRequest body(Object body) { this.body = body; return this; } /** - * Build call for externalLogin + * Build call for externalPrincipalLogin * @param _callback ApiCallback API callback * @return Call to execute * @throws ApiException If fail to serialize the request body object @@ -3012,11 +3012,11 @@ public APIexternalLoginRequest body(Object body) { */ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { - return externalLoginCall(body, _callback); + return externalPrincipalLoginCall(body, _callback); } /** - * Execute externalLogin request + * Execute externalPrincipalLogin request * @return AuthenticationToken * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -3029,12 +3029,12 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { */ public AuthenticationToken execute() throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(body); + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); return localVarResp.getData(); } /** - * Execute externalLogin request with HTTP info returned + * Execute externalPrincipalLogin request with HTTP info returned * @return ApiResponse<AuthenticationToken> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -3047,11 +3047,11 @@ public AuthenticationToken execute() throws ApiException { */ public ApiResponse executeWithHttpInfo() throws ApiException { - return externalLoginWithHttpInfo(body); + return externalPrincipalLoginWithHttpInfo(body); } /** - * Execute externalLogin request (asynchronously) + * Execute externalPrincipalLogin request (asynchronously) * @param _callback The callback to be executed when the API call finishes * @return The request call * @throws ApiException If fail to process the API call, e.g. serializing the request body object @@ -3065,14 +3065,14 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio */ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { - return externalLoginAsync(body, _callback); + return externalPrincipalLoginAsync(body, _callback); } } /** * perform a login using an external authenticator * - * @return APIexternalLoginRequest + * @return APIexternalPrincipalLoginRequest * @http.response.details @@ -3082,8 +3082,8 @@ public okhttp3.Call executeAsync(final ApiCallback _callbac
Status Code Description Response Headers
0 Internal Server Error -
*/ - public APIexternalLoginRequest externalLogin() { - return new APIexternalLoginRequest(); + public APIexternalPrincipalLoginRequest externalPrincipalLogin() { + return new APIexternalPrincipalLoginRequest(); } private okhttp3.Call getCredentialsCall(String userId, String accessKeyId, final ApiCallback _callback) throws ApiException { String basePath = null; diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java index 308350cf288..b1f4a075ac8 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java @@ -1110,7 +1110,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } - private okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -1156,44 +1156,44 @@ private okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { - return externalLoginCall(body, _callback); + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + return externalPrincipalLoginCall(body, _callback); } - private ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); + private ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } - public class APIexternalLoginRequest { + public class APIexternalPrincipalLoginRequest { private Object body; - private APIexternalLoginRequest() { + private APIexternalPrincipalLoginRequest() { } /** * Set body * @param body (optional) - * @return APIexternalLoginRequest + * @return APIexternalPrincipalLoginRequest */ - public APIexternalLoginRequest body(Object body) { + public APIexternalPrincipalLoginRequest body(Object body) { this.body = body; return this; } /** - * Build call for externalLogin + * Build call for externalPrincipalLogin * @param _callback ApiCallback API callback * @return Call to execute * @throws ApiException If fail to serialize the request body object @@ -1207,11 +1207,11 @@ public APIexternalLoginRequest body(Object body) { */ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { - return externalLoginCall(body, _callback); + return externalPrincipalLoginCall(body, _callback); } /** - * Execute externalLogin request + * Execute externalPrincipalLogin request * @return AuthenticationToken * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -1224,12 +1224,12 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { */ public AuthenticationToken execute() throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(body); + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); return localVarResp.getData(); } /** - * Execute externalLogin request with HTTP info returned + * Execute externalPrincipalLogin request with HTTP info returned * @return ApiResponse<AuthenticationToken> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -1242,11 +1242,11 @@ public AuthenticationToken execute() throws ApiException { */ public ApiResponse executeWithHttpInfo() throws ApiException { - return externalLoginWithHttpInfo(body); + return externalPrincipalLoginWithHttpInfo(body); } /** - * Execute externalLogin request (asynchronously) + * Execute externalPrincipalLogin request (asynchronously) * @param _callback The callback to be executed when the API call finishes * @return The request call * @throws ApiException If fail to process the API call, e.g. serializing the request body object @@ -1260,14 +1260,14 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio */ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { - return externalLoginAsync(body, _callback); + return externalPrincipalLoginAsync(body, _callback); } } /** * perform a login using an external authenticator * - * @return APIexternalLoginRequest + * @return APIexternalPrincipalLoginRequest * @http.response.details @@ -1277,8 +1277,8 @@ public okhttp3.Call executeAsync(final ApiCallback _callbac
Status Code Description Response Headers
0 Internal Server Error -
*/ - public APIexternalLoginRequest externalLogin() { - return new APIexternalLoginRequest(); + public APIexternalPrincipalLoginRequest externalPrincipalLogin() { + return new APIexternalPrincipalLoginRequest(); } private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallback _callback) throws ApiException { String basePath = null; diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java index d337f87c4ce..a8d913b0c60 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java @@ -453,7 +453,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } - private okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -499,44 +499,44 @@ private okhttp3.Call externalLoginCall(Object body, final ApiCallback _callback) } @SuppressWarnings("rawtypes") - private okhttp3.Call externalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { - return externalLoginCall(body, _callback); + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + return externalPrincipalLoginCall(body, _callback); } - private ApiResponse externalLoginWithHttpInfo(Object body) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, null); + private ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalLoginValidateBeforeCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } - public class APIexternalLoginRequest { + public class APIexternalPrincipalLoginRequest { private Object body; - private APIexternalLoginRequest() { + private APIexternalPrincipalLoginRequest() { } /** * Set body * @param body (optional) - * @return APIexternalLoginRequest + * @return APIexternalPrincipalLoginRequest */ - public APIexternalLoginRequest body(Object body) { + public APIexternalPrincipalLoginRequest body(Object body) { this.body = body; return this; } /** - * Build call for externalLogin + * Build call for externalPrincipalLogin * @param _callback ApiCallback API callback * @return Call to execute * @throws ApiException If fail to serialize the request body object @@ -550,11 +550,11 @@ public APIexternalLoginRequest body(Object body) { */ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { - return externalLoginCall(body, _callback); + return externalPrincipalLoginCall(body, _callback); } /** - * Execute externalLogin request + * Execute externalPrincipalLogin request * @return AuthenticationToken * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -567,12 +567,12 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { */ public AuthenticationToken execute() throws ApiException { - ApiResponse localVarResp = externalLoginWithHttpInfo(body); + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); return localVarResp.getData(); } /** - * Execute externalLogin request with HTTP info returned + * Execute externalPrincipalLogin request with HTTP info returned * @return ApiResponse<AuthenticationToken> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -585,11 +585,11 @@ public AuthenticationToken execute() throws ApiException { */ public ApiResponse executeWithHttpInfo() throws ApiException { - return externalLoginWithHttpInfo(body); + return externalPrincipalLoginWithHttpInfo(body); } /** - * Execute externalLogin request (asynchronously) + * Execute externalPrincipalLogin request (asynchronously) * @param _callback The callback to be executed when the API call finishes * @return The request call * @throws ApiException If fail to process the API call, e.g. serializing the request body object @@ -603,14 +603,14 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio */ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { - return externalLoginAsync(body, _callback); + return externalPrincipalLoginAsync(body, _callback); } } /** * perform a login using an external authenticator * - * @return APIexternalLoginRequest + * @return APIexternalPrincipalLoginRequest * @http.response.details @@ -620,8 +620,8 @@ public okhttp3.Call executeAsync(final ApiCallback _callbac
Status Code Description Response Headers
0 Internal Server Error -
*/ - public APIexternalLoginRequest externalLogin() { - return new APIexternalLoginRequest(); + public APIexternalPrincipalLoginRequest externalPrincipalLogin() { + return new APIexternalPrincipalLoginRequest(); } private okhttp3.Call getExternalPrincipalCall(String principalId, final ApiCallback _callback) throws ApiException { String basePath = null; diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java index 22a266e0f45..bf87e94a729 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java @@ -277,9 +277,9 @@ public void detachPolicyFromUserTest() throws ApiException { * @throws ApiException if the Api call fails */ @Test - public void externalLoginTest() throws ApiException { + public void externalPrincipalLoginTest() throws ApiException { Object body = null; - AuthenticationToken response = api.externalLogin() + AuthenticationToken response = api.externalPrincipalLogin() .body(body) .execute(); // TODO: test validations diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java index 69736eeecda..733a6b25e9b 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java @@ -135,9 +135,9 @@ public void deleteUserExternalPrincipalTest() throws ApiException { * @throws ApiException if the Api call fails */ @Test - public void externalLoginTest() throws ApiException { + public void externalPrincipalLoginTest() throws ApiException { Object body = null; - AuthenticationToken response = api.externalLogin() + AuthenticationToken response = api.externalPrincipalLogin() .body(body) .execute(); // TODO: test validations diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java index 43573391b0f..405aff8353e 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java @@ -71,9 +71,9 @@ public void deleteUserExternalPrincipalTest() throws ApiException { * @throws ApiException if the Api call fails */ @Test - public void externalLoginTest() throws ApiException { + public void externalPrincipalLoginTest() throws ApiException { Object body = null; - AuthenticationToken response = api.externalLogin() + AuthenticationToken response = api.externalPrincipalLogin() .body(body) .execute(); // TODO: test validations diff --git a/clients/python-legacy/README.md b/clients/python-legacy/README.md index 4a205865707..5b032d26a90 100644 --- a/clients/python-legacy/README.md +++ b/clients/python-legacy/README.md @@ -136,7 +136,7 @@ Class | Method | HTTP request | Description *AuthApi* | [**delete_user_external_principal**](docs/AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user *AuthApi* | [**detach_policy_from_group**](docs/AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group *AuthApi* | [**detach_policy_from_user**](docs/AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user -*AuthApi* | [**external_login**](docs/AuthApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +*AuthApi* | [**external_principal_login**](docs/AuthApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator *AuthApi* | [**get_credentials**](docs/AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials *AuthApi* | [**get_current_user**](docs/AuthApi.md#get_current_user) | **GET** /user | get current user *AuthApi* | [**get_external_principal**](docs/AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id @@ -172,13 +172,13 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**create_presign_multipart_upload**](docs/ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**create_user_external_principal**](docs/ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**delete_user_external_principal**](docs/ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExperimentalApi* | [**external_login**](docs/ExperimentalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +*ExperimentalApi* | [**external_principal_login**](docs/ExperimentalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator *ExperimentalApi* | [**get_external_principal**](docs/ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hard_reset_branch**](docs/ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**list_user_external_principals**](docs/ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExternalApi* | [**create_user_external_principal**](docs/ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**delete_user_external_principal**](docs/ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExternalApi* | [**external_login**](docs/ExternalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +*ExternalApi* | [**external_principal_login**](docs/ExternalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator *ExternalApi* | [**get_external_principal**](docs/ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**list_user_external_principals**](docs/ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**health_check**](docs/HealthCheckApi.md#health_check) | **GET** /healthcheck | diff --git a/clients/python-legacy/docs/AuthApi.md b/clients/python-legacy/docs/AuthApi.md index d049b9af394..77936be19be 100644 --- a/clients/python-legacy/docs/AuthApi.md +++ b/clients/python-legacy/docs/AuthApi.md @@ -20,7 +20,7 @@ Method | HTTP request | Description [**delete_user_external_principal**](AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user [**detach_policy_from_group**](AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group [**detach_policy_from_user**](AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user -[**external_login**](AuthApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +[**external_principal_login**](AuthApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_credentials**](AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials [**get_current_user**](AuthApi.md#get_current_user) | **GET** /user | get current user [**get_external_principal**](AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id @@ -1805,8 +1805,8 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **external_login** -> AuthenticationToken external_login() +# **external_principal_login** +> AuthenticationToken external_principal_login() perform a login using an external authenticator @@ -1837,10 +1837,10 @@ with lakefs_client.ApiClient() as api_client: # and optional values try: # perform a login using an external authenticator - api_response = api_instance.external_login(body=body) + api_response = api_instance.external_principal_login(body=body) pprint(api_response) except lakefs_client.ApiException as e: - print("Exception when calling AuthApi->external_login: %s\n" % e) + print("Exception when calling AuthApi->external_principal_login: %s\n" % e) ``` diff --git a/clients/python-legacy/docs/ExperimentalApi.md b/clients/python-legacy/docs/ExperimentalApi.md index aa0a9ecb32a..c806f65e2ad 100644 --- a/clients/python-legacy/docs/ExperimentalApi.md +++ b/clients/python-legacy/docs/ExperimentalApi.md @@ -9,7 +9,7 @@ Method | HTTP request | Description [**create_presign_multipart_upload**](ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload [**create_user_external_principal**](ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**external_login**](ExperimentalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +[**external_principal_login**](ExperimentalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_external_principal**](ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**hard_reset_branch**](ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch [**list_user_external_principals**](ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -646,8 +646,8 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **external_login** -> AuthenticationToken external_login() +# **external_principal_login** +> AuthenticationToken external_principal_login() perform a login using an external authenticator @@ -678,10 +678,10 @@ with lakefs_client.ApiClient() as api_client: # and optional values try: # perform a login using an external authenticator - api_response = api_instance.external_login(body=body) + api_response = api_instance.external_principal_login(body=body) pprint(api_response) except lakefs_client.ApiException as e: - print("Exception when calling ExperimentalApi->external_login: %s\n" % e) + print("Exception when calling ExperimentalApi->external_principal_login: %s\n" % e) ``` diff --git a/clients/python-legacy/docs/ExternalApi.md b/clients/python-legacy/docs/ExternalApi.md index 7be8498f216..c42de42e4c7 100644 --- a/clients/python-legacy/docs/ExternalApi.md +++ b/clients/python-legacy/docs/ExternalApi.md @@ -6,7 +6,7 @@ Method | HTTP request | Description ------------- | ------------- | ------------- [**create_user_external_principal**](ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**external_login**](ExternalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +[**external_principal_login**](ExternalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_external_principal**](ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**list_user_external_principals**](ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -245,8 +245,8 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **external_login** -> AuthenticationToken external_login() +# **external_principal_login** +> AuthenticationToken external_principal_login() perform a login using an external authenticator @@ -277,10 +277,10 @@ with lakefs_client.ApiClient() as api_client: # and optional values try: # perform a login using an external authenticator - api_response = api_instance.external_login(body=body) + api_response = api_instance.external_principal_login(body=body) pprint(api_response) except lakefs_client.ApiException as e: - print("Exception when calling ExternalApi->external_login: %s\n" % e) + print("Exception when calling ExternalApi->external_principal_login: %s\n" % e) ``` diff --git a/clients/python-legacy/lakefs_client/api/auth_api.py b/clients/python-legacy/lakefs_client/api/auth_api.py index 646de80ac51..348e955ff41 100644 --- a/clients/python-legacy/lakefs_client/api/auth_api.py +++ b/clients/python-legacy/lakefs_client/api/auth_api.py @@ -994,12 +994,12 @@ def __init__(self, api_client=None): }, api_client=api_client ) - self.external_login_endpoint = _Endpoint( + self.external_principal_login_endpoint = _Endpoint( settings={ 'response_type': (AuthenticationToken,), 'auth': [], 'endpoint_path': '/auth/external/login', - 'operation_id': 'external_login', + 'operation_id': 'external_principal_login', 'http_method': 'POST', 'servers': None, }, @@ -3336,7 +3336,7 @@ def detach_policy_from_user( policy_id return self.detach_policy_from_user_endpoint.call_with_http_info(**kwargs) - def external_login( + def external_principal_login( self, **kwargs ): @@ -3345,7 +3345,7 @@ def external_login( This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login(async_req=True) + >>> thread = api.external_principal_login(async_req=True) >>> result = thread.get() @@ -3395,7 +3395,7 @@ def external_login( '_check_return_type', True ) kwargs['_host_index'] = kwargs.get('_host_index') - return self.external_login_endpoint.call_with_http_info(**kwargs) + return self.external_principal_login_endpoint.call_with_http_info(**kwargs) def get_credentials( self, diff --git a/clients/python-legacy/lakefs_client/api/experimental_api.py b/clients/python-legacy/lakefs_client/api/experimental_api.py index e7f28253837..9afacf020b5 100644 --- a/clients/python-legacy/lakefs_client/api/experimental_api.py +++ b/clients/python-legacy/lakefs_client/api/experimental_api.py @@ -403,12 +403,12 @@ def __init__(self, api_client=None): }, api_client=api_client ) - self.external_login_endpoint = _Endpoint( + self.external_principal_login_endpoint = _Endpoint( settings={ 'response_type': (AuthenticationToken,), 'auth': [], 'endpoint_path': '/auth/external/login', - 'operation_id': 'external_login', + 'operation_id': 'external_principal_login', 'http_method': 'POST', 'servers': None, }, @@ -1027,7 +1027,7 @@ def delete_user_external_principal( principal_id return self.delete_user_external_principal_endpoint.call_with_http_info(**kwargs) - def external_login( + def external_principal_login( self, **kwargs ): @@ -1036,7 +1036,7 @@ def external_login( This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login(async_req=True) + >>> thread = api.external_principal_login(async_req=True) >>> result = thread.get() @@ -1086,7 +1086,7 @@ def external_login( '_check_return_type', True ) kwargs['_host_index'] = kwargs.get('_host_index') - return self.external_login_endpoint.call_with_http_info(**kwargs) + return self.external_principal_login_endpoint.call_with_http_info(**kwargs) def get_external_principal( self, diff --git a/clients/python-legacy/lakefs_client/api/external_api.py b/clients/python-legacy/lakefs_client/api/external_api.py index 1fbc9c9d6a6..968496c20c6 100644 --- a/clients/python-legacy/lakefs_client/api/external_api.py +++ b/clients/python-legacy/lakefs_client/api/external_api.py @@ -168,12 +168,12 @@ def __init__(self, api_client=None): }, api_client=api_client ) - self.external_login_endpoint = _Endpoint( + self.external_principal_login_endpoint = _Endpoint( settings={ 'response_type': (AuthenticationToken,), 'auth': [], 'endpoint_path': '/auth/external/login', - 'operation_id': 'external_login', + 'operation_id': 'external_principal_login', 'http_method': 'POST', 'servers': None, }, @@ -487,7 +487,7 @@ def delete_user_external_principal( principal_id return self.delete_user_external_principal_endpoint.call_with_http_info(**kwargs) - def external_login( + def external_principal_login( self, **kwargs ): @@ -496,7 +496,7 @@ def external_login( This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login(async_req=True) + >>> thread = api.external_principal_login(async_req=True) >>> result = thread.get() @@ -546,7 +546,7 @@ def external_login( '_check_return_type', True ) kwargs['_host_index'] = kwargs.get('_host_index') - return self.external_login_endpoint.call_with_http_info(**kwargs) + return self.external_principal_login_endpoint.call_with_http_info(**kwargs) def get_external_principal( self, diff --git a/clients/python-legacy/test/test_auth_api.py b/clients/python-legacy/test/test_auth_api.py index 4df013a04e3..d35e074af90 100644 --- a/clients/python-legacy/test/test_auth_api.py +++ b/clients/python-legacy/test/test_auth_api.py @@ -136,8 +136,8 @@ def test_detach_policy_from_user(self): """ pass - def test_external_login(self): - """Test case for external_login + def test_external_principal_login(self): + """Test case for external_principal_login perform a login using an external authenticator # noqa: E501 """ diff --git a/clients/python-legacy/test/test_experimental_api.py b/clients/python-legacy/test/test_experimental_api.py index 539830f672d..19f0f752bbe 100644 --- a/clients/python-legacy/test/test_experimental_api.py +++ b/clients/python-legacy/test/test_experimental_api.py @@ -59,8 +59,8 @@ def test_delete_user_external_principal(self): """ pass - def test_external_login(self): - """Test case for external_login + def test_external_principal_login(self): + """Test case for external_principal_login perform a login using an external authenticator # noqa: E501 """ diff --git a/clients/python-legacy/test/test_external_api.py b/clients/python-legacy/test/test_external_api.py index b87e59dd62e..9ca21eaad2c 100644 --- a/clients/python-legacy/test/test_external_api.py +++ b/clients/python-legacy/test/test_external_api.py @@ -38,8 +38,8 @@ def test_delete_user_external_principal(self): """ pass - def test_external_login(self): - """Test case for external_login + def test_external_principal_login(self): + """Test case for external_principal_login perform a login using an external authenticator # noqa: E501 """ diff --git a/clients/python/README.md b/clients/python/README.md index e865c7cc8f0..6a2b2a7ccfc 100644 --- a/clients/python/README.md +++ b/clients/python/README.md @@ -139,7 +139,7 @@ Class | Method | HTTP request | Description *AuthApi* | [**delete_user_external_principal**](docs/AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user *AuthApi* | [**detach_policy_from_group**](docs/AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group *AuthApi* | [**detach_policy_from_user**](docs/AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user -*AuthApi* | [**external_login**](docs/AuthApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +*AuthApi* | [**external_principal_login**](docs/AuthApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator *AuthApi* | [**get_credentials**](docs/AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials *AuthApi* | [**get_current_user**](docs/AuthApi.md#get_current_user) | **GET** /user | get current user *AuthApi* | [**get_external_principal**](docs/AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id @@ -175,13 +175,13 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**create_presign_multipart_upload**](docs/ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**create_user_external_principal**](docs/ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**delete_user_external_principal**](docs/ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExperimentalApi* | [**external_login**](docs/ExperimentalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +*ExperimentalApi* | [**external_principal_login**](docs/ExperimentalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator *ExperimentalApi* | [**get_external_principal**](docs/ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hard_reset_branch**](docs/ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**list_user_external_principals**](docs/ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExternalApi* | [**create_user_external_principal**](docs/ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**delete_user_external_principal**](docs/ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExternalApi* | [**external_login**](docs/ExternalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +*ExternalApi* | [**external_principal_login**](docs/ExternalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator *ExternalApi* | [**get_external_principal**](docs/ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**list_user_external_principals**](docs/ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**health_check**](docs/HealthCheckApi.md#health_check) | **GET** /healthcheck | diff --git a/clients/python/docs/AuthApi.md b/clients/python/docs/AuthApi.md index 73743a1afee..30505f127e9 100644 --- a/clients/python/docs/AuthApi.md +++ b/clients/python/docs/AuthApi.md @@ -20,7 +20,7 @@ Method | HTTP request | Description [**delete_user_external_principal**](AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user [**detach_policy_from_group**](AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group [**detach_policy_from_user**](AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user -[**external_login**](AuthApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +[**external_principal_login**](AuthApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_credentials**](AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials [**get_current_user**](AuthApi.md#get_current_user) | **GET** /user | get current user [**get_external_principal**](AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id @@ -1792,8 +1792,8 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **external_login** -> AuthenticationToken external_login(body=body) +# **external_principal_login** +> AuthenticationToken external_principal_login(body=body) perform a login using an external authenticator @@ -1823,11 +1823,11 @@ with lakefs_sdk.ApiClient(configuration) as api_client: try: # perform a login using an external authenticator - api_response = api_instance.external_login(body=body) - print("The response of AuthApi->external_login:\n") + api_response = api_instance.external_principal_login(body=body) + print("The response of AuthApi->external_principal_login:\n") pprint(api_response) except Exception as e: - print("Exception when calling AuthApi->external_login: %s\n" % e) + print("Exception when calling AuthApi->external_principal_login: %s\n" % e) ``` diff --git a/clients/python/docs/ExperimentalApi.md b/clients/python/docs/ExperimentalApi.md index 25a3b2e9201..c17a62a1fa2 100644 --- a/clients/python/docs/ExperimentalApi.md +++ b/clients/python/docs/ExperimentalApi.md @@ -9,7 +9,7 @@ Method | HTTP request | Description [**create_presign_multipart_upload**](ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload [**create_user_external_principal**](ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**external_login**](ExperimentalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +[**external_principal_login**](ExperimentalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_external_principal**](ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**hard_reset_branch**](ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch [**list_user_external_principals**](ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -598,8 +598,8 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **external_login** -> AuthenticationToken external_login(body=body) +# **external_principal_login** +> AuthenticationToken external_principal_login(body=body) perform a login using an external authenticator @@ -629,11 +629,11 @@ with lakefs_sdk.ApiClient(configuration) as api_client: try: # perform a login using an external authenticator - api_response = api_instance.external_login(body=body) - print("The response of ExperimentalApi->external_login:\n") + api_response = api_instance.external_principal_login(body=body) + print("The response of ExperimentalApi->external_principal_login:\n") pprint(api_response) except Exception as e: - print("Exception when calling ExperimentalApi->external_login: %s\n" % e) + print("Exception when calling ExperimentalApi->external_principal_login: %s\n" % e) ``` diff --git a/clients/python/docs/ExternalApi.md b/clients/python/docs/ExternalApi.md index 6877b706b82..76c2d711437 100644 --- a/clients/python/docs/ExternalApi.md +++ b/clients/python/docs/ExternalApi.md @@ -6,7 +6,7 @@ Method | HTTP request | Description ------------- | ------------- | ------------- [**create_user_external_principal**](ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**external_login**](ExternalApi.md#external_login) | **POST** /auth/external/login | perform a login using an external authenticator +[**external_principal_login**](ExternalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator [**get_external_principal**](ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**list_user_external_principals**](ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -233,8 +233,8 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **external_login** -> AuthenticationToken external_login(body=body) +# **external_principal_login** +> AuthenticationToken external_principal_login(body=body) perform a login using an external authenticator @@ -264,11 +264,11 @@ with lakefs_sdk.ApiClient(configuration) as api_client: try: # perform a login using an external authenticator - api_response = api_instance.external_login(body=body) - print("The response of ExternalApi->external_login:\n") + api_response = api_instance.external_principal_login(body=body) + print("The response of ExternalApi->external_principal_login:\n") pprint(api_response) except Exception as e: - print("Exception when calling ExternalApi->external_login: %s\n" % e) + print("Exception when calling ExternalApi->external_principal_login: %s\n" % e) ``` diff --git a/clients/python/lakefs_sdk/api/auth_api.py b/clients/python/lakefs_sdk/api/auth_api.py index 7af2b774550..fc5bf0435e5 100644 --- a/clients/python/lakefs_sdk/api/auth_api.py +++ b/clients/python/lakefs_sdk/api/auth_api.py @@ -2354,13 +2354,13 @@ def detach_policy_from_user_with_http_info(self, user_id : StrictStr, policy_id _request_auth=_params.get('_request_auth')) @validate_arguments - def external_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login(body, async_req=True) + >>> thread = api.external_principal_login(body, async_req=True) >>> result = thread.get() :param body: @@ -2378,17 +2378,17 @@ def external_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> Au """ kwargs['_return_http_data_only'] = True if '_preload_content' in kwargs: - raise ValueError("Error! Please call the external_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") - return self.external_login_with_http_info(body, **kwargs) # noqa: E501 + raise ValueError("Error! Please call the external_principal_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") + return self.external_principal_login_with_http_info(body, **kwargs) # noqa: E501 @validate_arguments - def external_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login_with_http_info(body, async_req=True) + >>> thread = api.external_principal_login_with_http_info(body, async_req=True) >>> result = thread.get() :param body: @@ -2440,7 +2440,7 @@ def external_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, if _key not in _all_params: raise ApiTypeError( "Got an unexpected keyword argument '%s'" - " to method external_login" % _key + " to method external_principal_login" % _key ) _params[_key] = _val del _params['kwargs'] diff --git a/clients/python/lakefs_sdk/api/experimental_api.py b/clients/python/lakefs_sdk/api/experimental_api.py index dff22edd71f..d6e4497c4c0 100644 --- a/clients/python/lakefs_sdk/api/experimental_api.py +++ b/clients/python/lakefs_sdk/api/experimental_api.py @@ -881,13 +881,13 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri _request_auth=_params.get('_request_auth')) @validate_arguments - def external_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login(body, async_req=True) + >>> thread = api.external_principal_login(body, async_req=True) >>> result = thread.get() :param body: @@ -905,17 +905,17 @@ def external_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> Au """ kwargs['_return_http_data_only'] = True if '_preload_content' in kwargs: - raise ValueError("Error! Please call the external_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") - return self.external_login_with_http_info(body, **kwargs) # noqa: E501 + raise ValueError("Error! Please call the external_principal_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") + return self.external_principal_login_with_http_info(body, **kwargs) # noqa: E501 @validate_arguments - def external_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login_with_http_info(body, async_req=True) + >>> thread = api.external_principal_login_with_http_info(body, async_req=True) >>> result = thread.get() :param body: @@ -967,7 +967,7 @@ def external_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, if _key not in _all_params: raise ApiTypeError( "Got an unexpected keyword argument '%s'" - " to method external_login" % _key + " to method external_principal_login" % _key ) _params[_key] = _val del _params['kwargs'] diff --git a/clients/python/lakefs_sdk/api/external_api.py b/clients/python/lakefs_sdk/api/external_api.py index 411c826613c..f5b164870e3 100644 --- a/clients/python/lakefs_sdk/api/external_api.py +++ b/clients/python/lakefs_sdk/api/external_api.py @@ -351,13 +351,13 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri _request_auth=_params.get('_request_auth')) @validate_arguments - def external_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login(body, async_req=True) + >>> thread = api.external_principal_login(body, async_req=True) >>> result = thread.get() :param body: @@ -375,17 +375,17 @@ def external_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> Au """ kwargs['_return_http_data_only'] = True if '_preload_content' in kwargs: - raise ValueError("Error! Please call the external_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") - return self.external_login_with_http_info(body, **kwargs) # noqa: E501 + raise ValueError("Error! Please call the external_principal_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") + return self.external_principal_login_with_http_info(body, **kwargs) # noqa: E501 @validate_arguments - def external_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_login_with_http_info(body, async_req=True) + >>> thread = api.external_principal_login_with_http_info(body, async_req=True) >>> result = thread.get() :param body: @@ -437,7 +437,7 @@ def external_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, if _key not in _all_params: raise ApiTypeError( "Got an unexpected keyword argument '%s'" - " to method external_login" % _key + " to method external_principal_login" % _key ) _params[_key] = _val del _params['kwargs'] diff --git a/clients/python/test/test_auth_api.py b/clients/python/test/test_auth_api.py index 3846c5e8bf3..96dfe3671c5 100644 --- a/clients/python/test/test_auth_api.py +++ b/clients/python/test/test_auth_api.py @@ -141,8 +141,8 @@ def test_detach_policy_from_user(self): """ pass - def test_external_login(self): - """Test case for external_login + def test_external_principal_login(self): + """Test case for external_principal_login perform a login using an external authenticator # noqa: E501 """ diff --git a/clients/python/test/test_experimental_api.py b/clients/python/test/test_experimental_api.py index 56b29c9f620..ab969b9ccdd 100644 --- a/clients/python/test/test_experimental_api.py +++ b/clients/python/test/test_experimental_api.py @@ -64,8 +64,8 @@ def test_delete_user_external_principal(self): """ pass - def test_external_login(self): - """Test case for external_login + def test_external_principal_login(self): + """Test case for external_principal_login perform a login using an external authenticator # noqa: E501 """ diff --git a/clients/python/test/test_external_api.py b/clients/python/test/test_external_api.py index 60fa5f01670..ba3a4b93e16 100644 --- a/clients/python/test/test_external_api.py +++ b/clients/python/test/test_external_api.py @@ -43,8 +43,8 @@ def test_delete_user_external_principal(self): """ pass - def test_external_login(self): - """Test case for external_login + def test_external_principal_login(self): + """Test case for external_principal_login perform a login using an external authenticator # noqa: E501 """ diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index c4a553a0ffc..685824f4037 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -1813,7 +1813,7 @@ paths: - auth - external - experimental - operationId: externalLogin + operationId: externalPrincipalLogin summary: perform a login using an external authenticator security: [] requestBody: diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 76b9c8c15ce..65a8107aca6 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -554,16 +554,16 @@ func (c *Controller) Login(w http.ResponseWriter, r *http.Request, body apigen.L writeResponse(w, r, http.StatusOK, response) } -func (c *Controller) ExternalLogin(w http.ResponseWriter, r *http.Request, body apigen.ExternalLoginJSONRequestBody) { +func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Request, body apigen.ExternalPrincipalLoginJSONRequestBody) { ctx := r.Context() if c.isExternalPrincipalNotSupported(ctx) { writeError(w, r, http.StatusNotImplemented, "Not implemented") return } - c.LogAction(ctx, "external_login", r, "", "", "") + c.LogAction(ctx, "external_principal_login", r, "", "", "") - userID, err := c.Auth.ExternalLogin(ctx, body) + userID, err := c.Auth.ExternalPrincipalLogin(ctx, body) if c.handleAPIError(ctx, w, r, err) { if errors.Is(err, ErrAuthenticatingRequest) { writeResponse(w, r, http.StatusUnauthorized, http.StatusText(http.StatusUnauthorized)) diff --git a/pkg/auth/mock/mock_auth_client.go b/pkg/auth/mock/mock_auth_client.go index 7ed9c2576f9..1035da56118 100644 --- a/pkg/auth/mock/mock_auth_client.go +++ b/pkg/auth/mock/mock_auth_client.go @@ -456,44 +456,44 @@ func (mr *MockClientWithResponsesInterfaceMockRecorder) DetachPolicyFromUserWith return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "DetachPolicyFromUserWithResponse", reflect.TypeOf((*MockClientWithResponsesInterface)(nil).DetachPolicyFromUserWithResponse), varargs...) } -// ExternalLoginWithBodyWithResponse mocks base method. -func (m *MockClientWithResponsesInterface) ExternalLoginWithBodyWithResponse(arg0 context.Context, arg1 string, arg2 io.Reader, arg3 ...auth.RequestEditorFn) (*auth.ExternalLoginResponse, error) { +// ExternalPrincipalLoginWithBodyWithResponse mocks base method. +func (m *MockClientWithResponsesInterface) ExternalPrincipalLoginWithBodyWithResponse(arg0 context.Context, arg1 string, arg2 io.Reader, arg3 ...auth.RequestEditorFn) (*auth.ExternalPrincipalLoginResponse, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1, arg2} for _, a := range arg3 { varargs = append(varargs, a) } - ret := m.ctrl.Call(m, "ExternalLoginWithBodyWithResponse", varargs...) - ret0, _ := ret[0].(*auth.ExternalLoginResponse) + ret := m.ctrl.Call(m, "ExternalPrincipalLoginWithBodyWithResponse", varargs...) + ret0, _ := ret[0].(*auth.ExternalPrincipalLoginResponse) ret1, _ := ret[1].(error) return ret0, ret1 } -// ExternalLoginWithBodyWithResponse indicates an expected call of ExternalLoginWithBodyWithResponse. -func (mr *MockClientWithResponsesInterfaceMockRecorder) ExternalLoginWithBodyWithResponse(arg0, arg1, arg2 interface{}, arg3 ...interface{}) *gomock.Call { +// ExternalPrincipalLoginWithBodyWithResponse indicates an expected call of ExternalPrincipalLoginWithBodyWithResponse. +func (mr *MockClientWithResponsesInterfaceMockRecorder) ExternalPrincipalLoginWithBodyWithResponse(arg0, arg1, arg2 interface{}, arg3 ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{arg0, arg1, arg2}, arg3...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ExternalLoginWithBodyWithResponse", reflect.TypeOf((*MockClientWithResponsesInterface)(nil).ExternalLoginWithBodyWithResponse), varargs...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ExternalPrincipalLoginWithBodyWithResponse", reflect.TypeOf((*MockClientWithResponsesInterface)(nil).ExternalPrincipalLoginWithBodyWithResponse), varargs...) } -// ExternalLoginWithResponse mocks base method. -func (m *MockClientWithResponsesInterface) ExternalLoginWithResponse(arg0 context.Context, arg1 auth.ExternalLoginJSONRequestBody, arg2 ...auth.RequestEditorFn) (*auth.ExternalLoginResponse, error) { +// ExternalPrincipalLoginWithResponse mocks base method. +func (m *MockClientWithResponsesInterface) ExternalPrincipalLoginWithResponse(arg0 context.Context, arg1 auth.ExternalPrincipalLoginJSONRequestBody, arg2 ...auth.RequestEditorFn) (*auth.ExternalPrincipalLoginResponse, error) { m.ctrl.T.Helper() varargs := []interface{}{arg0, arg1} for _, a := range arg2 { varargs = append(varargs, a) } - ret := m.ctrl.Call(m, "ExternalLoginWithResponse", varargs...) - ret0, _ := ret[0].(*auth.ExternalLoginResponse) + ret := m.ctrl.Call(m, "ExternalPrincipalLoginWithResponse", varargs...) + ret0, _ := ret[0].(*auth.ExternalPrincipalLoginResponse) ret1, _ := ret[1].(error) return ret0, ret1 } -// ExternalLoginWithResponse indicates an expected call of ExternalLoginWithResponse. -func (mr *MockClientWithResponsesInterfaceMockRecorder) ExternalLoginWithResponse(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { +// ExternalPrincipalLoginWithResponse indicates an expected call of ExternalPrincipalLoginWithResponse. +func (mr *MockClientWithResponsesInterfaceMockRecorder) ExternalPrincipalLoginWithResponse(arg0, arg1 interface{}, arg2 ...interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() varargs := append([]interface{}{arg0, arg1}, arg2...) - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ExternalLoginWithResponse", reflect.TypeOf((*MockClientWithResponsesInterface)(nil).ExternalLoginWithResponse), varargs...) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ExternalPrincipalLoginWithResponse", reflect.TypeOf((*MockClientWithResponsesInterface)(nil).ExternalPrincipalLoginWithResponse), varargs...) } // GetCredentialsForUserWithResponse mocks base method. diff --git a/pkg/auth/service.go b/pkg/auth/service.go index 17f3877dd2f..6c73d102294 100644 --- a/pkg/auth/service.go +++ b/pkg/auth/service.go @@ -85,7 +85,7 @@ type ExternalPrincipalsService interface { DeleteUserExternalPrincipal(ctx context.Context, userID, principalID string) error GetExternalPrincipal(ctx context.Context, principalID string) (*model.ExternalPrincipal, error) ListUserExternalPrincipals(ctx context.Context, userID string, params *model.PaginationParams) ([]*model.ExternalPrincipal, *model.Paginator, error) - ExternalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) + ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) } type Service interface { @@ -1131,7 +1131,7 @@ func (s *AuthService) GetExternalPrincipal(ctx context.Context, principalID stri return nil, ErrNotImplemented } -func (s *AuthService) ExternalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) { +func (s *AuthService) ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) { return "", ErrNotImplemented } @@ -2048,11 +2048,11 @@ func (a *APIAuthService) ListUserExternalPrincipals(ctx context.Context, userID return principals, toPagination(resp.JSON200.Pagination), nil } -func (a *APIAuthService) ExternalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) { +func (a *APIAuthService) ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) { if !a.IsExternalPrincipalsEnabled(ctx) { return "", fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) } - resp, err := a.apiClient.ExternalLoginWithResponse(ctx, externalLoginInfo) + resp, err := a.apiClient.ExternalPrincipalLoginWithResponse(ctx, externalLoginInfo) if err != nil { return "", fmt.Errorf("get external principal: %w", err) } diff --git a/pkg/auth/service_test.go b/pkg/auth/service_test.go index 9e4eaf0ce46..83050427179 100644 --- a/pkg/auth/service_test.go +++ b/pkg/auth/service_test.go @@ -2752,15 +2752,15 @@ func TestAPIAuthService_ExternalLogin(t *testing.T) { presignedURL := "PresignedUrl" externalLoginInfo := map[string]interface{}{"IdentityToken": presignedURL} - mockClient.EXPECT().ExternalLoginWithResponse(gomock.Any(), gomock.Eq(externalLoginInfo)).Return( - &auth.ExternalLoginResponse{ + mockClient.EXPECT().ExternalPrincipalLoginWithResponse(gomock.Any(), gomock.Eq(externalLoginInfo)).Return( + &auth.ExternalPrincipalLoginResponse{ HTTPResponse: &http.Response{ StatusCode: http.StatusOK, }, JSON200: &auth.User{Username: userId}, }, nil) - resp, err := s.ExternalLogin(ctx, externalLoginInfo) + resp, err := s.ExternalPrincipalLogin(ctx, externalLoginInfo) require.NoError(t, err) require.Equal(t, userId, resp) } From e91fe5d1fa00fda890bbc3dd9c6de5cf598c09b8 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Thu, 21 Mar 2024 10:34:29 +0200 Subject: [PATCH 13/33] Fix external login API call --- pkg/api/controller.go | 33 +++++++++++++++------------------ 1 file changed, 15 insertions(+), 18 deletions(-) diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 65a8107aca6..f10b09b4d0b 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -565,27 +565,24 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque userID, err := c.Auth.ExternalPrincipalLogin(ctx, body) if c.handleAPIError(ctx, w, r, err) { - if errors.Is(err, ErrAuthenticatingRequest) { - writeResponse(w, r, http.StatusUnauthorized, http.StatusText(http.StatusUnauthorized)) - return - } + return + } - loginTime := time.Now() - duration := c.Config.Auth.LoginDuration - expires := loginTime.Add(duration) - secret := c.Auth.SecretStore().SharedSecret() + loginTime := time.Now() + duration := c.Config.Auth.LoginDuration + expires := loginTime.Add(duration) + secret := c.Auth.SecretStore().SharedSecret() - tokenString, err := GenerateJWTLogin(secret, userID, loginTime, expires) - if err != nil { - writeError(w, r, http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError)) - return - } - response := apigen.AuthenticationToken{ - Token: tokenString, - TokenExpiration: swag.Int64(expires.Unix()), - } - writeResponse(w, r, http.StatusOK, response) + tokenString, err := GenerateJWTLogin(secret, userID, loginTime, expires) + if err != nil { + writeError(w, r, http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError)) + return } + response := apigen.AuthenticationToken{ + Token: tokenString, + TokenExpiration: swag.Int64(expires.Unix()), + } + writeResponse(w, r, http.StatusOK, response) } func (c *Controller) GetPhysicalAddress(w http.ResponseWriter, r *http.Request, repository, branch string, params apigen.GetPhysicalAddressParams) { From 462bee582268f59f76b76a9c0dc9e3ba02a6c5c9 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Mon, 25 Mar 2024 12:36:01 +0200 Subject: [PATCH 14/33] Revert --- Makefile | 3 +-- pkg/authentication/apiclient/.gitkeep | 0 2 files changed, 1 insertion(+), 2 deletions(-) create mode 100644 pkg/authentication/apiclient/.gitkeep diff --git a/Makefile b/Makefile index 88990ba7087..9ea6418cbc3 100644 --- a/Makefile +++ b/Makefile @@ -64,8 +64,7 @@ clean: $(UI_BUILD_DIR) \ $(UI_DIR)/node_modules \ pkg/api/apigen/lakefs.gen.go \ - pkg/auth/client.gen.go \ - pkg/authentication/apiclient/client.gen.go + pkg/auth/client.gen.go check-licenses: check-licenses-go-mod check-licenses-npm diff --git a/pkg/authentication/apiclient/.gitkeep b/pkg/authentication/apiclient/.gitkeep new file mode 100644 index 00000000000..e69de29bb2d From 0247f492199283d0bc1ce075e0f9376b47b24907 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Mon, 25 Mar 2024 12:43:14 +0200 Subject: [PATCH 15/33] Fix test --- pkg/authentication/service_test.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkg/authentication/service_test.go b/pkg/authentication/service_test.go index 8458ff8219c..19cbb62377d 100644 --- a/pkg/authentication/service_test.go +++ b/pkg/authentication/service_test.go @@ -155,7 +155,7 @@ func NewTestApiService(t *testing.T, validateIDTokenClaims map[string]string, ex } func TestAPIAuthService_ExternalLogin(t *testing.T) { - mockClient, s := NewTestApiService(t, map[string]string{}, false) + mockClient, s := NewTestApiService(t, map[string]string{}, true) ctx := context.Background() userId := "user" presignedURL := "PresignedUrl" From fb95a2022bc4553d32e78fc227dc8c2cd94a5dab Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Mon, 25 Mar 2024 16:11:40 +0200 Subject: [PATCH 16/33] Return principal ID instead of user ID for ExternalPrincipalLogin --- api/authentication.yml | 10 +++++++++- pkg/api/controller.go | 9 ++++++--- pkg/authentication/service_test.go | 6 +++--- 3 files changed, 18 insertions(+), 7 deletions(-) diff --git a/api/authentication.yml b/api/authentication.yml index 626fa567865..30017bcc087 100644 --- a/api/authentication.yml +++ b/api/authentication.yml @@ -305,6 +305,14 @@ components: additionalProperties: type: string description: the claims of the token returned from the provider + + ExternalPrincipal: + type: object + required: + - id + properties: + id: + type: string paths: /ldap/login: post: @@ -350,7 +358,7 @@ paths: content: application/json: schema: - $ref: "#/components/schemas/User" + $ref: "#/components/schemas/ExternalPrincipal" 401: $ref: "#/components/responses/Unauthorized" 420: diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 683c7b12e20..5d78ccd7368 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -564,8 +564,11 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque } c.LogAction(ctx, "external_principal_login", r, "", "", "") - - userID, err := c.Authentication.ExternalPrincipalLogin(ctx, body) + principalID, err := c.Authentication.ExternalPrincipalLogin(ctx, body) + if c.handleAPIError(ctx, w, r, err) { + return + } + user, err := c.Auth.GetUserByExternalID(ctx, principalID) if c.handleAPIError(ctx, w, r, err) { return } @@ -575,7 +578,7 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque expires := loginTime.Add(duration) secret := c.Auth.SecretStore().SharedSecret() - tokenString, err := GenerateJWTLogin(secret, userID, loginTime.Unix(), expires.Unix()) + tokenString, err := GenerateJWTLogin(secret, *user.FriendlyName, loginTime.Unix(), expires.Unix()) if err != nil { writeError(w, r, http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError)) return diff --git a/pkg/authentication/service_test.go b/pkg/authentication/service_test.go index 19cbb62377d..efaea3540ea 100644 --- a/pkg/authentication/service_test.go +++ b/pkg/authentication/service_test.go @@ -157,7 +157,7 @@ func NewTestApiService(t *testing.T, validateIDTokenClaims map[string]string, ex func TestAPIAuthService_ExternalLogin(t *testing.T) { mockClient, s := NewTestApiService(t, map[string]string{}, true) ctx := context.Background() - userId := "user" + principalId := "arn:aws:sts::123:assumed-role/MyRole/SessionName" presignedURL := "PresignedUrl" externalLoginInfo := map[string]interface{}{"IdentityToken": presignedURL} @@ -166,10 +166,10 @@ func TestAPIAuthService_ExternalLogin(t *testing.T) { HTTPResponse: &http.Response{ StatusCode: http.StatusOK, }, - JSON200: &apiclient.User{Id: userId}, + JSON200: &apiclient.ExternalPrincipal{Id: principalId}, }, nil) resp, err := s.ExternalPrincipalLogin(ctx, externalLoginInfo) require.NoError(t, err) - require.Equal(t, userId, resp) + require.Equal(t, principalId, resp) } From 74cbb532d650ef52b6d048623755256a5af83cda Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 27 Mar 2024 10:12:05 +0200 Subject: [PATCH 17/33] Changed request param --- api/authentication.yml | 6 +++--- api/swagger.yml | 6 +++--- clients/java-legacy/api/openapi.yaml | 6 +++--- clients/java-legacy/docs/ExperimentalApi.md | 4 ++-- clients/java-legacy/docs/ExternalApi.md | 4 ++-- .../java/io/lakefs/clients/api/ExperimentalApi.java | 10 +++++----- .../main/java/io/lakefs/clients/api/ExternalApi.java | 10 +++++----- .../io/lakefs/clients/api/ExperimentalApiTest.java | 2 +- .../java/io/lakefs/clients/api/ExternalApiTest.java | 2 +- clients/java/api/openapi.yaml | 6 +++--- clients/java/docs/ExperimentalApi.md | 4 ++-- clients/java/docs/ExternalApi.md | 4 ++-- .../java/io/lakefs/clients/sdk/ExperimentalApi.java | 12 ++++++------ .../main/java/io/lakefs/clients/sdk/ExternalApi.java | 12 ++++++------ .../io/lakefs/clients/sdk/ExperimentalApiTest.java | 2 +- .../java/io/lakefs/clients/sdk/ExternalApiTest.java | 2 +- clients/python-legacy/docs/ExperimentalApi.md | 4 ++-- clients/python-legacy/docs/ExternalApi.md | 4 ++-- .../lakefs_client/api/experimental_api.py | 4 ++-- .../python-legacy/lakefs_client/api/external_api.py | 4 ++-- clients/python/docs/ExperimentalApi.md | 4 ++-- clients/python/docs/ExternalApi.md | 4 ++-- clients/python/lakefs_sdk/api/experimental_api.py | 10 +++++----- clients/python/lakefs_sdk/api/external_api.py | 10 +++++----- docs/assets/js/swagger.yml | 6 +++--- pkg/authentication/service.go | 8 ++++---- pkg/authentication/service_test.go | 7 +++---- 27 files changed, 78 insertions(+), 79 deletions(-) diff --git a/api/authentication.yml b/api/authentication.yml index 30017bcc087..b8d62d33dd5 100644 --- a/api/authentication.yml +++ b/api/authentication.yml @@ -280,8 +280,8 @@ components: external_user_identifier: type: string description: external_user_identifier is the user DN in LDAP set if user exists with that username and has this password. - ExternalLoginInformation: - type: object + IdentityToken: + type: string StsAuthRequest: type: object required: @@ -351,7 +351,7 @@ paths: content: application/json: schema: - $ref: "#/components/schemas/ExternalLoginInformation" + $ref: "#/components/schemas/IdentityToken" responses: 200: description: successful external login diff --git a/api/swagger.yml b/api/swagger.yml index b541b4460dc..e5e7b11d6c7 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -1051,8 +1051,8 @@ components: secret_access_key: type: string - ExternalLoginInformation: - type: object + IdentityToken: + type: string StsAuthRequest: type: object @@ -1833,7 +1833,7 @@ paths: content: application/json: schema: - $ref: "#/components/schemas/ExternalLoginInformation" + $ref: "#/components/schemas/IdentityToken" responses: 200: description: successful external login diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index afd16700185..9e8f0a826b9 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -181,7 +181,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/ExternalLoginInformation' + $ref: '#/components/schemas/IdentityToken' responses: "200": content: @@ -8212,8 +8212,8 @@ components: - access_key_id - secret_access_key type: object - ExternalLoginInformation: - type: object + IdentityToken: + type: string StsAuthRequest: example: code: code diff --git a/clients/java-legacy/docs/ExperimentalApi.md b/clients/java-legacy/docs/ExperimentalApi.md index 18fbba2c2d0..e94747e6bcf 100644 --- a/clients/java-legacy/docs/ExperimentalApi.md +++ b/clients/java-legacy/docs/ExperimentalApi.md @@ -533,7 +533,7 @@ public class Example { defaultClient.setBasePath("http://localhost/api/v1"); ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); - Object body = null; // Object | + String body = "body_example"; // String | try { AuthenticationToken result = apiInstance.externalPrincipalLogin(body); System.out.println(result); @@ -552,7 +552,7 @@ public class Example { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **Object**| | [optional] + **body** | **String**| | [optional] ### Return type diff --git a/clients/java-legacy/docs/ExternalApi.md b/clients/java-legacy/docs/ExternalApi.md index 04e26191ea4..9978767a664 100644 --- a/clients/java-legacy/docs/ExternalApi.md +++ b/clients/java-legacy/docs/ExternalApi.md @@ -221,7 +221,7 @@ public class Example { defaultClient.setBasePath("http://localhost/api/v1"); ExternalApi apiInstance = new ExternalApi(defaultClient); - Object body = null; // Object | + String body = "body_example"; // String | try { AuthenticationToken result = apiInstance.externalPrincipalLogin(body); System.out.println(result); @@ -240,7 +240,7 @@ public class Example { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **Object**| | [optional] + **body** | **String**| | [optional] ### Return type diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java index f05e6b698d4..cfd0a642fa3 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java @@ -862,7 +862,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _callback) throws ApiException { Object localVarPostBody = body; // create path and map variables @@ -893,7 +893,7 @@ public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _c } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(String body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginCall(body, _callback); @@ -916,7 +916,7 @@ private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final 0 Internal Server Error - */ - public AuthenticationToken externalPrincipalLogin(Object body) throws ApiException { + public AuthenticationToken externalPrincipalLogin(String body) throws ApiException { ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); return localVarResp.getData(); } @@ -936,7 +936,7 @@ public AuthenticationToken externalPrincipalLogin(Object body) throws ApiExcepti 0 Internal Server Error - */ - public ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { + public ApiResponse externalPrincipalLoginWithHttpInfo(String body) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); @@ -958,7 +958,7 @@ public ApiResponse externalPrincipalLoginWithHttpInfo(Objec 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginAsync(String body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java index 94102bb8136..87bb086198c 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java @@ -355,7 +355,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _callback) throws ApiException { Object localVarPostBody = body; // create path and map variables @@ -386,7 +386,7 @@ public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _c } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(String body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginCall(body, _callback); @@ -409,7 +409,7 @@ private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final 0 Internal Server Error - */ - public AuthenticationToken externalPrincipalLogin(Object body) throws ApiException { + public AuthenticationToken externalPrincipalLogin(String body) throws ApiException { ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); return localVarResp.getData(); } @@ -429,7 +429,7 @@ public AuthenticationToken externalPrincipalLogin(Object body) throws ApiExcepti 0 Internal Server Error - */ - public ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { + public ApiResponse externalPrincipalLoginWithHttpInfo(String body) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); @@ -451,7 +451,7 @@ public ApiResponse externalPrincipalLoginWithHttpInfo(Objec 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginAsync(String body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java index d3ba40a9955..7fe4c4400c1 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java @@ -141,7 +141,7 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - Object body = null; + String body = null; AuthenticationToken response = api.externalPrincipalLogin(body); // TODO: test validations } diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java index 78ebb40a433..8f4c0d6de3d 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java @@ -79,7 +79,7 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - Object body = null; + String body = null; AuthenticationToken response = api.externalPrincipalLogin(body); // TODO: test validations } diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index 8fd5b4bd23d..c768e79a712 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -181,7 +181,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/ExternalLoginInformation' + $ref: '#/components/schemas/IdentityToken' responses: "200": content: @@ -8186,8 +8186,8 @@ components: - access_key_id - secret_access_key type: object - ExternalLoginInformation: - type: object + IdentityToken: + type: string StsAuthRequest: example: code: code diff --git a/clients/java/docs/ExperimentalApi.md b/clients/java/docs/ExperimentalApi.md index 53f142f5269..106dbcf6978 100644 --- a/clients/java/docs/ExperimentalApi.md +++ b/clients/java/docs/ExperimentalApi.md @@ -542,7 +542,7 @@ public class Example { defaultClient.setBasePath("/api/v1"); ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); - Object body = null; // Object | + String body = "body_example"; // String | try { AuthenticationToken result = apiInstance.externalPrincipalLogin() .body(body) @@ -563,7 +563,7 @@ public class Example { | Name | Type | Description | Notes | |------------- | ------------- | ------------- | -------------| -| **body** | **Object**| | [optional] | +| **body** | **String**| | [optional] | ### Return type diff --git a/clients/java/docs/ExternalApi.md b/clients/java/docs/ExternalApi.md index 7d43f52b07f..c214caf5f16 100644 --- a/clients/java/docs/ExternalApi.md +++ b/clients/java/docs/ExternalApi.md @@ -224,7 +224,7 @@ public class Example { defaultClient.setBasePath("/api/v1"); ExternalApi apiInstance = new ExternalApi(defaultClient); - Object body = null; // Object | + String body = "body_example"; // String | try { AuthenticationToken result = apiInstance.externalPrincipalLogin() .body(body) @@ -245,7 +245,7 @@ public class Example { | Name | Type | Description | Notes | |------------- | ------------- | ------------- | -------------| -| **body** | **Object**| | [optional] | +| **body** | **String**| | [optional] | ### Return type diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java index 6d13e906ce5..c9b75f14b01 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java @@ -1111,7 +1111,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } - private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -1157,19 +1157,19 @@ private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _ } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(String body, final ApiCallback _callback) throws ApiException { return externalPrincipalLoginCall(body, _callback); } - private ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { + private ApiResponse externalPrincipalLoginWithHttpInfo(String body) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginAsync(String body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); @@ -1178,7 +1178,7 @@ private okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback< } public class APIexternalPrincipalLoginRequest { - private Object body; + private String body; private APIexternalPrincipalLoginRequest() { } @@ -1188,7 +1188,7 @@ private APIexternalPrincipalLoginRequest() { * @param body (optional) * @return APIexternalPrincipalLoginRequest */ - public APIexternalPrincipalLoginRequest body(Object body) { + public APIexternalPrincipalLoginRequest body(String body) { this.body = body; return this; } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java index 09611524fa9..5634455aec0 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java @@ -453,7 +453,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } - private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -499,19 +499,19 @@ private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _ } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(String body, final ApiCallback _callback) throws ApiException { return externalPrincipalLoginCall(body, _callback); } - private ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { + private ApiResponse externalPrincipalLoginWithHttpInfo(String body) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginAsync(String body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); @@ -520,7 +520,7 @@ private okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback< } public class APIexternalPrincipalLoginRequest { - private Object body; + private String body; private APIexternalPrincipalLoginRequest() { } @@ -530,7 +530,7 @@ private APIexternalPrincipalLoginRequest() { * @param body (optional) * @return APIexternalPrincipalLoginRequest */ - public APIexternalPrincipalLoginRequest body(Object body) { + public APIexternalPrincipalLoginRequest body(String body) { this.body = body; return this; } diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java index afd8d56e48e..9a30d7212fa 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java @@ -137,7 +137,7 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - Object body = null; + String body = null; AuthenticationToken response = api.externalPrincipalLogin() .body(body) .execute(); diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java index 405aff8353e..21feb97232a 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java @@ -72,7 +72,7 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - Object body = null; + String body = null; AuthenticationToken response = api.externalPrincipalLogin() .body(body) .execute(); diff --git a/clients/python-legacy/docs/ExperimentalApi.md b/clients/python-legacy/docs/ExperimentalApi.md index 8e4e39f0f50..23517d4080f 100644 --- a/clients/python-legacy/docs/ExperimentalApi.md +++ b/clients/python-legacy/docs/ExperimentalApi.md @@ -673,7 +673,7 @@ configuration = lakefs_client.Configuration( with lakefs_client.ApiClient() as api_client: # Create an instance of the API class api_instance = experimental_api.ExperimentalApi(api_client) - body = {} # {str: (bool, date, datetime, dict, float, int, list, str, none_type)} | (optional) + body = "body_example" # str | (optional) # example passing only required values which don't have defaults set # and optional values @@ -690,7 +690,7 @@ with lakefs_client.ApiClient() as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **{str: (bool, date, datetime, dict, float, int, list, str, none_type)}**| | [optional] + **body** | **str**| | [optional] ### Return type diff --git a/clients/python-legacy/docs/ExternalApi.md b/clients/python-legacy/docs/ExternalApi.md index 2a2a5572fa5..effd3c4579a 100644 --- a/clients/python-legacy/docs/ExternalApi.md +++ b/clients/python-legacy/docs/ExternalApi.md @@ -271,7 +271,7 @@ configuration = lakefs_client.Configuration( with lakefs_client.ApiClient() as api_client: # Create an instance of the API class api_instance = external_api.ExternalApi(api_client) - body = {} # {str: (bool, date, datetime, dict, float, int, list, str, none_type)} | (optional) + body = "body_example" # str | (optional) # example passing only required values which don't have defaults set # and optional values @@ -288,7 +288,7 @@ with lakefs_client.ApiClient() as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **{str: (bool, date, datetime, dict, float, int, list, str, none_type)}**| | [optional] + **body** | **str**| | [optional] ### Return type diff --git a/clients/python-legacy/lakefs_client/api/experimental_api.py b/clients/python-legacy/lakefs_client/api/experimental_api.py index 3efca148019..6917ed0ffd3 100644 --- a/clients/python-legacy/lakefs_client/api/experimental_api.py +++ b/clients/python-legacy/lakefs_client/api/experimental_api.py @@ -432,7 +432,7 @@ def __init__(self, api_client=None): }, 'openapi_types': { 'body': - ({str: (bool, date, datetime, dict, float, int, list, str, none_type)},), + (str,), }, 'attribute_map': { }, @@ -1092,7 +1092,7 @@ def external_principal_login( Keyword Args: - body ({str: (bool, date, datetime, dict, float, int, list, str, none_type)}): [optional] + body (str): [optional] _return_http_data_only (bool): response data without head status code and headers. Default is True. _preload_content (bool): if False, the urllib3.HTTPResponse object diff --git a/clients/python-legacy/lakefs_client/api/external_api.py b/clients/python-legacy/lakefs_client/api/external_api.py index 968496c20c6..4f80a8f2c3b 100644 --- a/clients/python-legacy/lakefs_client/api/external_api.py +++ b/clients/python-legacy/lakefs_client/api/external_api.py @@ -196,7 +196,7 @@ def __init__(self, api_client=None): }, 'openapi_types': { 'body': - ({str: (bool, date, datetime, dict, float, int, list, str, none_type)},), + (str,), }, 'attribute_map': { }, @@ -501,7 +501,7 @@ def external_principal_login( Keyword Args: - body ({str: (bool, date, datetime, dict, float, int, list, str, none_type)}): [optional] + body (str): [optional] _return_http_data_only (bool): response data without head status code and headers. Default is True. _preload_content (bool): if False, the urllib3.HTTPResponse object diff --git a/clients/python/docs/ExperimentalApi.md b/clients/python/docs/ExperimentalApi.md index 4b5e8be6c6b..16463886d01 100644 --- a/clients/python/docs/ExperimentalApi.md +++ b/clients/python/docs/ExperimentalApi.md @@ -626,7 +626,7 @@ configuration = lakefs_sdk.Configuration( with lakefs_sdk.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = lakefs_sdk.ExperimentalApi(api_client) - body = None # object | (optional) + body = 'body_example' # str | (optional) try: # perform a login using an external authenticator @@ -644,7 +644,7 @@ with lakefs_sdk.ApiClient(configuration) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **object**| | [optional] + **body** | **str**| | [optional] ### Return type diff --git a/clients/python/docs/ExternalApi.md b/clients/python/docs/ExternalApi.md index 7acaf217594..47191d9e257 100644 --- a/clients/python/docs/ExternalApi.md +++ b/clients/python/docs/ExternalApi.md @@ -260,7 +260,7 @@ configuration = lakefs_sdk.Configuration( with lakefs_sdk.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = lakefs_sdk.ExternalApi(api_client) - body = None # object | (optional) + body = 'body_example' # str | (optional) try: # perform a login using an external authenticator @@ -278,7 +278,7 @@ with lakefs_sdk.ApiClient(configuration) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **object**| | [optional] + **body** | **str**| | [optional] ### Return type diff --git a/clients/python/lakefs_sdk/api/experimental_api.py b/clients/python/lakefs_sdk/api/experimental_api.py index 1cf14cca0a6..b8d8c12334f 100644 --- a/clients/python/lakefs_sdk/api/experimental_api.py +++ b/clients/python/lakefs_sdk/api/experimental_api.py @@ -22,7 +22,7 @@ from pydantic import Field, StrictBool, StrictInt, StrictStr, conint -from typing import Any, Dict, Optional +from typing import Optional from lakefs_sdk.models.abort_presign_multipart_upload import AbortPresignMultipartUpload from lakefs_sdk.models.authentication_token import AuthenticationToken @@ -882,7 +882,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri _request_auth=_params.get('_request_auth')) @validate_arguments - def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_principal_login(self, body : Optional[StrictStr] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an @@ -892,7 +892,7 @@ def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwa >>> result = thread.get() :param body: - :type body: object + :type body: str :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _request_timeout: timeout setting for this request. If one @@ -910,7 +910,7 @@ def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwa return self.external_principal_login_with_http_info(body, **kwargs) # noqa: E501 @validate_arguments - def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_principal_login_with_http_info(self, body : Optional[StrictStr] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an @@ -920,7 +920,7 @@ def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any] >>> result = thread.get() :param body: - :type body: object + :type body: str :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _preload_content: if False, the ApiResponse.data will diff --git a/clients/python/lakefs_sdk/api/external_api.py b/clients/python/lakefs_sdk/api/external_api.py index f5b164870e3..f37d05e483b 100644 --- a/clients/python/lakefs_sdk/api/external_api.py +++ b/clients/python/lakefs_sdk/api/external_api.py @@ -22,7 +22,7 @@ from pydantic import Field, StrictStr, conint -from typing import Any, Dict, Optional +from typing import Optional from lakefs_sdk.models.authentication_token import AuthenticationToken from lakefs_sdk.models.external_principal import ExternalPrincipal @@ -351,7 +351,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri _request_auth=_params.get('_request_auth')) @validate_arguments - def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_principal_login(self, body : Optional[StrictStr] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an @@ -361,7 +361,7 @@ def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwa >>> result = thread.get() :param body: - :type body: object + :type body: str :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _request_timeout: timeout setting for this request. If one @@ -379,7 +379,7 @@ def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwa return self.external_principal_login_with_http_info(body, **kwargs) # noqa: E501 @validate_arguments - def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_principal_login_with_http_info(self, body : Optional[StrictStr] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an @@ -389,7 +389,7 @@ def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any] >>> result = thread.get() :param body: - :type body: object + :type body: str :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _preload_content: if False, the ApiResponse.data will diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index b541b4460dc..e5e7b11d6c7 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -1051,8 +1051,8 @@ components: secret_access_key: type: string - ExternalLoginInformation: - type: object + IdentityToken: + type: string StsAuthRequest: type: object @@ -1833,7 +1833,7 @@ paths: content: application/json: schema: - $ref: "#/components/schemas/ExternalLoginInformation" + $ref: "#/components/schemas/IdentityToken" responses: 200: description: successful external login diff --git a/pkg/authentication/service.go b/pkg/authentication/service.go index 6da675f9ab1..bda2bd478b7 100644 --- a/pkg/authentication/service.go +++ b/pkg/authentication/service.go @@ -17,7 +17,7 @@ import ( type Service interface { IsExternalPrincipalsEnabled() bool ValidateSTS(ctx context.Context, code, redirectURI, state string) (*STSResponseData, error) - ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) + ExternalPrincipalLogin(ctx context.Context, identityToken string) (string, error) } type DummyService struct{} @@ -30,7 +30,7 @@ func (d DummyService) ValidateSTS(ctx context.Context, code, redirectURI, state return nil, ErrNotImplemented } -func (d DummyService) ExternalPrincipalLogin(_ context.Context, _ map[string]interface{}) (string, error) { +func (d DummyService) ExternalPrincipalLogin(_ context.Context, _ string) (string, error) { return "", ErrNotImplemented } @@ -133,11 +133,11 @@ func (s *APIService) ValidateSTS(ctx context.Context, code, redirectURI, state s }, nil } -func (s *APIService) ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) { +func (s *APIService) ExternalPrincipalLogin(ctx context.Context, identityToken string) (string, error) { if !s.IsExternalPrincipalsEnabled() { return "", fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) } - resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, externalLoginInfo) + resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, apiclient.ExternalPrincipalLoginJSONRequestBody(identityToken)) if err != nil { return "", fmt.Errorf("failed to authenticate user: %w", err) } diff --git a/pkg/authentication/service_test.go b/pkg/authentication/service_test.go index efaea3540ea..c04ebed97f5 100644 --- a/pkg/authentication/service_test.go +++ b/pkg/authentication/service_test.go @@ -158,10 +158,9 @@ func TestAPIAuthService_ExternalLogin(t *testing.T) { mockClient, s := NewTestApiService(t, map[string]string{}, true) ctx := context.Background() principalId := "arn:aws:sts::123:assumed-role/MyRole/SessionName" - presignedURL := "PresignedUrl" - externalLoginInfo := map[string]interface{}{"IdentityToken": presignedURL} + IdentityToken := "IdentityToken" - mockClient.EXPECT().ExternalPrincipalLoginWithResponse(gomock.Any(), gomock.Eq(externalLoginInfo)).Return( + mockClient.EXPECT().ExternalPrincipalLoginWithResponse(gomock.Any(), gomock.Eq(apiclient.ExternalPrincipalLoginJSONRequestBody(IdentityToken))).Return( &apiclient.ExternalPrincipalLoginResponse{ HTTPResponse: &http.Response{ StatusCode: http.StatusOK, @@ -169,7 +168,7 @@ func TestAPIAuthService_ExternalLogin(t *testing.T) { JSON200: &apiclient.ExternalPrincipal{Id: principalId}, }, nil) - resp, err := s.ExternalPrincipalLogin(ctx, externalLoginInfo) + resp, err := s.ExternalPrincipalLogin(ctx, IdentityToken) require.NoError(t, err) require.Equal(t, principalId, resp) } From d2e77e22e2fca62ed2dbed9324177098c416e65c Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 27 Mar 2024 13:04:44 +0200 Subject: [PATCH 18/33] Fix review --- api/authentication.yml | 10 +++++----- api/swagger.yml | 8 ++++---- clients/java-legacy/README.md | 4 ++-- clients/java-legacy/api/openapi.yaml | 8 ++++---- clients/java-legacy/docs/ExperimentalApi.md | 6 +++--- clients/java-legacy/docs/ExternalApi.md | 6 +++--- .../io/lakefs/clients/api/ExperimentalApi.java | 12 ++++++------ .../java/io/lakefs/clients/api/ExternalApi.java | 12 ++++++------ .../io/lakefs/clients/api/ExperimentalApiTest.java | 2 +- .../io/lakefs/clients/api/ExternalApiTest.java | 2 +- clients/java/README.md | 4 ++-- clients/java/api/openapi.yaml | 8 ++++---- clients/java/docs/ExperimentalApi.md | 6 +++--- clients/java/docs/ExternalApi.md | 6 +++--- .../io/lakefs/clients/sdk/ExperimentalApi.java | 14 +++++++------- .../java/io/lakefs/clients/sdk/ExternalApi.java | 14 +++++++------- .../io/lakefs/clients/sdk/ExperimentalApiTest.java | 2 +- .../io/lakefs/clients/sdk/ExternalApiTest.java | 2 +- clients/python-legacy/README.md | 4 ++-- clients/python-legacy/docs/ExperimentalApi.md | 6 +++--- clients/python-legacy/docs/ExternalApi.md | 6 +++--- .../lakefs_client/api/experimental_api.py | 6 +++--- .../lakefs_client/api/external_api.py | 6 +++--- clients/python/README.md | 4 ++-- clients/python/docs/ExperimentalApi.md | 6 +++--- clients/python/docs/ExternalApi.md | 6 +++--- clients/python/lakefs_sdk/api/experimental_api.py | 12 ++++++------ clients/python/lakefs_sdk/api/external_api.py | 12 ++++++------ docs/assets/js/swagger.yml | 8 ++++---- pkg/authentication/service.go | 8 ++++---- pkg/authentication/service_test.go | 8 ++++---- 31 files changed, 109 insertions(+), 109 deletions(-) diff --git a/api/authentication.yml b/api/authentication.yml index b8d62d33dd5..8f2e5aee9ed 100644 --- a/api/authentication.yml +++ b/api/authentication.yml @@ -280,8 +280,8 @@ components: external_user_identifier: type: string description: external_user_identifier is the user DN in LDAP set if user exists with that username and has this password. - IdentityToken: - type: string + ExternalLoginInformation: + type: object StsAuthRequest: type: object required: @@ -305,7 +305,7 @@ components: additionalProperties: type: string description: the claims of the token returned from the provider - + ExternalPrincipal: type: object required: @@ -339,7 +339,7 @@ paths: default: $ref: "#/components/responses/ServerError" - /auth/external/login: + /auth/external/principal/login: post: tags: - auth @@ -351,7 +351,7 @@ paths: content: application/json: schema: - $ref: "#/components/schemas/IdentityToken" + $ref: "#/components/schemas/ExternalLoginInformation" responses: 200: description: successful external login diff --git a/api/swagger.yml b/api/swagger.yml index e5e7b11d6c7..7e6a83133b8 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -1051,8 +1051,8 @@ components: secret_access_key: type: string - IdentityToken: - type: string + ExternalLoginInformation: + type: object StsAuthRequest: type: object @@ -1821,7 +1821,7 @@ paths: default: $ref: "#/components/responses/ServerError" - /auth/external/login: + /auth/external/principal/login: post: tags: - external @@ -1833,7 +1833,7 @@ paths: content: application/json: schema: - $ref: "#/components/schemas/IdentityToken" + $ref: "#/components/schemas/ExternalLoginInformation" responses: 200: description: successful external login diff --git a/clients/java-legacy/README.md b/clients/java-legacy/README.md index 18598aa5509..78f1cdcbe56 100644 --- a/clients/java-legacy/README.md +++ b/clients/java-legacy/README.md @@ -190,14 +190,14 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**createPresignMultipartUpload**](docs/ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**createUserExternalPrincipal**](docs/ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**deleteUserExternalPrincipal**](docs/ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExperimentalApi* | [**externalPrincipalLogin**](docs/ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +*ExperimentalApi* | [**externalPrincipalLogin**](docs/ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator *ExperimentalApi* | [**getExternalPrincipal**](docs/ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hardResetBranch**](docs/ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**listUserExternalPrincipals**](docs/ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExperimentalApi* | [**sTSLogin**](docs/ExperimentalApi.md#sTSLogin) | **POST** /sts/login | perform a login with STS *ExternalApi* | [**createUserExternalPrincipal**](docs/ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**deleteUserExternalPrincipal**](docs/ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExternalApi* | [**externalPrincipalLogin**](docs/ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +*ExternalApi* | [**externalPrincipalLogin**](docs/ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator *ExternalApi* | [**getExternalPrincipal**](docs/ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**listUserExternalPrincipals**](docs/ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**healthCheck**](docs/HealthCheckApi.md#healthCheck) | **GET** /healthcheck | diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index 9e8f0a826b9..24b1eebabb0 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -174,14 +174,14 @@ paths: - auth x-contentType: application/json x-accepts: application/json - /auth/external/login: + /auth/external/principal/login: post: operationId: externalPrincipalLogin requestBody: content: application/json: schema: - $ref: '#/components/schemas/IdentityToken' + $ref: '#/components/schemas/ExternalLoginInformation' responses: "200": content: @@ -8212,8 +8212,8 @@ components: - access_key_id - secret_access_key type: object - IdentityToken: - type: string + ExternalLoginInformation: + type: object StsAuthRequest: example: code: code diff --git a/clients/java-legacy/docs/ExperimentalApi.md b/clients/java-legacy/docs/ExperimentalApi.md index e94747e6bcf..c58e795d2f9 100644 --- a/clients/java-legacy/docs/ExperimentalApi.md +++ b/clients/java-legacy/docs/ExperimentalApi.md @@ -9,7 +9,7 @@ Method | HTTP request | Description [**createPresignMultipartUpload**](ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload [**createUserExternalPrincipal**](ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**deleteUserExternalPrincipal**](ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**externalPrincipalLogin**](ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +[**externalPrincipalLogin**](ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator [**getExternalPrincipal**](ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id [**hardResetBranch**](ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch [**listUserExternalPrincipals**](ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -533,7 +533,7 @@ public class Example { defaultClient.setBasePath("http://localhost/api/v1"); ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); - String body = "body_example"; // String | + Object body = null; // Object | try { AuthenticationToken result = apiInstance.externalPrincipalLogin(body); System.out.println(result); @@ -552,7 +552,7 @@ public class Example { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **String**| | [optional] + **body** | **Object**| | [optional] ### Return type diff --git a/clients/java-legacy/docs/ExternalApi.md b/clients/java-legacy/docs/ExternalApi.md index 9978767a664..fcb1ce8cb91 100644 --- a/clients/java-legacy/docs/ExternalApi.md +++ b/clients/java-legacy/docs/ExternalApi.md @@ -6,7 +6,7 @@ Method | HTTP request | Description ------------- | ------------- | ------------- [**createUserExternalPrincipal**](ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**deleteUserExternalPrincipal**](ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**externalPrincipalLogin**](ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +[**externalPrincipalLogin**](ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator [**getExternalPrincipal**](ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id [**listUserExternalPrincipals**](ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -221,7 +221,7 @@ public class Example { defaultClient.setBasePath("http://localhost/api/v1"); ExternalApi apiInstance = new ExternalApi(defaultClient); - String body = "body_example"; // String | + Object body = null; // Object | try { AuthenticationToken result = apiInstance.externalPrincipalLogin(body); System.out.println(result); @@ -240,7 +240,7 @@ public class Example { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **String**| | [optional] + **body** | **Object**| | [optional] ### Return type diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java index cfd0a642fa3..641188644b5 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java @@ -862,11 +862,11 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { Object localVarPostBody = body; // create path and map variables - String localVarPath = "/auth/external/login"; + String localVarPath = "/auth/external/principal/login"; List localVarQueryParams = new ArrayList(); List localVarCollectionQueryParams = new ArrayList(); @@ -893,7 +893,7 @@ public okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _c } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(String body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginCall(body, _callback); @@ -916,7 +916,7 @@ private okhttp3.Call externalPrincipalLoginValidateBeforeCall(String body, final 0 Internal Server Error - */ - public AuthenticationToken externalPrincipalLogin(String body) throws ApiException { + public AuthenticationToken externalPrincipalLogin(Object body) throws ApiException { ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); return localVarResp.getData(); } @@ -936,7 +936,7 @@ public AuthenticationToken externalPrincipalLogin(String body) throws ApiExcepti 0 Internal Server Error - */ - public ApiResponse externalPrincipalLoginWithHttpInfo(String body) throws ApiException { + public ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); @@ -958,7 +958,7 @@ public ApiResponse externalPrincipalLoginWithHttpInfo(Strin 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginAsync(String body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java index 87bb086198c..ac31a73c60b 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java @@ -355,11 +355,11 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { Object localVarPostBody = body; // create path and map variables - String localVarPath = "/auth/external/login"; + String localVarPath = "/auth/external/principal/login"; List localVarQueryParams = new ArrayList(); List localVarCollectionQueryParams = new ArrayList(); @@ -386,7 +386,7 @@ public okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _c } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(String body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginCall(body, _callback); @@ -409,7 +409,7 @@ private okhttp3.Call externalPrincipalLoginValidateBeforeCall(String body, final 0 Internal Server Error - */ - public AuthenticationToken externalPrincipalLogin(String body) throws ApiException { + public AuthenticationToken externalPrincipalLogin(Object body) throws ApiException { ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); return localVarResp.getData(); } @@ -429,7 +429,7 @@ public AuthenticationToken externalPrincipalLogin(String body) throws ApiExcepti 0 Internal Server Error - */ - public ApiResponse externalPrincipalLoginWithHttpInfo(String body) throws ApiException { + public ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); @@ -451,7 +451,7 @@ public ApiResponse externalPrincipalLoginWithHttpInfo(Strin 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginAsync(String body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java index 7fe4c4400c1..d3ba40a9955 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java @@ -141,7 +141,7 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - String body = null; + Object body = null; AuthenticationToken response = api.externalPrincipalLogin(body); // TODO: test validations } diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java index 8f4c0d6de3d..78ebb40a433 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java @@ -79,7 +79,7 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - String body = null; + Object body = null; AuthenticationToken response = api.externalPrincipalLogin(body); // TODO: test validations } diff --git a/clients/java/README.md b/clients/java/README.md index 1f762cfdaa9..ddd800941bc 100644 --- a/clients/java/README.md +++ b/clients/java/README.md @@ -198,14 +198,14 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**createPresignMultipartUpload**](docs/ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**createUserExternalPrincipal**](docs/ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**deleteUserExternalPrincipal**](docs/ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExperimentalApi* | [**externalPrincipalLogin**](docs/ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +*ExperimentalApi* | [**externalPrincipalLogin**](docs/ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator *ExperimentalApi* | [**getExternalPrincipal**](docs/ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hardResetBranch**](docs/ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**listUserExternalPrincipals**](docs/ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExperimentalApi* | [**sTSLogin**](docs/ExperimentalApi.md#sTSLogin) | **POST** /sts/login | perform a login with STS *ExternalApi* | [**createUserExternalPrincipal**](docs/ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**deleteUserExternalPrincipal**](docs/ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExternalApi* | [**externalPrincipalLogin**](docs/ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator +*ExternalApi* | [**externalPrincipalLogin**](docs/ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator *ExternalApi* | [**getExternalPrincipal**](docs/ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**listUserExternalPrincipals**](docs/ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**healthCheck**](docs/HealthCheckApi.md#healthCheck) | **GET** /healthcheck | diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index c768e79a712..2ecbcd85de3 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -174,14 +174,14 @@ paths: - auth x-content-type: application/json x-accepts: application/json - /auth/external/login: + /auth/external/principal/login: post: operationId: externalPrincipalLogin requestBody: content: application/json: schema: - $ref: '#/components/schemas/IdentityToken' + $ref: '#/components/schemas/ExternalLoginInformation' responses: "200": content: @@ -8186,8 +8186,8 @@ components: - access_key_id - secret_access_key type: object - IdentityToken: - type: string + ExternalLoginInformation: + type: object StsAuthRequest: example: code: code diff --git a/clients/java/docs/ExperimentalApi.md b/clients/java/docs/ExperimentalApi.md index 106dbcf6978..8c0543f7b8a 100644 --- a/clients/java/docs/ExperimentalApi.md +++ b/clients/java/docs/ExperimentalApi.md @@ -9,7 +9,7 @@ All URIs are relative to */api/v1* | [**createPresignMultipartUpload**](ExperimentalApi.md#createPresignMultipartUpload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload | | [**createUserExternalPrincipal**](ExperimentalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user | | [**deleteUserExternalPrincipal**](ExperimentalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user | -| [**externalPrincipalLogin**](ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator | +| [**externalPrincipalLogin**](ExperimentalApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator | | [**getExternalPrincipal**](ExperimentalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id | | [**hardResetBranch**](ExperimentalApi.md#hardResetBranch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch | | [**listUserExternalPrincipals**](ExperimentalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user | @@ -542,7 +542,7 @@ public class Example { defaultClient.setBasePath("/api/v1"); ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); - String body = "body_example"; // String | + Object body = null; // Object | try { AuthenticationToken result = apiInstance.externalPrincipalLogin() .body(body) @@ -563,7 +563,7 @@ public class Example { | Name | Type | Description | Notes | |------------- | ------------- | ------------- | -------------| -| **body** | **String**| | [optional] | +| **body** | **Object**| | [optional] | ### Return type diff --git a/clients/java/docs/ExternalApi.md b/clients/java/docs/ExternalApi.md index c214caf5f16..77f8c489a7c 100644 --- a/clients/java/docs/ExternalApi.md +++ b/clients/java/docs/ExternalApi.md @@ -6,7 +6,7 @@ All URIs are relative to */api/v1* |------------- | ------------- | -------------| | [**createUserExternalPrincipal**](ExternalApi.md#createUserExternalPrincipal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user | | [**deleteUserExternalPrincipal**](ExternalApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user | -| [**externalPrincipalLogin**](ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/login | perform a login using an external authenticator | +| [**externalPrincipalLogin**](ExternalApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator | | [**getExternalPrincipal**](ExternalApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id | | [**listUserExternalPrincipals**](ExternalApi.md#listUserExternalPrincipals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user | @@ -224,7 +224,7 @@ public class Example { defaultClient.setBasePath("/api/v1"); ExternalApi apiInstance = new ExternalApi(defaultClient); - String body = "body_example"; // String | + Object body = null; // Object | try { AuthenticationToken result = apiInstance.externalPrincipalLogin() .body(body) @@ -245,7 +245,7 @@ public class Example { | Name | Type | Description | Notes | |------------- | ------------- | ------------- | -------------| -| **body** | **String**| | [optional] | +| **body** | **Object**| | [optional] | ### Return type diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java index c9b75f14b01..d1c66eb8bf6 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java @@ -1111,7 +1111,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } - private okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -1128,7 +1128,7 @@ private okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _ Object localVarPostBody = body; // create path and map variables - String localVarPath = "/auth/external/login"; + String localVarPath = "/auth/external/principal/login"; List localVarQueryParams = new ArrayList(); List localVarCollectionQueryParams = new ArrayList(); @@ -1157,19 +1157,19 @@ private okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _ } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(String body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { return externalPrincipalLoginCall(body, _callback); } - private ApiResponse externalPrincipalLoginWithHttpInfo(String body) throws ApiException { + private ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalPrincipalLoginAsync(String body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); @@ -1178,7 +1178,7 @@ private okhttp3.Call externalPrincipalLoginAsync(String body, final ApiCallback< } public class APIexternalPrincipalLoginRequest { - private String body; + private Object body; private APIexternalPrincipalLoginRequest() { } @@ -1188,7 +1188,7 @@ private APIexternalPrincipalLoginRequest() { * @param body (optional) * @return APIexternalPrincipalLoginRequest */ - public APIexternalPrincipalLoginRequest body(String body) { + public APIexternalPrincipalLoginRequest body(Object body) { this.body = body; return this; } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java index 5634455aec0..395755ab218 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java @@ -453,7 +453,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } - private okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -470,7 +470,7 @@ private okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _ Object localVarPostBody = body; // create path and map variables - String localVarPath = "/auth/external/login"; + String localVarPath = "/auth/external/principal/login"; List localVarQueryParams = new ArrayList(); List localVarCollectionQueryParams = new ArrayList(); @@ -499,19 +499,19 @@ private okhttp3.Call externalPrincipalLoginCall(String body, final ApiCallback _ } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(String body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { return externalPrincipalLoginCall(body, _callback); } - private ApiResponse externalPrincipalLoginWithHttpInfo(String body) throws ApiException { + private ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalPrincipalLoginAsync(String body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); @@ -520,7 +520,7 @@ private okhttp3.Call externalPrincipalLoginAsync(String body, final ApiCallback< } public class APIexternalPrincipalLoginRequest { - private String body; + private Object body; private APIexternalPrincipalLoginRequest() { } @@ -530,7 +530,7 @@ private APIexternalPrincipalLoginRequest() { * @param body (optional) * @return APIexternalPrincipalLoginRequest */ - public APIexternalPrincipalLoginRequest body(String body) { + public APIexternalPrincipalLoginRequest body(Object body) { this.body = body; return this; } diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java index 9a30d7212fa..afd8d56e48e 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java @@ -137,7 +137,7 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - String body = null; + Object body = null; AuthenticationToken response = api.externalPrincipalLogin() .body(body) .execute(); diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java index 21feb97232a..405aff8353e 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java @@ -72,7 +72,7 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - String body = null; + Object body = null; AuthenticationToken response = api.externalPrincipalLogin() .body(body) .execute(); diff --git a/clients/python-legacy/README.md b/clients/python-legacy/README.md index e7ee298196b..2690c1c4618 100644 --- a/clients/python-legacy/README.md +++ b/clients/python-legacy/README.md @@ -171,14 +171,14 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**create_presign_multipart_upload**](docs/ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**create_user_external_principal**](docs/ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**delete_user_external_principal**](docs/ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExperimentalApi* | [**external_principal_login**](docs/ExperimentalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator +*ExperimentalApi* | [**external_principal_login**](docs/ExperimentalApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator *ExperimentalApi* | [**get_external_principal**](docs/ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hard_reset_branch**](docs/ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**list_user_external_principals**](docs/ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExperimentalApi* | [**s_ts_login**](docs/ExperimentalApi.md#s_ts_login) | **POST** /sts/login | perform a login with STS *ExternalApi* | [**create_user_external_principal**](docs/ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**delete_user_external_principal**](docs/ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExternalApi* | [**external_principal_login**](docs/ExternalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator +*ExternalApi* | [**external_principal_login**](docs/ExternalApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator *ExternalApi* | [**get_external_principal**](docs/ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**list_user_external_principals**](docs/ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**health_check**](docs/HealthCheckApi.md#health_check) | **GET** /healthcheck | diff --git a/clients/python-legacy/docs/ExperimentalApi.md b/clients/python-legacy/docs/ExperimentalApi.md index 23517d4080f..f02c5718b8d 100644 --- a/clients/python-legacy/docs/ExperimentalApi.md +++ b/clients/python-legacy/docs/ExperimentalApi.md @@ -9,7 +9,7 @@ Method | HTTP request | Description [**create_presign_multipart_upload**](ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload [**create_user_external_principal**](ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**external_principal_login**](ExperimentalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator +[**external_principal_login**](ExperimentalApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator [**get_external_principal**](ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**hard_reset_branch**](ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch [**list_user_external_principals**](ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -673,7 +673,7 @@ configuration = lakefs_client.Configuration( with lakefs_client.ApiClient() as api_client: # Create an instance of the API class api_instance = experimental_api.ExperimentalApi(api_client) - body = "body_example" # str | (optional) + body = {} # {str: (bool, date, datetime, dict, float, int, list, str, none_type)} | (optional) # example passing only required values which don't have defaults set # and optional values @@ -690,7 +690,7 @@ with lakefs_client.ApiClient() as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **str**| | [optional] + **body** | **{str: (bool, date, datetime, dict, float, int, list, str, none_type)}**| | [optional] ### Return type diff --git a/clients/python-legacy/docs/ExternalApi.md b/clients/python-legacy/docs/ExternalApi.md index effd3c4579a..7ac56e65004 100644 --- a/clients/python-legacy/docs/ExternalApi.md +++ b/clients/python-legacy/docs/ExternalApi.md @@ -6,7 +6,7 @@ Method | HTTP request | Description ------------- | ------------- | ------------- [**create_user_external_principal**](ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**external_principal_login**](ExternalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator +[**external_principal_login**](ExternalApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator [**get_external_principal**](ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**list_user_external_principals**](ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -271,7 +271,7 @@ configuration = lakefs_client.Configuration( with lakefs_client.ApiClient() as api_client: # Create an instance of the API class api_instance = external_api.ExternalApi(api_client) - body = "body_example" # str | (optional) + body = {} # {str: (bool, date, datetime, dict, float, int, list, str, none_type)} | (optional) # example passing only required values which don't have defaults set # and optional values @@ -288,7 +288,7 @@ with lakefs_client.ApiClient() as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **str**| | [optional] + **body** | **{str: (bool, date, datetime, dict, float, int, list, str, none_type)}**| | [optional] ### Return type diff --git a/clients/python-legacy/lakefs_client/api/experimental_api.py b/clients/python-legacy/lakefs_client/api/experimental_api.py index 6917ed0ffd3..68fdb56fb69 100644 --- a/clients/python-legacy/lakefs_client/api/experimental_api.py +++ b/clients/python-legacy/lakefs_client/api/experimental_api.py @@ -408,7 +408,7 @@ def __init__(self, api_client=None): settings={ 'response_type': (AuthenticationToken,), 'auth': [], - 'endpoint_path': '/auth/external/login', + 'endpoint_path': '/auth/external/principal/login', 'operation_id': 'external_principal_login', 'http_method': 'POST', 'servers': None, @@ -432,7 +432,7 @@ def __init__(self, api_client=None): }, 'openapi_types': { 'body': - (str,), + ({str: (bool, date, datetime, dict, float, int, list, str, none_type)},), }, 'attribute_map': { }, @@ -1092,7 +1092,7 @@ def external_principal_login( Keyword Args: - body (str): [optional] + body ({str: (bool, date, datetime, dict, float, int, list, str, none_type)}): [optional] _return_http_data_only (bool): response data without head status code and headers. Default is True. _preload_content (bool): if False, the urllib3.HTTPResponse object diff --git a/clients/python-legacy/lakefs_client/api/external_api.py b/clients/python-legacy/lakefs_client/api/external_api.py index 4f80a8f2c3b..0155b3e5d19 100644 --- a/clients/python-legacy/lakefs_client/api/external_api.py +++ b/clients/python-legacy/lakefs_client/api/external_api.py @@ -172,7 +172,7 @@ def __init__(self, api_client=None): settings={ 'response_type': (AuthenticationToken,), 'auth': [], - 'endpoint_path': '/auth/external/login', + 'endpoint_path': '/auth/external/principal/login', 'operation_id': 'external_principal_login', 'http_method': 'POST', 'servers': None, @@ -196,7 +196,7 @@ def __init__(self, api_client=None): }, 'openapi_types': { 'body': - (str,), + ({str: (bool, date, datetime, dict, float, int, list, str, none_type)},), }, 'attribute_map': { }, @@ -501,7 +501,7 @@ def external_principal_login( Keyword Args: - body (str): [optional] + body ({str: (bool, date, datetime, dict, float, int, list, str, none_type)}): [optional] _return_http_data_only (bool): response data without head status code and headers. Default is True. _preload_content (bool): if False, the urllib3.HTTPResponse object diff --git a/clients/python/README.md b/clients/python/README.md index 2a4d14471cc..3b53e933bac 100644 --- a/clients/python/README.md +++ b/clients/python/README.md @@ -174,14 +174,14 @@ Class | Method | HTTP request | Description *ExperimentalApi* | [**create_presign_multipart_upload**](docs/ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload *ExperimentalApi* | [**create_user_external_principal**](docs/ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExperimentalApi* | [**delete_user_external_principal**](docs/ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExperimentalApi* | [**external_principal_login**](docs/ExperimentalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator +*ExperimentalApi* | [**external_principal_login**](docs/ExperimentalApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator *ExperimentalApi* | [**get_external_principal**](docs/ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExperimentalApi* | [**hard_reset_branch**](docs/ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch *ExperimentalApi* | [**list_user_external_principals**](docs/ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *ExperimentalApi* | [**s_ts_login**](docs/ExperimentalApi.md#s_ts_login) | **POST** /sts/login | perform a login with STS *ExternalApi* | [**create_user_external_principal**](docs/ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user *ExternalApi* | [**delete_user_external_principal**](docs/ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -*ExternalApi* | [**external_principal_login**](docs/ExternalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator +*ExternalApi* | [**external_principal_login**](docs/ExternalApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator *ExternalApi* | [**get_external_principal**](docs/ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id *ExternalApi* | [**list_user_external_principals**](docs/ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user *HealthCheckApi* | [**health_check**](docs/HealthCheckApi.md#health_check) | **GET** /healthcheck | diff --git a/clients/python/docs/ExperimentalApi.md b/clients/python/docs/ExperimentalApi.md index 16463886d01..7d698d86b45 100644 --- a/clients/python/docs/ExperimentalApi.md +++ b/clients/python/docs/ExperimentalApi.md @@ -9,7 +9,7 @@ Method | HTTP request | Description [**create_presign_multipart_upload**](ExperimentalApi.md#create_presign_multipart_upload) | **POST** /repositories/{repository}/branches/{branch}/staging/pmpu | Initiate a multipart upload [**create_user_external_principal**](ExperimentalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExperimentalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**external_principal_login**](ExperimentalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator +[**external_principal_login**](ExperimentalApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator [**get_external_principal**](ExperimentalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**hard_reset_branch**](ExperimentalApi.md#hard_reset_branch) | **PUT** /repositories/{repository}/branches/{branch}/hard_reset | hard reset branch [**list_user_external_principals**](ExperimentalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -626,7 +626,7 @@ configuration = lakefs_sdk.Configuration( with lakefs_sdk.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = lakefs_sdk.ExperimentalApi(api_client) - body = 'body_example' # str | (optional) + body = None # object | (optional) try: # perform a login using an external authenticator @@ -644,7 +644,7 @@ with lakefs_sdk.ApiClient(configuration) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **str**| | [optional] + **body** | **object**| | [optional] ### Return type diff --git a/clients/python/docs/ExternalApi.md b/clients/python/docs/ExternalApi.md index 47191d9e257..5729e72d23f 100644 --- a/clients/python/docs/ExternalApi.md +++ b/clients/python/docs/ExternalApi.md @@ -6,7 +6,7 @@ Method | HTTP request | Description ------------- | ------------- | ------------- [**create_user_external_principal**](ExternalApi.md#create_user_external_principal) | **POST** /auth/users/{userId}/external/principals | attach external principal to user [**delete_user_external_principal**](ExternalApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user -[**external_principal_login**](ExternalApi.md#external_principal_login) | **POST** /auth/external/login | perform a login using an external authenticator +[**external_principal_login**](ExternalApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator [**get_external_principal**](ExternalApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id [**list_user_external_principals**](ExternalApi.md#list_user_external_principals) | **GET** /auth/users/{userId}/external/principals/ls | list user external policies attached to a user @@ -260,7 +260,7 @@ configuration = lakefs_sdk.Configuration( with lakefs_sdk.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = lakefs_sdk.ExternalApi(api_client) - body = 'body_example' # str | (optional) + body = None # object | (optional) try: # perform a login using an external authenticator @@ -278,7 +278,7 @@ with lakefs_sdk.ApiClient(configuration) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **str**| | [optional] + **body** | **object**| | [optional] ### Return type diff --git a/clients/python/lakefs_sdk/api/experimental_api.py b/clients/python/lakefs_sdk/api/experimental_api.py index b8d8c12334f..a28e891b0fd 100644 --- a/clients/python/lakefs_sdk/api/experimental_api.py +++ b/clients/python/lakefs_sdk/api/experimental_api.py @@ -22,7 +22,7 @@ from pydantic import Field, StrictBool, StrictInt, StrictStr, conint -from typing import Optional +from typing import Any, Dict, Optional from lakefs_sdk.models.abort_presign_multipart_upload import AbortPresignMultipartUpload from lakefs_sdk.models.authentication_token import AuthenticationToken @@ -882,7 +882,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri _request_auth=_params.get('_request_auth')) @validate_arguments - def external_principal_login(self, body : Optional[StrictStr] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an @@ -892,7 +892,7 @@ def external_principal_login(self, body : Optional[StrictStr] = None, **kwargs) >>> result = thread.get() :param body: - :type body: str + :type body: object :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _request_timeout: timeout setting for this request. If one @@ -910,7 +910,7 @@ def external_principal_login(self, body : Optional[StrictStr] = None, **kwargs) return self.external_principal_login_with_http_info(body, **kwargs) # noqa: E501 @validate_arguments - def external_principal_login_with_http_info(self, body : Optional[StrictStr] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an @@ -920,7 +920,7 @@ def external_principal_login_with_http_info(self, body : Optional[StrictStr] = N >>> result = thread.get() :param body: - :type body: str + :type body: object :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _preload_content: if False, the ApiResponse.data will @@ -1011,7 +1011,7 @@ def external_principal_login_with_http_info(self, body : Optional[StrictStr] = N } return self.api_client.call_api( - '/auth/external/login', 'POST', + '/auth/external/principal/login', 'POST', _path_params, _query_params, _header_params, diff --git a/clients/python/lakefs_sdk/api/external_api.py b/clients/python/lakefs_sdk/api/external_api.py index f37d05e483b..55134bcb7f8 100644 --- a/clients/python/lakefs_sdk/api/external_api.py +++ b/clients/python/lakefs_sdk/api/external_api.py @@ -22,7 +22,7 @@ from pydantic import Field, StrictStr, conint -from typing import Optional +from typing import Any, Dict, Optional from lakefs_sdk.models.authentication_token import AuthenticationToken from lakefs_sdk.models.external_principal import ExternalPrincipal @@ -351,7 +351,7 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri _request_auth=_params.get('_request_auth')) @validate_arguments - def external_principal_login(self, body : Optional[StrictStr] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an @@ -361,7 +361,7 @@ def external_principal_login(self, body : Optional[StrictStr] = None, **kwargs) >>> result = thread.get() :param body: - :type body: str + :type body: object :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _request_timeout: timeout setting for this request. If one @@ -379,7 +379,7 @@ def external_principal_login(self, body : Optional[StrictStr] = None, **kwargs) return self.external_principal_login_with_http_info(body, **kwargs) # noqa: E501 @validate_arguments - def external_principal_login_with_http_info(self, body : Optional[StrictStr] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an @@ -389,7 +389,7 @@ def external_principal_login_with_http_info(self, body : Optional[StrictStr] = N >>> result = thread.get() :param body: - :type body: str + :type body: object :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _preload_content: if False, the ApiResponse.data will @@ -480,7 +480,7 @@ def external_principal_login_with_http_info(self, body : Optional[StrictStr] = N } return self.api_client.call_api( - '/auth/external/login', 'POST', + '/auth/external/principal/login', 'POST', _path_params, _query_params, _header_params, diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index e5e7b11d6c7..7e6a83133b8 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -1051,8 +1051,8 @@ components: secret_access_key: type: string - IdentityToken: - type: string + ExternalLoginInformation: + type: object StsAuthRequest: type: object @@ -1821,7 +1821,7 @@ paths: default: $ref: "#/components/responses/ServerError" - /auth/external/login: + /auth/external/principal/login: post: tags: - external @@ -1833,7 +1833,7 @@ paths: content: application/json: schema: - $ref: "#/components/schemas/IdentityToken" + $ref: "#/components/schemas/ExternalLoginInformation" responses: 200: description: successful external login diff --git a/pkg/authentication/service.go b/pkg/authentication/service.go index bda2bd478b7..6da675f9ab1 100644 --- a/pkg/authentication/service.go +++ b/pkg/authentication/service.go @@ -17,7 +17,7 @@ import ( type Service interface { IsExternalPrincipalsEnabled() bool ValidateSTS(ctx context.Context, code, redirectURI, state string) (*STSResponseData, error) - ExternalPrincipalLogin(ctx context.Context, identityToken string) (string, error) + ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) } type DummyService struct{} @@ -30,7 +30,7 @@ func (d DummyService) ValidateSTS(ctx context.Context, code, redirectURI, state return nil, ErrNotImplemented } -func (d DummyService) ExternalPrincipalLogin(_ context.Context, _ string) (string, error) { +func (d DummyService) ExternalPrincipalLogin(_ context.Context, _ map[string]interface{}) (string, error) { return "", ErrNotImplemented } @@ -133,11 +133,11 @@ func (s *APIService) ValidateSTS(ctx context.Context, code, redirectURI, state s }, nil } -func (s *APIService) ExternalPrincipalLogin(ctx context.Context, identityToken string) (string, error) { +func (s *APIService) ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) { if !s.IsExternalPrincipalsEnabled() { return "", fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) } - resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, apiclient.ExternalPrincipalLoginJSONRequestBody(identityToken)) + resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, externalLoginInfo) if err != nil { return "", fmt.Errorf("failed to authenticate user: %w", err) } diff --git a/pkg/authentication/service_test.go b/pkg/authentication/service_test.go index c04ebed97f5..1e6cc3545a4 100644 --- a/pkg/authentication/service_test.go +++ b/pkg/authentication/service_test.go @@ -157,10 +157,10 @@ func NewTestApiService(t *testing.T, validateIDTokenClaims map[string]string, ex func TestAPIAuthService_ExternalLogin(t *testing.T) { mockClient, s := NewTestApiService(t, map[string]string{}, true) ctx := context.Background() - principalId := "arn:aws:sts::123:assumed-role/MyRole/SessionName" - IdentityToken := "IdentityToken" + principalId := "user" + externalLoginInfo := map[string]interface{}{"IdentityToken": "Token"} - mockClient.EXPECT().ExternalPrincipalLoginWithResponse(gomock.Any(), gomock.Eq(apiclient.ExternalPrincipalLoginJSONRequestBody(IdentityToken))).Return( + mockClient.EXPECT().ExternalPrincipalLoginWithResponse(gomock.Any(), gomock.Eq(externalLoginInfo)).Return( &apiclient.ExternalPrincipalLoginResponse{ HTTPResponse: &http.Response{ StatusCode: http.StatusOK, @@ -168,7 +168,7 @@ func TestAPIAuthService_ExternalLogin(t *testing.T) { JSON200: &apiclient.ExternalPrincipal{Id: principalId}, }, nil) - resp, err := s.ExternalPrincipalLogin(ctx, IdentityToken) + resp, err := s.ExternalPrincipalLogin(ctx, externalLoginInfo) require.NoError(t, err) require.Equal(t, principalId, resp) } From 11bee35ccc67624ed0432c4ac787bde155966d3b Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 27 Mar 2024 17:53:19 +0200 Subject: [PATCH 19/33] Fix PR comments --- pkg/api/controller.go | 10 ++++++++-- pkg/config/config.go | 1 + pkg/config/defaults.go | 1 + 3 files changed, 10 insertions(+), 2 deletions(-) diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 5d78ccd7368..0d276cc9fb3 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -573,11 +573,17 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque return } + duration, ok := body["login_expire"].(time.Duration) + if !ok { + duration = c.Config.Auth.LoginDuration + } + if duration > c.Config.Auth.LoginMaxDuration { + c.Logger.WithFields(logging.Fields{"duration": duration, "max_duration": c.Config.Auth.LoginMaxDuration}).Warn("Login duration exceeds maximum allowed, using maximum allowed") + duration = c.Config.Auth.LoginMaxDuration + } loginTime := time.Now() - duration := c.Config.Auth.LoginDuration expires := loginTime.Add(duration) secret := c.Auth.SecretStore().SharedSecret() - tokenString, err := GenerateJWTLogin(secret, *user.FriendlyName, loginTime.Unix(), expires.Unix()) if err != nil { writeError(w, r, http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError)) diff --git a/pkg/config/config.go b/pkg/config/config.go index 24886e55c68..089694f0346 100644 --- a/pkg/config/config.go +++ b/pkg/config/config.go @@ -206,6 +206,7 @@ type Config struct { // server-side logout. LogoutRedirectURL string `mapstructure:"logout_redirect_url"` LoginDuration time.Duration `mapstructure:"login_duration"` + LoginMaxDuration time.Duration `mapstructure:"login_max_duration"` UIConfig struct { RBAC string `mapstructure:"rbac"` LoginURL string `mapstructure:"login_url"` diff --git a/pkg/config/defaults.go b/pkg/config/defaults.go index ed2485dd716..5475877ecfa 100644 --- a/pkg/config/defaults.go +++ b/pkg/config/defaults.go @@ -55,6 +55,7 @@ func setDefaults(cfgType string) { viper.SetDefault("auth.logout_redirect_url", "/auth/login") viper.SetDefault("auth.login_duration", 7*24*time.Hour) + viper.SetDefault("auth.login_max_duration", 14*24*time.Hour) viper.SetDefault("auth.ui_config.rbac", "simplified") viper.SetDefault("auth.ui_config.login_failed_message", "The credentials don't match.") From fec0a344706f2a46c131d3931ed42d6ce666b639 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 27 Mar 2024 18:31:31 +0200 Subject: [PATCH 20/33] Fix PR review --- pkg/api/controller.go | 6 ++++-- pkg/authentication/errors.go | 2 ++ 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 0d276cc9fb3..284d2287923 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -2629,7 +2629,8 @@ func (c *Controller) handleAPIErrorCallback(ctx context.Context, w http.Response case errors.Is(err, block.ErrForbidden), errors.Is(err, graveler.ErrProtectedBranch), - errors.Is(err, graveler.ErrReadOnlyRepository): + errors.Is(err, graveler.ErrReadOnlyRepository), + errors.Is(err, authentication.ErrSessionExpired): cb(w, r, http.StatusForbidden, err) case errors.Is(err, graveler.ErrDirtyBranch), @@ -2678,7 +2679,8 @@ func (c *Controller) handleAPIErrorCallback(ctx context.Context, w http.Response cb(w, r, http.StatusPreconditionFailed, "Precondition failed") case errors.Is(err, authentication.ErrNotImplemented): cb(w, r, http.StatusNotImplemented, "Not implemented") - case errors.Is(err, authentication.ErrInvalidSTS): + case errors.Is(err, authentication.ErrInvalidSTS), + errors.Is(err, authentication.ErrInvalidTokenFormat): cb(w, r, http.StatusUnauthorized, http.StatusText(http.StatusUnauthorized)) case err != nil: c.Logger.WithContext(ctx).WithError(err).Error("API call returned status internal server error") diff --git a/pkg/authentication/errors.go b/pkg/authentication/errors.go index d26a4a10648..db0a62b1a8e 100644 --- a/pkg/authentication/errors.go +++ b/pkg/authentication/errors.go @@ -11,4 +11,6 @@ var ( ErrInsufficientPermissions = errors.New("insufficient permissions") ErrUnexpectedStatusCode = errors.New("unexpected status code") ErrInvalidRequest = errors.New("invalid request") + ErrSessionExpired = errors.New("session expired") + ErrInvalidTokenFormat = errors.New("invalid token format") ) From 2e4d425b34d8a6761832ea969be345b7100fcbde Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Tue, 2 Apr 2024 09:34:59 +0300 Subject: [PATCH 21/33] Add potential status codes --- api/authentication.yml | 18 ++++++++++++++++++ api/swagger.yml | 6 ++++++ clients/java-legacy/api/openapi.yaml | 18 ++++++++++++++++++ clients/java-legacy/docs/ExperimentalApi.md | 3 +++ clients/java-legacy/docs/ExternalApi.md | 3 +++ .../io/lakefs/clients/api/ExperimentalApi.java | 12 ++++++++++++ .../io/lakefs/clients/api/ExternalApi.java | 12 ++++++++++++ clients/java/api/openapi.yaml | 18 ++++++++++++++++++ clients/java/docs/ExperimentalApi.md | 3 +++ clients/java/docs/ExternalApi.md | 3 +++ .../io/lakefs/clients/sdk/ExperimentalApi.java | 15 +++++++++++++++ .../io/lakefs/clients/sdk/ExternalApi.java | 15 +++++++++++++++ clients/python-legacy/docs/ExperimentalApi.md | 3 +++ clients/python-legacy/docs/ExternalApi.md | 3 +++ clients/python/docs/ExperimentalApi.md | 3 +++ clients/python/docs/ExternalApi.md | 3 +++ .../python/lakefs_sdk/api/experimental_api.py | 3 +++ clients/python/lakefs_sdk/api/external_api.py | 3 +++ docs/assets/js/swagger.yml | 6 ++++++ lakefs.yaml | 0 pkg/api/controller.go | 7 +++---- pkg/authentication/service.go | 4 ++-- 22 files changed, 155 insertions(+), 6 deletions(-) create mode 100644 lakefs.yaml diff --git a/api/authentication.yml b/api/authentication.yml index 8f2e5aee9ed..613bded0193 100644 --- a/api/authentication.yml +++ b/api/authentication.yml @@ -72,12 +72,24 @@ components: type: string responses: + BadRequest: + description: Bad Request + content: + application/json: + schema: + $ref: "#/components/schemas/Error" Unauthorized: description: Unauthorized content: application/json: schema: $ref: "#/components/schemas/Error" + Forbidden: + description: Forbidden + content: + application/json: + schema: + $ref: "#/components/schemas/Error" ServerError: description: Internal Server Error content: @@ -359,8 +371,14 @@ paths: application/json: schema: $ref: "#/components/schemas/ExternalPrincipal" + 400: + $ref: "#/components/responses/BadRequest" 401: $ref: "#/components/responses/Unauthorized" + 403: + $ref: "#/components/responses/Forbidden" + 404: + $ref: "#/components/responses/NotFound" 420: description: too many requests default: diff --git a/api/swagger.yml b/api/swagger.yml index 7e6a83133b8..54c9f8e6187 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -1841,8 +1841,14 @@ paths: application/json: schema: $ref: "#/components/schemas/AuthenticationToken" + 400: + $ref: "#/components/responses/BadRequest" 401: $ref: "#/components/responses/Unauthorized" + 403: + $ref: "#/components/responses/Forbidden" + 404: + $ref: "#/components/responses/NotFound" 420: description: too many requests default: diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index 24b1eebabb0..dc8525d1824 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -189,12 +189,30 @@ paths: schema: $ref: '#/components/schemas/AuthenticationToken' description: successful external login + "400": + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + description: Bad Request "401": content: application/json: schema: $ref: '#/components/schemas/Error' description: Unauthorized + "403": + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + description: Forbidden + "404": + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + description: Resource Not Found "420": description: too many requests default: diff --git a/clients/java-legacy/docs/ExperimentalApi.md b/clients/java-legacy/docs/ExperimentalApi.md index c58e795d2f9..7eac311479f 100644 --- a/clients/java-legacy/docs/ExperimentalApi.md +++ b/clients/java-legacy/docs/ExperimentalApi.md @@ -571,7 +571,10 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| **200** | successful external login | - | +**400** | Bad Request | - | **401** | Unauthorized | - | +**403** | Forbidden | - | +**404** | Resource Not Found | - | **420** | too many requests | - | **0** | Internal Server Error | - | diff --git a/clients/java-legacy/docs/ExternalApi.md b/clients/java-legacy/docs/ExternalApi.md index fcb1ce8cb91..23b521b4355 100644 --- a/clients/java-legacy/docs/ExternalApi.md +++ b/clients/java-legacy/docs/ExternalApi.md @@ -259,7 +259,10 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| **200** | successful external login | - | +**400** | Bad Request | - | **401** | Unauthorized | - | +**403** | Forbidden | - | +**404** | Resource Not Found | - | **420** | too many requests | - | **0** | Internal Server Error | - | diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java index 641188644b5..94d8b97aa5b 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java @@ -857,7 +857,10 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -911,7 +914,10 @@ private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -931,7 +937,10 @@ public AuthenticationToken externalPrincipalLogin(Object body) throws ApiExcepti + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -953,7 +962,10 @@ public ApiResponse externalPrincipalLoginWithHttpInfo(Objec + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java index ac31a73c60b..954c23c1213 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java @@ -350,7 +350,10 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -404,7 +407,10 @@ private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -424,7 +430,10 @@ public AuthenticationToken externalPrincipalLogin(Object body) throws ApiExcepti + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -446,7 +455,10 @@ public ApiResponse externalPrincipalLoginWithHttpInfo(Objec + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index 2ecbcd85de3..ee628608c66 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -189,12 +189,30 @@ paths: schema: $ref: '#/components/schemas/AuthenticationToken' description: successful external login + "400": + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + description: Bad Request "401": content: application/json: schema: $ref: '#/components/schemas/Error' description: Unauthorized + "403": + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + description: Forbidden + "404": + content: + application/json: + schema: + $ref: '#/components/schemas/Error' + description: Resource Not Found "420": description: too many requests default: diff --git a/clients/java/docs/ExperimentalApi.md b/clients/java/docs/ExperimentalApi.md index 8c0543f7b8a..2f4541d3d9e 100644 --- a/clients/java/docs/ExperimentalApi.md +++ b/clients/java/docs/ExperimentalApi.md @@ -582,7 +582,10 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| | **200** | successful external login | - | +| **400** | Bad Request | - | | **401** | Unauthorized | - | +| **403** | Forbidden | - | +| **404** | Resource Not Found | - | | **420** | too many requests | - | | **0** | Internal Server Error | - | diff --git a/clients/java/docs/ExternalApi.md b/clients/java/docs/ExternalApi.md index 77f8c489a7c..878d32e26f9 100644 --- a/clients/java/docs/ExternalApi.md +++ b/clients/java/docs/ExternalApi.md @@ -264,7 +264,10 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| | **200** | successful external login | - | +| **400** | Bad Request | - | | **401** | Unauthorized | - | +| **403** | Forbidden | - | +| **404** | Resource Not Found | - | | **420** | too many requests | - | | **0** | Internal Server Error | - | diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java index d1c66eb8bf6..e1a156c0de4 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java @@ -1202,7 +1202,10 @@ public APIexternalPrincipalLoginRequest body(Object body) { + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -1219,7 +1222,10 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -1237,7 +1243,10 @@ public AuthenticationToken execute() throws ApiException { + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -1255,7 +1264,10 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -1273,7 +1285,10 @@ public okhttp3.Call executeAsync(final ApiCallback _callbac + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java index 395755ab218..a940f10c3cf 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java @@ -544,7 +544,10 @@ public APIexternalPrincipalLoginRequest body(Object body) { + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -561,7 +564,10 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -579,7 +585,10 @@ public AuthenticationToken execute() throws ApiException { + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -597,7 +606,10 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
@@ -615,7 +627,10 @@ public okhttp3.Call executeAsync(final ApiCallback _callbac + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
diff --git a/clients/python-legacy/docs/ExperimentalApi.md b/clients/python-legacy/docs/ExperimentalApi.md index f02c5718b8d..cc9a5a547b0 100644 --- a/clients/python-legacy/docs/ExperimentalApi.md +++ b/clients/python-legacy/docs/ExperimentalApi.md @@ -711,7 +711,10 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| **200** | successful external login | - | +**400** | Bad Request | - | **401** | Unauthorized | - | +**403** | Forbidden | - | +**404** | Resource Not Found | - | **420** | too many requests | - | **0** | Internal Server Error | - | diff --git a/clients/python-legacy/docs/ExternalApi.md b/clients/python-legacy/docs/ExternalApi.md index 7ac56e65004..6f952bae74f 100644 --- a/clients/python-legacy/docs/ExternalApi.md +++ b/clients/python-legacy/docs/ExternalApi.md @@ -309,7 +309,10 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| **200** | successful external login | - | +**400** | Bad Request | - | **401** | Unauthorized | - | +**403** | Forbidden | - | +**404** | Resource Not Found | - | **420** | too many requests | - | **0** | Internal Server Error | - | diff --git a/clients/python/docs/ExperimentalApi.md b/clients/python/docs/ExperimentalApi.md index 7d698d86b45..d4145afc322 100644 --- a/clients/python/docs/ExperimentalApi.md +++ b/clients/python/docs/ExperimentalApi.md @@ -664,7 +664,10 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| **200** | successful external login | - | +**400** | Bad Request | - | **401** | Unauthorized | - | +**403** | Forbidden | - | +**404** | Resource Not Found | - | **420** | too many requests | - | **0** | Internal Server Error | - | diff --git a/clients/python/docs/ExternalApi.md b/clients/python/docs/ExternalApi.md index 5729e72d23f..5b4d3c77162 100644 --- a/clients/python/docs/ExternalApi.md +++ b/clients/python/docs/ExternalApi.md @@ -298,7 +298,10 @@ No authorization required | Status code | Description | Response headers | |-------------|-------------|------------------| **200** | successful external login | - | +**400** | Bad Request | - | **401** | Unauthorized | - | +**403** | Forbidden | - | +**404** | Resource Not Found | - | **420** | too many requests | - | **0** | Internal Server Error | - | diff --git a/clients/python/lakefs_sdk/api/experimental_api.py b/clients/python/lakefs_sdk/api/experimental_api.py index a28e891b0fd..963da83911a 100644 --- a/clients/python/lakefs_sdk/api/experimental_api.py +++ b/clients/python/lakefs_sdk/api/experimental_api.py @@ -1006,7 +1006,10 @@ def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any] _response_types_map = { '200': "AuthenticationToken", + '400': "Error", '401': "Error", + '403': "Error", + '404': "Error", '420': None, } diff --git a/clients/python/lakefs_sdk/api/external_api.py b/clients/python/lakefs_sdk/api/external_api.py index 55134bcb7f8..f2fa019ef77 100644 --- a/clients/python/lakefs_sdk/api/external_api.py +++ b/clients/python/lakefs_sdk/api/external_api.py @@ -475,7 +475,10 @@ def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any] _response_types_map = { '200': "AuthenticationToken", + '400': "Error", '401': "Error", + '403': "Error", + '404': "Error", '420': None, } diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index 7e6a83133b8..54c9f8e6187 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -1841,8 +1841,14 @@ paths: application/json: schema: $ref: "#/components/schemas/AuthenticationToken" + 400: + $ref: "#/components/responses/BadRequest" 401: $ref: "#/components/responses/Unauthorized" + 403: + $ref: "#/components/responses/Forbidden" + 404: + $ref: "#/components/responses/NotFound" 420: description: too many requests default: diff --git a/lakefs.yaml b/lakefs.yaml new file mode 100644 index 00000000000..e69de29bb2d diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 284d2287923..07fe171b927 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -562,7 +562,6 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque writeError(w, r, http.StatusNotImplemented, "Not implemented") return } - c.LogAction(ctx, "external_principal_login", r, "", "", "") principalID, err := c.Authentication.ExternalPrincipalLogin(ctx, body) if c.handleAPIError(ctx, w, r, err) { @@ -2649,7 +2648,8 @@ func (c *Controller) handleAPIErrorCallback(ctx context.Context, w http.Response errors.Is(err, graveler.ErrCherryPickMergeNoParent), errors.Is(err, graveler.ErrInvalidMergeStrategy), errors.Is(err, block.ErrInvalidAddress), - errors.Is(err, block.ErrOperationNotSupported): + errors.Is(err, block.ErrOperationNotSupported), + errors.Is(err, authentication.ErrInvalidTokenFormat): log.Debug("Bad request") cb(w, r, http.StatusBadRequest, err) @@ -2679,8 +2679,7 @@ func (c *Controller) handleAPIErrorCallback(ctx context.Context, w http.Response cb(w, r, http.StatusPreconditionFailed, "Precondition failed") case errors.Is(err, authentication.ErrNotImplemented): cb(w, r, http.StatusNotImplemented, "Not implemented") - case errors.Is(err, authentication.ErrInvalidSTS), - errors.Is(err, authentication.ErrInvalidTokenFormat): + case errors.Is(err, authentication.ErrInvalidSTS): cb(w, r, http.StatusUnauthorized, http.StatusText(http.StatusUnauthorized)) case err != nil: c.Logger.WithContext(ctx).WithError(err).Error("API call returned status internal server error") diff --git a/pkg/authentication/service.go b/pkg/authentication/service.go index 6da675f9ab1..a4c136f6992 100644 --- a/pkg/authentication/service.go +++ b/pkg/authentication/service.go @@ -142,8 +142,8 @@ func (s *APIService) ExternalPrincipalLogin(ctx context.Context, externalLoginIn return "", fmt.Errorf("failed to authenticate user: %w", err) } - if err = s.validateResponse(resp, http.StatusOK); err != nil { - return "", fmt.Errorf("failed to authenticate user: %w", err) + if resp.StatusCode() != http.StatusOK { + return "", fmt.Errorf("failed to authenticate user: %w", ErrInvalidRequest) } return resp.JSON200.Id, nil From 714aba73d598e1ba3610c77ce19675834df51b94 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Tue, 2 Apr 2024 17:26:12 +0300 Subject: [PATCH 22/33] Fix --- api/authentication.yml | 1 + pkg/api/controller.go | 4 ++-- pkg/auth/service.go | 1 + pkg/authentication/service.go | 16 ++++++++-------- pkg/authentication/service_test.go | 8 +++++--- 5 files changed, 17 insertions(+), 13 deletions(-) diff --git a/api/authentication.yml b/api/authentication.yml index 613bded0193..0f2e7779366 100644 --- a/api/authentication.yml +++ b/api/authentication.yml @@ -325,6 +325,7 @@ components: properties: id: type: string + paths: /ldap/login: post: diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 07fe171b927..1f6cfac3dcb 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -563,11 +563,11 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque return } c.LogAction(ctx, "external_principal_login", r, "", "", "") - principalID, err := c.Authentication.ExternalPrincipalLogin(ctx, body) + externalPrincipal, err := c.Authentication.ExternalPrincipalLogin(ctx, body) if c.handleAPIError(ctx, w, r, err) { return } - user, err := c.Auth.GetUserByExternalID(ctx, principalID) + user, err := c.Auth.GetUserByExternalID(ctx, externalPrincipal.Id) if c.handleAPIError(ctx, w, r, err) { return } diff --git a/pkg/auth/service.go b/pkg/auth/service.go index 3f7babd6df4..934c2154ef3 100644 --- a/pkg/auth/service.go +++ b/pkg/auth/service.go @@ -344,6 +344,7 @@ func (s *AuthService) GetUserByEmail(ctx context.Context, email string) (*model. } func (s *AuthService) GetUserByExternalID(ctx context.Context, externalID string) (*model.User, error) { + print("GetUserByExternalID", externalID) return s.getUserByPredicate(ctx, userKey{externalID: externalID}, func(value *model.UserData) bool { return value.ExternalId == externalID }) diff --git a/pkg/authentication/service.go b/pkg/authentication/service.go index a4c136f6992..fd4274eebc5 100644 --- a/pkg/authentication/service.go +++ b/pkg/authentication/service.go @@ -17,7 +17,7 @@ import ( type Service interface { IsExternalPrincipalsEnabled() bool ValidateSTS(ctx context.Context, code, redirectURI, state string) (*STSResponseData, error) - ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) + ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (*apiclient.ExternalPrincipal, error) } type DummyService struct{} @@ -30,8 +30,8 @@ func (d DummyService) ValidateSTS(ctx context.Context, code, redirectURI, state return nil, ErrNotImplemented } -func (d DummyService) ExternalPrincipalLogin(_ context.Context, _ map[string]interface{}) (string, error) { - return "", ErrNotImplemented +func (d DummyService) ExternalPrincipalLogin(_ context.Context, _ map[string]interface{}) (*apiclient.ExternalPrincipal, error) { + return nil, ErrNotImplemented } func (d DummyService) IsExternalPrincipalsEnabled() bool { @@ -133,20 +133,20 @@ func (s *APIService) ValidateSTS(ctx context.Context, code, redirectURI, state s }, nil } -func (s *APIService) ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (string, error) { +func (s *APIService) ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (*apiclient.ExternalPrincipal, error) { if !s.IsExternalPrincipalsEnabled() { - return "", fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) + return nil, fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) } resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, externalLoginInfo) if err != nil { - return "", fmt.Errorf("failed to authenticate user: %w", err) + return nil, fmt.Errorf("failed to authenticate user: %w", err) } if resp.StatusCode() != http.StatusOK { - return "", fmt.Errorf("failed to authenticate user: %w", ErrInvalidRequest) + return nil, fmt.Errorf("failed to authenticate user: %w", ErrInvalidRequest) } - return resp.JSON200.Id, nil + return resp.JSON200, nil } func (s *APIService) IsExternalPrincipalsEnabled() bool { diff --git a/pkg/authentication/service_test.go b/pkg/authentication/service_test.go index 1e6cc3545a4..16799c1f7c6 100644 --- a/pkg/authentication/service_test.go +++ b/pkg/authentication/service_test.go @@ -157,7 +157,8 @@ func NewTestApiService(t *testing.T, validateIDTokenClaims map[string]string, ex func TestAPIAuthService_ExternalLogin(t *testing.T) { mockClient, s := NewTestApiService(t, map[string]string{}, true) ctx := context.Background() - principalId := "user" + principalId := "arn" + userId := "userId" externalLoginInfo := map[string]interface{}{"IdentityToken": "Token"} mockClient.EXPECT().ExternalPrincipalLoginWithResponse(gomock.Any(), gomock.Eq(externalLoginInfo)).Return( @@ -165,10 +166,11 @@ func TestAPIAuthService_ExternalLogin(t *testing.T) { HTTPResponse: &http.Response{ StatusCode: http.StatusOK, }, - JSON200: &apiclient.ExternalPrincipal{Id: principalId}, + JSON200: &apiclient.ExternalPrincipal{Id: principalId, UserId: userId}, }, nil) resp, err := s.ExternalPrincipalLogin(ctx, externalLoginInfo) require.NoError(t, err) - require.Equal(t, principalId, resp) + require.Equal(t, principalId, resp.Id) + require.Equal(t, userId, resp.UserId) } From 8fe9e613210e295495ac2d11da34be81de31aeb1 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Tue, 2 Apr 2024 19:13:47 +0300 Subject: [PATCH 23/33] Fix PR comments --- api/authentication.yml | 7 +- api/swagger.yml | 7 + clients/java-legacy/.openapi-generator/FILES | 3 + clients/java-legacy/README.md | 1 + clients/java-legacy/api/openapi.yaml | 10 + clients/java-legacy/docs/ExperimentalApi.md | 8 +- clients/java-legacy/docs/ExternalApi.md | 8 +- .../docs/ExternalLoginInformation.md | 14 + .../lakefs/clients/api/ExperimentalApi.java | 29 +- .../io/lakefs/clients/api/ExternalApi.java | 29 +- .../api/model/ExternalLoginInformation.java | 127 +++++++ .../clients/api/ExperimentalApiTest.java | 5 +- .../lakefs/clients/api/ExternalApiTest.java | 5 +- .../model/ExternalLoginInformationTest.java | 59 ++++ clients/java/README.md | 1 + clients/java/api/openapi.yaml | 10 + clients/java/docs/ExperimentalApi.md | 8 +- clients/java/docs/ExternalApi.md | 8 +- clients/java/docs/ExternalLoginInformation.md | 14 + .../lakefs/clients/sdk/ExperimentalApi.java | 35 +- .../io/lakefs/clients/sdk/ExternalApi.java | 35 +- .../main/java/io/lakefs/clients/sdk/JSON.java | 1 + .../sdk/model/ExternalLoginInformation.java | 318 ++++++++++++++++++ .../clients/sdk/ExperimentalApiTest.java | 5 +- .../lakefs/clients/sdk/ExternalApiTest.java | 5 +- .../model/ExternalLoginInformationTest.java | 56 +++ .../python-legacy/.openapi-generator/FILES | 3 + clients/python-legacy/README.md | 1 + clients/python-legacy/docs/ExperimentalApi.md | 10 +- clients/python-legacy/docs/ExternalApi.md | 10 +- .../docs/ExternalLoginInformation.md | 13 + .../lakefs_client/api/experimental_api.py | 11 +- .../lakefs_client/api/external_api.py | 11 +- .../model/external_login_information.py | 266 +++++++++++++++ .../lakefs_client/models/__init__.py | 1 + .../test/test_external_login_information.py | 36 ++ clients/python/.openapi-generator/FILES | 3 + clients/python/README.md | 1 + clients/python/docs/ExperimentalApi.md | 9 +- clients/python/docs/ExternalApi.md | 9 +- .../python/docs/ExternalLoginInformation.md | 30 ++ clients/python/lakefs_sdk/__init__.py | 1 + .../python/lakefs_sdk/api/experimental_api.py | 27 +- clients/python/lakefs_sdk/api/external_api.py | 27 +- clients/python/lakefs_sdk/models/__init__.py | 1 + .../models/external_login_information.py | 74 ++++ .../test/test_external_login_information.py | 57 ++++ docs/assets/js/swagger.yml | 7 + pkg/api/controller.go | 15 +- pkg/authentication/service.go | 6 +- 50 files changed, 1286 insertions(+), 151 deletions(-) create mode 100644 clients/java-legacy/docs/ExternalLoginInformation.md create mode 100644 clients/java-legacy/src/main/java/io/lakefs/clients/api/model/ExternalLoginInformation.java create mode 100644 clients/java-legacy/src/test/java/io/lakefs/clients/api/model/ExternalLoginInformationTest.java create mode 100644 clients/java/docs/ExternalLoginInformation.md create mode 100644 clients/java/src/main/java/io/lakefs/clients/sdk/model/ExternalLoginInformation.java create mode 100644 clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java create mode 100644 clients/python-legacy/docs/ExternalLoginInformation.md create mode 100644 clients/python-legacy/lakefs_client/model/external_login_information.py create mode 100644 clients/python-legacy/test/test_external_login_information.py create mode 100644 clients/python/docs/ExternalLoginInformation.md create mode 100644 clients/python/lakefs_sdk/models/external_login_information.py create mode 100644 clients/python/test/test_external_login_information.py diff --git a/api/authentication.yml b/api/authentication.yml index 0f2e7779366..8cfa6869bbc 100644 --- a/api/authentication.yml +++ b/api/authentication.yml @@ -291,9 +291,10 @@ components: properties: external_user_identifier: type: string - description: external_user_identifier is the user DN in LDAP set if user exists with that username and has this password. - ExternalLoginInformation: + description: external_user_identifier is the user DN in LDAP set if user exists with that username and has this password + IdentityRequest: type: object + StsAuthRequest: type: object required: @@ -364,7 +365,7 @@ paths: content: application/json: schema: - $ref: "#/components/schemas/ExternalLoginInformation" + $ref: "#/components/schemas/IdentityRequest" responses: 200: description: successful external login diff --git a/api/swagger.yml b/api/swagger.yml index 54c9f8e6187..25ff0f74d8c 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -1053,6 +1053,13 @@ components: ExternalLoginInformation: type: object + required: + - identityRequest + properties: + token_expiration_duration: + type: integer + identityRequest: + type: object StsAuthRequest: type: object diff --git a/clients/java-legacy/.openapi-generator/FILES b/clients/java-legacy/.openapi-generator/FILES index 392ee20a246..73adf701c38 100644 --- a/clients/java-legacy/.openapi-generator/FILES +++ b/clients/java-legacy/.openapi-generator/FILES @@ -37,6 +37,7 @@ docs/Error.md docs/ErrorNoACL.md docs/ExperimentalApi.md docs/ExternalApi.md +docs/ExternalLoginInformation.md docs/ExternalPrincipal.md docs/ExternalPrincipalCreation.md docs/ExternalPrincipalList.md @@ -186,6 +187,7 @@ src/main/java/io/lakefs/clients/api/model/Diff.java src/main/java/io/lakefs/clients/api/model/DiffList.java src/main/java/io/lakefs/clients/api/model/Error.java src/main/java/io/lakefs/clients/api/model/ErrorNoACL.java +src/main/java/io/lakefs/clients/api/model/ExternalLoginInformation.java src/main/java/io/lakefs/clients/api/model/ExternalPrincipal.java src/main/java/io/lakefs/clients/api/model/ExternalPrincipalCreation.java src/main/java/io/lakefs/clients/api/model/ExternalPrincipalList.java @@ -300,6 +302,7 @@ src/test/java/io/lakefs/clients/api/model/DiffListTest.java src/test/java/io/lakefs/clients/api/model/DiffTest.java src/test/java/io/lakefs/clients/api/model/ErrorNoACLTest.java src/test/java/io/lakefs/clients/api/model/ErrorTest.java +src/test/java/io/lakefs/clients/api/model/ExternalLoginInformationTest.java src/test/java/io/lakefs/clients/api/model/ExternalPrincipalCreationTest.java src/test/java/io/lakefs/clients/api/model/ExternalPrincipalListTest.java src/test/java/io/lakefs/clients/api/model/ExternalPrincipalTest.java diff --git a/clients/java-legacy/README.md b/clients/java-legacy/README.md index 78f1cdcbe56..cc480682b2f 100644 --- a/clients/java-legacy/README.md +++ b/clients/java-legacy/README.md @@ -295,6 +295,7 @@ Class | Method | HTTP request | Description - [DiffList](docs/DiffList.md) - [Error](docs/Error.md) - [ErrorNoACL](docs/ErrorNoACL.md) + - [ExternalLoginInformation](docs/ExternalLoginInformation.md) - [ExternalPrincipal](docs/ExternalPrincipal.md) - [ExternalPrincipalCreation](docs/ExternalPrincipalCreation.md) - [ExternalPrincipalList](docs/ExternalPrincipalList.md) diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index dc8525d1824..cfd7c9a6af3 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -8231,6 +8231,16 @@ components: - secret_access_key type: object ExternalLoginInformation: + example: + identityRequest: '{}' + token_expiration_duration: 0 + properties: + token_expiration_duration: + type: integer + identityRequest: + type: object + required: + - identityRequest type: object StsAuthRequest: example: diff --git a/clients/java-legacy/docs/ExperimentalApi.md b/clients/java-legacy/docs/ExperimentalApi.md index 7eac311479f..87c1215972d 100644 --- a/clients/java-legacy/docs/ExperimentalApi.md +++ b/clients/java-legacy/docs/ExperimentalApi.md @@ -514,7 +514,7 @@ null (empty response body) # **externalPrincipalLogin** -> AuthenticationToken externalPrincipalLogin(body) +> AuthenticationToken externalPrincipalLogin(externalLoginInformation) perform a login using an external authenticator @@ -533,9 +533,9 @@ public class Example { defaultClient.setBasePath("http://localhost/api/v1"); ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); - Object body = null; // Object | + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | try { - AuthenticationToken result = apiInstance.externalPrincipalLogin(body); + AuthenticationToken result = apiInstance.externalPrincipalLogin(externalLoginInformation); System.out.println(result); } catch (ApiException e) { System.err.println("Exception when calling ExperimentalApi#externalPrincipalLogin"); @@ -552,7 +552,7 @@ public class Example { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **Object**| | [optional] + **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] ### Return type diff --git a/clients/java-legacy/docs/ExternalApi.md b/clients/java-legacy/docs/ExternalApi.md index 23b521b4355..01e917d344a 100644 --- a/clients/java-legacy/docs/ExternalApi.md +++ b/clients/java-legacy/docs/ExternalApi.md @@ -202,7 +202,7 @@ null (empty response body) # **externalPrincipalLogin** -> AuthenticationToken externalPrincipalLogin(body) +> AuthenticationToken externalPrincipalLogin(externalLoginInformation) perform a login using an external authenticator @@ -221,9 +221,9 @@ public class Example { defaultClient.setBasePath("http://localhost/api/v1"); ExternalApi apiInstance = new ExternalApi(defaultClient); - Object body = null; // Object | + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | try { - AuthenticationToken result = apiInstance.externalPrincipalLogin(body); + AuthenticationToken result = apiInstance.externalPrincipalLogin(externalLoginInformation); System.out.println(result); } catch (ApiException e) { System.err.println("Exception when calling ExternalApi#externalPrincipalLogin"); @@ -240,7 +240,7 @@ public class Example { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **Object**| | [optional] + **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] ### Return type diff --git a/clients/java-legacy/docs/ExternalLoginInformation.md b/clients/java-legacy/docs/ExternalLoginInformation.md new file mode 100644 index 00000000000..a5a627e1924 --- /dev/null +++ b/clients/java-legacy/docs/ExternalLoginInformation.md @@ -0,0 +1,14 @@ + + +# ExternalLoginInformation + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**tokenExpirationDuration** | **Integer** | | [optional] +**identityRequest** | **Object** | | + + + diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java index 94d8b97aa5b..476ef302c83 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExperimentalApi.java @@ -31,6 +31,7 @@ import io.lakefs.clients.api.model.AuthenticationToken; import io.lakefs.clients.api.model.CompletePresignMultipartUpload; import io.lakefs.clients.api.model.Error; +import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -849,7 +850,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ } /** * Build call for externalPrincipalLogin - * @param body (optional) + * @param externalLoginInformation (optional) * @param _callback Callback for upload/download progress * @return Call to execute * @throws ApiException If fail to serialize the request body object @@ -865,8 +866,8 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { - Object localVarPostBody = body; + public okhttp3.Call externalPrincipalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + Object localVarPostBody = externalLoginInformation; // create path and map variables String localVarPath = "/auth/external/principal/login"; @@ -896,10 +897,10 @@ public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _c } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalPrincipalLoginCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginCall(externalLoginInformation, _callback); return localVarCall; } @@ -907,7 +908,7 @@ private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final /** * perform a login using an external authenticator * - * @param body (optional) + * @param externalLoginInformation (optional) * @return AuthenticationToken * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -922,15 +923,15 @@ private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final 0 Internal Server Error - */ - public AuthenticationToken externalPrincipalLogin(Object body) throws ApiException { - ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); + public AuthenticationToken externalPrincipalLogin(ExternalLoginInformation externalLoginInformation) throws ApiException { + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(externalLoginInformation); return localVarResp.getData(); } /** * perform a login using an external authenticator * - * @param body (optional) + * @param externalLoginInformation (optional) * @return ApiResponse<AuthenticationToken> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -945,8 +946,8 @@ public AuthenticationToken externalPrincipalLogin(Object body) throws ApiExcepti 0 Internal Server Error - */ - public ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { - okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); + public ApiResponse externalPrincipalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -954,7 +955,7 @@ public ApiResponse externalPrincipalLoginWithHttpInfo(Objec /** * perform a login using an external authenticator (asynchronously) * - * @param body (optional) + * @param externalLoginInformation (optional) * @param _callback The callback to be executed when the API call finishes * @return The request call * @throws ApiException If fail to process the API call, e.g. serializing the request body object @@ -970,9 +971,9 @@ public ApiResponse externalPrincipalLoginWithHttpInfo(Objec 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java index 954c23c1213..1200d0ca666 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/ExternalApi.java @@ -29,6 +29,7 @@ import io.lakefs.clients.api.model.AuthenticationToken; import io.lakefs.clients.api.model.Error; +import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -342,7 +343,7 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ } /** * Build call for externalPrincipalLogin - * @param body (optional) + * @param externalLoginInformation (optional) * @param _callback Callback for upload/download progress * @return Call to execute * @throws ApiException If fail to serialize the request body object @@ -358,8 +359,8 @@ public okhttp3.Call deleteUserExternalPrincipalAsync(String userId, String princ 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { - Object localVarPostBody = body; + public okhttp3.Call externalPrincipalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + Object localVarPostBody = externalLoginInformation; // create path and map variables String localVarPath = "/auth/external/principal/login"; @@ -389,10 +390,10 @@ public okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _c } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalPrincipalLoginCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginCall(externalLoginInformation, _callback); return localVarCall; } @@ -400,7 +401,7 @@ private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final /** * perform a login using an external authenticator * - * @param body (optional) + * @param externalLoginInformation (optional) * @return AuthenticationToken * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -415,15 +416,15 @@ private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final 0 Internal Server Error - */ - public AuthenticationToken externalPrincipalLogin(Object body) throws ApiException { - ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); + public AuthenticationToken externalPrincipalLogin(ExternalLoginInformation externalLoginInformation) throws ApiException { + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(externalLoginInformation); return localVarResp.getData(); } /** * perform a login using an external authenticator * - * @param body (optional) + * @param externalLoginInformation (optional) * @return ApiResponse<AuthenticationToken> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -438,8 +439,8 @@ public AuthenticationToken externalPrincipalLogin(Object body) throws ApiExcepti 0 Internal Server Error - */ - public ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { - okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); + public ApiResponse externalPrincipalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -447,7 +448,7 @@ public ApiResponse externalPrincipalLoginWithHttpInfo(Objec /** * perform a login using an external authenticator (asynchronously) * - * @param body (optional) + * @param externalLoginInformation (optional) * @param _callback The callback to be executed when the API call finishes * @return The request call * @throws ApiException If fail to process the API call, e.g. serializing the request body object @@ -463,9 +464,9 @@ public ApiResponse externalPrincipalLoginWithHttpInfo(Objec 0 Internal Server Error - */ - public okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call externalPrincipalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/model/ExternalLoginInformation.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/model/ExternalLoginInformation.java new file mode 100644 index 00000000000..cf7d223137c --- /dev/null +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/model/ExternalLoginInformation.java @@ -0,0 +1,127 @@ +/* + * lakeFS API + * lakeFS HTTP API + * + * The version of the OpenAPI document: 1.0.0 + * + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.lakefs.clients.api.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * ExternalLoginInformation + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class ExternalLoginInformation { + public static final String SERIALIZED_NAME_TOKEN_EXPIRATION_DURATION = "token_expiration_duration"; + @SerializedName(SERIALIZED_NAME_TOKEN_EXPIRATION_DURATION) + private Integer tokenExpirationDuration; + + public static final String SERIALIZED_NAME_IDENTITY_REQUEST = "identityRequest"; + @SerializedName(SERIALIZED_NAME_IDENTITY_REQUEST) + private Object identityRequest; + + + public ExternalLoginInformation tokenExpirationDuration(Integer tokenExpirationDuration) { + + this.tokenExpirationDuration = tokenExpirationDuration; + return this; + } + + /** + * Get tokenExpirationDuration + * @return tokenExpirationDuration + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Integer getTokenExpirationDuration() { + return tokenExpirationDuration; + } + + + public void setTokenExpirationDuration(Integer tokenExpirationDuration) { + this.tokenExpirationDuration = tokenExpirationDuration; + } + + + public ExternalLoginInformation identityRequest(Object identityRequest) { + + this.identityRequest = identityRequest; + return this; + } + + /** + * Get identityRequest + * @return identityRequest + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "") + + public Object getIdentityRequest() { + return identityRequest; + } + + + public void setIdentityRequest(Object identityRequest) { + this.identityRequest = identityRequest; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + ExternalLoginInformation externalLoginInformation = (ExternalLoginInformation) o; + return Objects.equals(this.tokenExpirationDuration, externalLoginInformation.tokenExpirationDuration) && + Objects.equals(this.identityRequest, externalLoginInformation.identityRequest); + } + + @Override + public int hashCode() { + return Objects.hash(tokenExpirationDuration, identityRequest); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class ExternalLoginInformation {\n"); + sb.append(" tokenExpirationDuration: ").append(toIndentedString(tokenExpirationDuration)).append("\n"); + sb.append(" identityRequest: ").append(toIndentedString(identityRequest)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java index d3ba40a9955..e9e4c91663c 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExperimentalApiTest.java @@ -18,6 +18,7 @@ import io.lakefs.clients.api.model.AuthenticationToken; import io.lakefs.clients.api.model.CompletePresignMultipartUpload; import io.lakefs.clients.api.model.Error; +import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -141,8 +142,8 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - Object body = null; - AuthenticationToken response = api.externalPrincipalLogin(body); + ExternalLoginInformation externalLoginInformation = null; + AuthenticationToken response = api.externalPrincipalLogin(externalLoginInformation); // TODO: test validations } diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java index 78ebb40a433..b9f14c69650 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/ExternalApiTest.java @@ -16,6 +16,7 @@ import io.lakefs.clients.api.ApiException; import io.lakefs.clients.api.model.AuthenticationToken; import io.lakefs.clients.api.model.Error; +import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -79,8 +80,8 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - Object body = null; - AuthenticationToken response = api.externalPrincipalLogin(body); + ExternalLoginInformation externalLoginInformation = null; + AuthenticationToken response = api.externalPrincipalLogin(externalLoginInformation); // TODO: test validations } diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/model/ExternalLoginInformationTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/model/ExternalLoginInformationTest.java new file mode 100644 index 00000000000..87e3a49590d --- /dev/null +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/model/ExternalLoginInformationTest.java @@ -0,0 +1,59 @@ +/* + * lakeFS API + * lakeFS HTTP API + * + * The version of the OpenAPI document: 1.0.0 + * + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.lakefs.clients.api.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for ExternalLoginInformation + */ +public class ExternalLoginInformationTest { + private final ExternalLoginInformation model = new ExternalLoginInformation(); + + /** + * Model tests for ExternalLoginInformation + */ + @Test + public void testExternalLoginInformation() { + // TODO: test ExternalLoginInformation + } + + /** + * Test the property 'tokenExpirationDuration' + */ + @Test + public void tokenExpirationDurationTest() { + // TODO: test tokenExpirationDuration + } + + /** + * Test the property 'identityRequest' + */ + @Test + public void identityRequestTest() { + // TODO: test identityRequest + } + +} diff --git a/clients/java/README.md b/clients/java/README.md index ddd800941bc..78075495de2 100644 --- a/clients/java/README.md +++ b/clients/java/README.md @@ -303,6 +303,7 @@ Class | Method | HTTP request | Description - [DiffList](docs/DiffList.md) - [Error](docs/Error.md) - [ErrorNoACL](docs/ErrorNoACL.md) + - [ExternalLoginInformation](docs/ExternalLoginInformation.md) - [ExternalPrincipal](docs/ExternalPrincipal.md) - [ExternalPrincipalCreation](docs/ExternalPrincipalCreation.md) - [ExternalPrincipalList](docs/ExternalPrincipalList.md) diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index ee628608c66..4bd19ea54ea 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -8205,6 +8205,16 @@ components: - secret_access_key type: object ExternalLoginInformation: + example: + identityRequest: "{}" + token_expiration_duration: 0 + properties: + token_expiration_duration: + type: integer + identityRequest: + type: object + required: + - identityRequest type: object StsAuthRequest: example: diff --git a/clients/java/docs/ExperimentalApi.md b/clients/java/docs/ExperimentalApi.md index 2f4541d3d9e..10077572d49 100644 --- a/clients/java/docs/ExperimentalApi.md +++ b/clients/java/docs/ExperimentalApi.md @@ -523,7 +523,7 @@ null (empty response body) # **externalPrincipalLogin** -> AuthenticationToken externalPrincipalLogin().body(body).execute(); +> AuthenticationToken externalPrincipalLogin().externalLoginInformation(externalLoginInformation).execute(); perform a login using an external authenticator @@ -542,10 +542,10 @@ public class Example { defaultClient.setBasePath("/api/v1"); ExperimentalApi apiInstance = new ExperimentalApi(defaultClient); - Object body = null; // Object | + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | try { AuthenticationToken result = apiInstance.externalPrincipalLogin() - .body(body) + .externalLoginInformation(externalLoginInformation) .execute(); System.out.println(result); } catch (ApiException e) { @@ -563,7 +563,7 @@ public class Example { | Name | Type | Description | Notes | |------------- | ------------- | ------------- | -------------| -| **body** | **Object**| | [optional] | +| **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] | ### Return type diff --git a/clients/java/docs/ExternalApi.md b/clients/java/docs/ExternalApi.md index 878d32e26f9..ae9e30c06ea 100644 --- a/clients/java/docs/ExternalApi.md +++ b/clients/java/docs/ExternalApi.md @@ -205,7 +205,7 @@ null (empty response body) # **externalPrincipalLogin** -> AuthenticationToken externalPrincipalLogin().body(body).execute(); +> AuthenticationToken externalPrincipalLogin().externalLoginInformation(externalLoginInformation).execute(); perform a login using an external authenticator @@ -224,10 +224,10 @@ public class Example { defaultClient.setBasePath("/api/v1"); ExternalApi apiInstance = new ExternalApi(defaultClient); - Object body = null; // Object | + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | try { AuthenticationToken result = apiInstance.externalPrincipalLogin() - .body(body) + .externalLoginInformation(externalLoginInformation) .execute(); System.out.println(result); } catch (ApiException e) { @@ -245,7 +245,7 @@ public class Example { | Name | Type | Description | Notes | |------------- | ------------- | ------------- | -------------| -| **body** | **Object**| | [optional] | +| **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] | ### Return type diff --git a/clients/java/docs/ExternalLoginInformation.md b/clients/java/docs/ExternalLoginInformation.md new file mode 100644 index 00000000000..4430d03d87a --- /dev/null +++ b/clients/java/docs/ExternalLoginInformation.md @@ -0,0 +1,14 @@ + + +# ExternalLoginInformation + + +## Properties + +| Name | Type | Description | Notes | +|------------ | ------------- | ------------- | -------------| +|**tokenExpirationDuration** | **Integer** | | [optional] | +|**identityRequest** | **Object** | | | + + + diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java index e1a156c0de4..a07ebb38ca8 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExperimentalApi.java @@ -31,6 +31,7 @@ import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.CompletePresignMultipartUpload; import io.lakefs.clients.sdk.model.Error; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -1111,7 +1112,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } - private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -1125,7 +1126,7 @@ private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _ basePath = null; } - Object localVarPostBody = body; + Object localVarPostBody = externalLoginInformation; // create path and map variables String localVarPath = "/auth/external/principal/login"; @@ -1157,39 +1158,39 @@ private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _ } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { - return externalPrincipalLoginCall(body, _callback); + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + return externalPrincipalLoginCall(externalLoginInformation, _callback); } - private ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { - okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); + private ApiResponse externalPrincipalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } public class APIexternalPrincipalLoginRequest { - private Object body; + private ExternalLoginInformation externalLoginInformation; private APIexternalPrincipalLoginRequest() { } /** - * Set body - * @param body (optional) + * Set externalLoginInformation + * @param externalLoginInformation (optional) * @return APIexternalPrincipalLoginRequest */ - public APIexternalPrincipalLoginRequest body(Object body) { - this.body = body; + public APIexternalPrincipalLoginRequest externalLoginInformation(ExternalLoginInformation externalLoginInformation) { + this.externalLoginInformation = externalLoginInformation; return this; } @@ -1211,7 +1212,7 @@ public APIexternalPrincipalLoginRequest body(Object body) { */ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { - return externalPrincipalLoginCall(body, _callback); + return externalPrincipalLoginCall(externalLoginInformation, _callback); } /** @@ -1231,7 +1232,7 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { */ public AuthenticationToken execute() throws ApiException { - ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(externalLoginInformation); return localVarResp.getData(); } @@ -1252,7 +1253,7 @@ public AuthenticationToken execute() throws ApiException { */ public ApiResponse executeWithHttpInfo() throws ApiException { - return externalPrincipalLoginWithHttpInfo(body); + return externalPrincipalLoginWithHttpInfo(externalLoginInformation); } /** @@ -1273,7 +1274,7 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio */ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { - return externalPrincipalLoginAsync(body, _callback); + return externalPrincipalLoginAsync(externalLoginInformation, _callback); } } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java index a940f10c3cf..0aa9762e336 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/ExternalApi.java @@ -29,6 +29,7 @@ import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.Error; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -453,7 +454,7 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdeleteUserExternalPrincipalRequest deleteUserExternalPrincipal(String userId, String principalId) { return new APIdeleteUserExternalPrincipalRequest(userId, principalId); } - private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers String[] localBasePaths = new String[] { }; @@ -467,7 +468,7 @@ private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _ basePath = null; } - Object localVarPostBody = body; + Object localVarPostBody = externalLoginInformation; // create path and map variables String localVarPath = "/auth/external/principal/login"; @@ -499,39 +500,39 @@ private okhttp3.Call externalPrincipalLoginCall(Object body, final ApiCallback _ } @SuppressWarnings("rawtypes") - private okhttp3.Call externalPrincipalLoginValidateBeforeCall(Object body, final ApiCallback _callback) throws ApiException { - return externalPrincipalLoginCall(body, _callback); + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + return externalPrincipalLoginCall(externalLoginInformation, _callback); } - private ApiResponse externalPrincipalLoginWithHttpInfo(Object body) throws ApiException { - okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, null); + private ApiResponse externalPrincipalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } - private okhttp3.Call externalPrincipalLoginAsync(Object body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call externalPrincipalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(body, _callback); + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } public class APIexternalPrincipalLoginRequest { - private Object body; + private ExternalLoginInformation externalLoginInformation; private APIexternalPrincipalLoginRequest() { } /** - * Set body - * @param body (optional) + * Set externalLoginInformation + * @param externalLoginInformation (optional) * @return APIexternalPrincipalLoginRequest */ - public APIexternalPrincipalLoginRequest body(Object body) { - this.body = body; + public APIexternalPrincipalLoginRequest externalLoginInformation(ExternalLoginInformation externalLoginInformation) { + this.externalLoginInformation = externalLoginInformation; return this; } @@ -553,7 +554,7 @@ public APIexternalPrincipalLoginRequest body(Object body) { */ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { - return externalPrincipalLoginCall(body, _callback); + return externalPrincipalLoginCall(externalLoginInformation, _callback); } /** @@ -573,7 +574,7 @@ public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { */ public AuthenticationToken execute() throws ApiException { - ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(body); + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(externalLoginInformation); return localVarResp.getData(); } @@ -594,7 +595,7 @@ public AuthenticationToken execute() throws ApiException { */ public ApiResponse executeWithHttpInfo() throws ApiException { - return externalPrincipalLoginWithHttpInfo(body); + return externalPrincipalLoginWithHttpInfo(externalLoginInformation); } /** @@ -615,7 +616,7 @@ public ApiResponse executeWithHttpInfo() throws ApiExceptio */ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { - return externalPrincipalLoginAsync(body, _callback); + return externalPrincipalLoginAsync(externalLoginInformation, _callback); } } diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java b/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java index 7203a5c5512..c1b6c618cc5 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/JSON.java @@ -118,6 +118,7 @@ private static Class getClassByDiscriminator(Map classByDiscriminatorValue, Stri gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.DiffList.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.Error.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ErrorNoACL.CustomTypeAdapterFactory()); + gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalLoginInformation.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalPrincipal.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalPrincipalCreation.CustomTypeAdapterFactory()); gsonBuilder.registerTypeAdapterFactory(new io.lakefs.clients.sdk.model.ExternalPrincipalList.CustomTypeAdapterFactory()); diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/model/ExternalLoginInformation.java b/clients/java/src/main/java/io/lakefs/clients/sdk/model/ExternalLoginInformation.java new file mode 100644 index 00000000000..ae63343c140 --- /dev/null +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/model/ExternalLoginInformation.java @@ -0,0 +1,318 @@ +/* + * lakeFS API + * lakeFS HTTP API + * + * The version of the OpenAPI document: 1.0.0 + * + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.lakefs.clients.sdk.model; + +import java.util.Objects; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import java.io.IOException; +import java.util.Arrays; + +import com.google.gson.Gson; +import com.google.gson.GsonBuilder; +import com.google.gson.JsonArray; +import com.google.gson.JsonDeserializationContext; +import com.google.gson.JsonDeserializer; +import com.google.gson.JsonElement; +import com.google.gson.JsonObject; +import com.google.gson.JsonParseException; +import com.google.gson.TypeAdapterFactory; +import com.google.gson.reflect.TypeToken; +import com.google.gson.TypeAdapter; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import java.io.IOException; + +import java.lang.reflect.Type; +import java.util.HashMap; +import java.util.HashSet; +import java.util.List; +import java.util.Map; +import java.util.Map.Entry; +import java.util.Set; + +import io.lakefs.clients.sdk.JSON; + +/** + * ExternalLoginInformation + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class ExternalLoginInformation { + public static final String SERIALIZED_NAME_TOKEN_EXPIRATION_DURATION = "token_expiration_duration"; + @SerializedName(SERIALIZED_NAME_TOKEN_EXPIRATION_DURATION) + private Integer tokenExpirationDuration; + + public static final String SERIALIZED_NAME_IDENTITY_REQUEST = "identityRequest"; + @SerializedName(SERIALIZED_NAME_IDENTITY_REQUEST) + private Object identityRequest; + + public ExternalLoginInformation() { + } + + public ExternalLoginInformation tokenExpirationDuration(Integer tokenExpirationDuration) { + + this.tokenExpirationDuration = tokenExpirationDuration; + return this; + } + + /** + * Get tokenExpirationDuration + * @return tokenExpirationDuration + **/ + @javax.annotation.Nullable + public Integer getTokenExpirationDuration() { + return tokenExpirationDuration; + } + + + public void setTokenExpirationDuration(Integer tokenExpirationDuration) { + this.tokenExpirationDuration = tokenExpirationDuration; + } + + + public ExternalLoginInformation identityRequest(Object identityRequest) { + + this.identityRequest = identityRequest; + return this; + } + + /** + * Get identityRequest + * @return identityRequest + **/ + @javax.annotation.Nonnull + public Object getIdentityRequest() { + return identityRequest; + } + + + public void setIdentityRequest(Object identityRequest) { + this.identityRequest = identityRequest; + } + + /** + * A container for additional, undeclared properties. + * This is a holder for any undeclared properties as specified with + * the 'additionalProperties' keyword in the OAS document. + */ + private Map additionalProperties; + + /** + * Set the additional (undeclared) property with the specified name and value. + * If the property does not already exist, create it otherwise replace it. + * + * @param key name of the property + * @param value value of the property + * @return the ExternalLoginInformation instance itself + */ + public ExternalLoginInformation putAdditionalProperty(String key, Object value) { + if (this.additionalProperties == null) { + this.additionalProperties = new HashMap(); + } + this.additionalProperties.put(key, value); + return this; + } + + /** + * Return the additional (undeclared) property. + * + * @return a map of objects + */ + public Map getAdditionalProperties() { + return additionalProperties; + } + + /** + * Return the additional (undeclared) property with the specified name. + * + * @param key name of the property + * @return an object + */ + public Object getAdditionalProperty(String key) { + if (this.additionalProperties == null) { + return null; + } + return this.additionalProperties.get(key); + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + ExternalLoginInformation externalLoginInformation = (ExternalLoginInformation) o; + return Objects.equals(this.tokenExpirationDuration, externalLoginInformation.tokenExpirationDuration) && + Objects.equals(this.identityRequest, externalLoginInformation.identityRequest)&& + Objects.equals(this.additionalProperties, externalLoginInformation.additionalProperties); + } + + @Override + public int hashCode() { + return Objects.hash(tokenExpirationDuration, identityRequest, additionalProperties); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class ExternalLoginInformation {\n"); + sb.append(" tokenExpirationDuration: ").append(toIndentedString(tokenExpirationDuration)).append("\n"); + sb.append(" identityRequest: ").append(toIndentedString(identityRequest)).append("\n"); + sb.append(" additionalProperties: ").append(toIndentedString(additionalProperties)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + + + public static HashSet openapiFields; + public static HashSet openapiRequiredFields; + + static { + // a set of all properties/fields (JSON key names) + openapiFields = new HashSet(); + openapiFields.add("token_expiration_duration"); + openapiFields.add("identityRequest"); + + // a set of required properties/fields (JSON key names) + openapiRequiredFields = new HashSet(); + openapiRequiredFields.add("identityRequest"); + } + + /** + * Validates the JSON Element and throws an exception if issues found + * + * @param jsonElement JSON Element + * @throws IOException if the JSON Element is invalid with respect to ExternalLoginInformation + */ + public static void validateJsonElement(JsonElement jsonElement) throws IOException { + if (jsonElement == null) { + if (!ExternalLoginInformation.openapiRequiredFields.isEmpty()) { // has required fields but JSON element is null + throw new IllegalArgumentException(String.format("The required field(s) %s in ExternalLoginInformation is not found in the empty JSON string", ExternalLoginInformation.openapiRequiredFields.toString())); + } + } + + // check to make sure all required properties/fields are present in the JSON string + for (String requiredField : ExternalLoginInformation.openapiRequiredFields) { + if (jsonElement.getAsJsonObject().get(requiredField) == null) { + throw new IllegalArgumentException(String.format("The required field `%s` is not found in the JSON string: %s", requiredField, jsonElement.toString())); + } + } + JsonObject jsonObj = jsonElement.getAsJsonObject(); + } + + public static class CustomTypeAdapterFactory implements TypeAdapterFactory { + @SuppressWarnings("unchecked") + @Override + public TypeAdapter create(Gson gson, TypeToken type) { + if (!ExternalLoginInformation.class.isAssignableFrom(type.getRawType())) { + return null; // this class only serializes 'ExternalLoginInformation' and its subtypes + } + final TypeAdapter elementAdapter = gson.getAdapter(JsonElement.class); + final TypeAdapter thisAdapter + = gson.getDelegateAdapter(this, TypeToken.get(ExternalLoginInformation.class)); + + return (TypeAdapter) new TypeAdapter() { + @Override + public void write(JsonWriter out, ExternalLoginInformation value) throws IOException { + JsonObject obj = thisAdapter.toJsonTree(value).getAsJsonObject(); + obj.remove("additionalProperties"); + // serialize additional properties + if (value.getAdditionalProperties() != null) { + for (Map.Entry entry : value.getAdditionalProperties().entrySet()) { + if (entry.getValue() instanceof String) + obj.addProperty(entry.getKey(), (String) entry.getValue()); + else if (entry.getValue() instanceof Number) + obj.addProperty(entry.getKey(), (Number) entry.getValue()); + else if (entry.getValue() instanceof Boolean) + obj.addProperty(entry.getKey(), (Boolean) entry.getValue()); + else if (entry.getValue() instanceof Character) + obj.addProperty(entry.getKey(), (Character) entry.getValue()); + else { + obj.add(entry.getKey(), gson.toJsonTree(entry.getValue()).getAsJsonObject()); + } + } + } + elementAdapter.write(out, obj); + } + + @Override + public ExternalLoginInformation read(JsonReader in) throws IOException { + JsonElement jsonElement = elementAdapter.read(in); + validateJsonElement(jsonElement); + JsonObject jsonObj = jsonElement.getAsJsonObject(); + // store additional fields in the deserialized instance + ExternalLoginInformation instance = thisAdapter.fromJsonTree(jsonObj); + for (Map.Entry entry : jsonObj.entrySet()) { + if (!openapiFields.contains(entry.getKey())) { + if (entry.getValue().isJsonPrimitive()) { // primitive type + if (entry.getValue().getAsJsonPrimitive().isString()) + instance.putAdditionalProperty(entry.getKey(), entry.getValue().getAsString()); + else if (entry.getValue().getAsJsonPrimitive().isNumber()) + instance.putAdditionalProperty(entry.getKey(), entry.getValue().getAsNumber()); + else if (entry.getValue().getAsJsonPrimitive().isBoolean()) + instance.putAdditionalProperty(entry.getKey(), entry.getValue().getAsBoolean()); + else + throw new IllegalArgumentException(String.format("The field `%s` has unknown primitive type. Value: %s", entry.getKey(), entry.getValue().toString())); + } else if (entry.getValue().isJsonArray()) { + instance.putAdditionalProperty(entry.getKey(), gson.fromJson(entry.getValue(), List.class)); + } else { // JSON object + instance.putAdditionalProperty(entry.getKey(), gson.fromJson(entry.getValue(), HashMap.class)); + } + } + } + return instance; + } + + }.nullSafe(); + } + } + + /** + * Create an instance of ExternalLoginInformation given an JSON string + * + * @param jsonString JSON string + * @return An instance of ExternalLoginInformation + * @throws IOException if the JSON string is invalid with respect to ExternalLoginInformation + */ + public static ExternalLoginInformation fromJson(String jsonString) throws IOException { + return JSON.getGson().fromJson(jsonString, ExternalLoginInformation.class); + } + + /** + * Convert an instance of ExternalLoginInformation to an JSON string + * + * @return JSON string + */ + public String toJson() { + return JSON.getGson().toJson(this); + } +} + diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java index afd8d56e48e..52aefc3d1e4 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExperimentalApiTest.java @@ -18,6 +18,7 @@ import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.CompletePresignMultipartUpload; import io.lakefs.clients.sdk.model.Error; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -137,9 +138,9 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - Object body = null; + ExternalLoginInformation externalLoginInformation = null; AuthenticationToken response = api.externalPrincipalLogin() - .body(body) + .externalLoginInformation(externalLoginInformation) .execute(); // TODO: test validations } diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java index 405aff8353e..3dd32421e88 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/ExternalApiTest.java @@ -16,6 +16,7 @@ import io.lakefs.clients.sdk.ApiException; import io.lakefs.clients.sdk.model.AuthenticationToken; import io.lakefs.clients.sdk.model.Error; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -72,9 +73,9 @@ public void deleteUserExternalPrincipalTest() throws ApiException { */ @Test public void externalPrincipalLoginTest() throws ApiException { - Object body = null; + ExternalLoginInformation externalLoginInformation = null; AuthenticationToken response = api.externalPrincipalLogin() - .body(body) + .externalLoginInformation(externalLoginInformation) .execute(); // TODO: test validations } diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java new file mode 100644 index 00000000000..962495b581f --- /dev/null +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/model/ExternalLoginInformationTest.java @@ -0,0 +1,56 @@ +/* + * lakeFS API + * lakeFS HTTP API + * + * The version of the OpenAPI document: 1.0.0 + * + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.lakefs.clients.sdk.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import java.io.IOException; +import java.util.Arrays; +import org.junit.jupiter.api.Disabled; +import org.junit.jupiter.api.Test; + +/** + * Model tests for ExternalLoginInformation + */ +public class ExternalLoginInformationTest { + private final ExternalLoginInformation model = new ExternalLoginInformation(); + + /** + * Model tests for ExternalLoginInformation + */ + @Test + public void testExternalLoginInformation() { + // TODO: test ExternalLoginInformation + } + + /** + * Test the property 'tokenExpirationDuration' + */ + @Test + public void tokenExpirationDurationTest() { + // TODO: test tokenExpirationDuration + } + + /** + * Test the property 'identityRequest' + */ + @Test + public void identityRequestTest() { + // TODO: test identityRequest + } + +} diff --git a/clients/python-legacy/.openapi-generator/FILES b/clients/python-legacy/.openapi-generator/FILES index 5930127d4a9..091104d1590 100644 --- a/clients/python-legacy/.openapi-generator/FILES +++ b/clients/python-legacy/.openapi-generator/FILES @@ -34,6 +34,7 @@ docs/Error.md docs/ErrorNoACL.md docs/ExperimentalApi.md docs/ExternalApi.md +docs/ExternalLoginInformation.md docs/ExternalPrincipal.md docs/ExternalPrincipalCreation.md docs/ExternalPrincipalList.md @@ -169,6 +170,7 @@ lakefs_client/model/diff.py lakefs_client/model/diff_list.py lakefs_client/model/error.py lakefs_client/model/error_no_acl.py +lakefs_client/model/external_login_information.py lakefs_client/model/external_principal.py lakefs_client/model/external_principal_creation.py lakefs_client/model/external_principal_list.py @@ -285,6 +287,7 @@ test/test_error.py test/test_error_no_acl.py test/test_experimental_api.py test/test_external_api.py +test/test_external_login_information.py test/test_external_principal.py test/test_external_principal_creation.py test/test_external_principal_list.py diff --git a/clients/python-legacy/README.md b/clients/python-legacy/README.md index 2690c1c4618..713d1cf7d50 100644 --- a/clients/python-legacy/README.md +++ b/clients/python-legacy/README.md @@ -276,6 +276,7 @@ Class | Method | HTTP request | Description - [DiffList](docs/DiffList.md) - [Error](docs/Error.md) - [ErrorNoACL](docs/ErrorNoACL.md) + - [ExternalLoginInformation](docs/ExternalLoginInformation.md) - [ExternalPrincipal](docs/ExternalPrincipal.md) - [ExternalPrincipalCreation](docs/ExternalPrincipalCreation.md) - [ExternalPrincipalList](docs/ExternalPrincipalList.md) diff --git a/clients/python-legacy/docs/ExperimentalApi.md b/clients/python-legacy/docs/ExperimentalApi.md index cc9a5a547b0..6e0b3cba4ce 100644 --- a/clients/python-legacy/docs/ExperimentalApi.md +++ b/clients/python-legacy/docs/ExperimentalApi.md @@ -660,6 +660,7 @@ import time import lakefs_client from lakefs_client.api import experimental_api from lakefs_client.model.authentication_token import AuthenticationToken +from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.error import Error from pprint import pprint # Defining the host is optional and defaults to http://localhost/api/v1 @@ -673,13 +674,16 @@ configuration = lakefs_client.Configuration( with lakefs_client.ApiClient() as api_client: # Create an instance of the API class api_instance = experimental_api.ExperimentalApi(api_client) - body = {} # {str: (bool, date, datetime, dict, float, int, list, str, none_type)} | (optional) + external_login_information = ExternalLoginInformation( + token_expiration_duration=1, + identity_request={}, + ) # ExternalLoginInformation | (optional) # example passing only required values which don't have defaults set # and optional values try: # perform a login using an external authenticator - api_response = api_instance.external_principal_login(body=body) + api_response = api_instance.external_principal_login(external_login_information=external_login_information) pprint(api_response) except lakefs_client.ApiException as e: print("Exception when calling ExperimentalApi->external_principal_login: %s\n" % e) @@ -690,7 +694,7 @@ with lakefs_client.ApiClient() as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **{str: (bool, date, datetime, dict, float, int, list, str, none_type)}**| | [optional] + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] ### Return type diff --git a/clients/python-legacy/docs/ExternalApi.md b/clients/python-legacy/docs/ExternalApi.md index 6f952bae74f..761f96d6897 100644 --- a/clients/python-legacy/docs/ExternalApi.md +++ b/clients/python-legacy/docs/ExternalApi.md @@ -258,6 +258,7 @@ import time import lakefs_client from lakefs_client.api import external_api from lakefs_client.model.authentication_token import AuthenticationToken +from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.error import Error from pprint import pprint # Defining the host is optional and defaults to http://localhost/api/v1 @@ -271,13 +272,16 @@ configuration = lakefs_client.Configuration( with lakefs_client.ApiClient() as api_client: # Create an instance of the API class api_instance = external_api.ExternalApi(api_client) - body = {} # {str: (bool, date, datetime, dict, float, int, list, str, none_type)} | (optional) + external_login_information = ExternalLoginInformation( + token_expiration_duration=1, + identity_request={}, + ) # ExternalLoginInformation | (optional) # example passing only required values which don't have defaults set # and optional values try: # perform a login using an external authenticator - api_response = api_instance.external_principal_login(body=body) + api_response = api_instance.external_principal_login(external_login_information=external_login_information) pprint(api_response) except lakefs_client.ApiException as e: print("Exception when calling ExternalApi->external_principal_login: %s\n" % e) @@ -288,7 +292,7 @@ with lakefs_client.ApiClient() as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **{str: (bool, date, datetime, dict, float, int, list, str, none_type)}**| | [optional] + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] ### Return type diff --git a/clients/python-legacy/docs/ExternalLoginInformation.md b/clients/python-legacy/docs/ExternalLoginInformation.md new file mode 100644 index 00000000000..26410a639de --- /dev/null +++ b/clients/python-legacy/docs/ExternalLoginInformation.md @@ -0,0 +1,13 @@ +# ExternalLoginInformation + + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**identity_request** | **{str: (bool, date, datetime, dict, float, int, list, str, none_type)}** | | +**token_expiration_duration** | **int** | | [optional] +**any string name** | **bool, date, datetime, dict, float, int, list, str, none_type** | any string name can be used but the value must be the correct type | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/clients/python-legacy/lakefs_client/api/experimental_api.py b/clients/python-legacy/lakefs_client/api/experimental_api.py index 68fdb56fb69..94808cdaabc 100644 --- a/clients/python-legacy/lakefs_client/api/experimental_api.py +++ b/clients/python-legacy/lakefs_client/api/experimental_api.py @@ -26,6 +26,7 @@ from lakefs_client.model.authentication_token import AuthenticationToken from lakefs_client.model.complete_presign_multipart_upload import CompletePresignMultipartUpload from lakefs_client.model.error import Error +from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList @@ -415,7 +416,7 @@ def __init__(self, api_client=None): }, params_map={ 'all': [ - 'body', + 'external_login_information', ], 'required': [], 'nullable': [ @@ -431,13 +432,13 @@ def __init__(self, api_client=None): 'allowed_values': { }, 'openapi_types': { - 'body': - ({str: (bool, date, datetime, dict, float, int, list, str, none_type)},), + 'external_login_information': + (ExternalLoginInformation,), }, 'attribute_map': { }, 'location_map': { - 'body': 'body', + 'external_login_information': 'body', }, 'collection_format_map': { } @@ -1092,7 +1093,7 @@ def external_principal_login( Keyword Args: - body ({str: (bool, date, datetime, dict, float, int, list, str, none_type)}): [optional] + external_login_information (ExternalLoginInformation): [optional] _return_http_data_only (bool): response data without head status code and headers. Default is True. _preload_content (bool): if False, the urllib3.HTTPResponse object diff --git a/clients/python-legacy/lakefs_client/api/external_api.py b/clients/python-legacy/lakefs_client/api/external_api.py index 0155b3e5d19..fe4328a3570 100644 --- a/clients/python-legacy/lakefs_client/api/external_api.py +++ b/clients/python-legacy/lakefs_client/api/external_api.py @@ -24,6 +24,7 @@ ) from lakefs_client.model.authentication_token import AuthenticationToken from lakefs_client.model.error import Error +from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList @@ -179,7 +180,7 @@ def __init__(self, api_client=None): }, params_map={ 'all': [ - 'body', + 'external_login_information', ], 'required': [], 'nullable': [ @@ -195,13 +196,13 @@ def __init__(self, api_client=None): 'allowed_values': { }, 'openapi_types': { - 'body': - ({str: (bool, date, datetime, dict, float, int, list, str, none_type)},), + 'external_login_information': + (ExternalLoginInformation,), }, 'attribute_map': { }, 'location_map': { - 'body': 'body', + 'external_login_information': 'body', }, 'collection_format_map': { } @@ -501,7 +502,7 @@ def external_principal_login( Keyword Args: - body ({str: (bool, date, datetime, dict, float, int, list, str, none_type)}): [optional] + external_login_information (ExternalLoginInformation): [optional] _return_http_data_only (bool): response data without head status code and headers. Default is True. _preload_content (bool): if False, the urllib3.HTTPResponse object diff --git a/clients/python-legacy/lakefs_client/model/external_login_information.py b/clients/python-legacy/lakefs_client/model/external_login_information.py new file mode 100644 index 00000000000..4c4e3cea5a5 --- /dev/null +++ b/clients/python-legacy/lakefs_client/model/external_login_information.py @@ -0,0 +1,266 @@ +""" + lakeFS API + + lakeFS HTTP API # noqa: E501 + + The version of the OpenAPI document: 1.0.0 + Contact: services@treeverse.io + Generated by: https://openapi-generator.tech +""" + + +import re # noqa: F401 +import sys # noqa: F401 + +from lakefs_client.model_utils import ( # noqa: F401 + ApiTypeError, + ModelComposed, + ModelNormal, + ModelSimple, + cached_property, + change_keys_js_to_python, + convert_js_args_to_python_args, + date, + datetime, + file_type, + none_type, + validate_get_composed_info, +) +from ..model_utils import OpenApiModel +from lakefs_client.exceptions import ApiAttributeError + + + +class ExternalLoginInformation(ModelNormal): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + + Attributes: + allowed_values (dict): The key is the tuple path to the attribute + and the for var_name this is (var_name,). The value is a dict + with a capitalized key describing the allowed value and an allowed + value. These dicts store the allowed enum values. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + discriminator_value_class_map (dict): A dict to go from the discriminator + variable value to the discriminator class name. + validations (dict): The key is the tuple path to the attribute + and the for var_name this is (var_name,). The value is a dict + that stores validations for max_length, min_length, max_items, + min_items, exclusive_maximum, inclusive_maximum, exclusive_minimum, + inclusive_minimum, and regex. + additional_properties_type (tuple): A tuple of classes accepted + as additional properties values. + """ + + allowed_values = { + } + + validations = { + } + + @cached_property + def additional_properties_type(): + """ + This must be a method because a model may have properties that are + of type self, this must run after the class is loaded + """ + return (bool, date, datetime, dict, float, int, list, str, none_type,) # noqa: E501 + + _nullable = False + + @cached_property + def openapi_types(): + """ + This must be a method because a model may have properties that are + of type self, this must run after the class is loaded + + Returns + openapi_types (dict): The key is attribute name + and the value is attribute type. + """ + return { + 'identity_request': ({str: (bool, date, datetime, dict, float, int, list, str, none_type)},), # noqa: E501 + 'token_expiration_duration': (int,), # noqa: E501 + } + + @cached_property + def discriminator(): + return None + + + attribute_map = { + 'identity_request': 'identityRequest', # noqa: E501 + 'token_expiration_duration': 'token_expiration_duration', # noqa: E501 + } + + read_only_vars = { + } + + _composed_schemas = {} + + @classmethod + @convert_js_args_to_python_args + def _from_openapi_data(cls, identity_request, *args, **kwargs): # noqa: E501 + """ExternalLoginInformation - a model defined in OpenAPI + + Args: + identity_request ({str: (bool, date, datetime, dict, float, int, list, str, none_type)}): + + Keyword Args: + _check_type (bool): if True, values for parameters in openapi_types + will be type checked and a TypeError will be + raised if the wrong type is input. + Defaults to True + _path_to_item (tuple/list): This is a list of keys or values to + drill down to the model in received_data + when deserializing a response + _spec_property_naming (bool): True if the variable names in the input data + are serialized names, as specified in the OpenAPI document. + False if the variable names in the input data + are pythonic names, e.g. snake case (default) + _configuration (Configuration): the instance to use when + deserializing a file_type parameter. + If passed, type conversion is attempted + If omitted no type conversion is done. + _visited_composed_classes (tuple): This stores a tuple of + classes that we have traveled through so that + if we see that class again we will not use its + discriminator again. + When traveling through a discriminator, the + composed schema that is + is traveled through is added to this set. + For example if Animal has a discriminator + petType and we pass in "Dog", and the class Dog + allOf includes Animal, we move through Animal + once using the discriminator, and pick Dog. + Then in Dog, we will make an instance of the + Animal class but this time we won't travel + through its discriminator because we passed in + _visited_composed_classes = (Animal,) + token_expiration_duration (int): [optional] # noqa: E501 + """ + + _check_type = kwargs.pop('_check_type', True) + _spec_property_naming = kwargs.pop('_spec_property_naming', False) + _path_to_item = kwargs.pop('_path_to_item', ()) + _configuration = kwargs.pop('_configuration', None) + _visited_composed_classes = kwargs.pop('_visited_composed_classes', ()) + + self = super(OpenApiModel, cls).__new__(cls) + + if args: + raise ApiTypeError( + "Invalid positional arguments=%s passed to %s. Remove those invalid positional arguments." % ( + args, + self.__class__.__name__, + ), + path_to_item=_path_to_item, + valid_classes=(self.__class__,), + ) + + self._data_store = {} + self._check_type = _check_type + self._spec_property_naming = _spec_property_naming + self._path_to_item = _path_to_item + self._configuration = _configuration + self._visited_composed_classes = _visited_composed_classes + (self.__class__,) + + self.identity_request = identity_request + for var_name, var_value in kwargs.items(): + if var_name not in self.attribute_map and \ + self._configuration is not None and \ + self._configuration.discard_unknown_keys and \ + self.additional_properties_type is None: + # discard variable. + continue + setattr(self, var_name, var_value) + return self + + required_properties = set([ + '_data_store', + '_check_type', + '_spec_property_naming', + '_path_to_item', + '_configuration', + '_visited_composed_classes', + ]) + + @convert_js_args_to_python_args + def __init__(self, identity_request, *args, **kwargs): # noqa: E501 + """ExternalLoginInformation - a model defined in OpenAPI + + Args: + identity_request ({str: (bool, date, datetime, dict, float, int, list, str, none_type)}): + + Keyword Args: + _check_type (bool): if True, values for parameters in openapi_types + will be type checked and a TypeError will be + raised if the wrong type is input. + Defaults to True + _path_to_item (tuple/list): This is a list of keys or values to + drill down to the model in received_data + when deserializing a response + _spec_property_naming (bool): True if the variable names in the input data + are serialized names, as specified in the OpenAPI document. + False if the variable names in the input data + are pythonic names, e.g. snake case (default) + _configuration (Configuration): the instance to use when + deserializing a file_type parameter. + If passed, type conversion is attempted + If omitted no type conversion is done. + _visited_composed_classes (tuple): This stores a tuple of + classes that we have traveled through so that + if we see that class again we will not use its + discriminator again. + When traveling through a discriminator, the + composed schema that is + is traveled through is added to this set. + For example if Animal has a discriminator + petType and we pass in "Dog", and the class Dog + allOf includes Animal, we move through Animal + once using the discriminator, and pick Dog. + Then in Dog, we will make an instance of the + Animal class but this time we won't travel + through its discriminator because we passed in + _visited_composed_classes = (Animal,) + token_expiration_duration (int): [optional] # noqa: E501 + """ + + _check_type = kwargs.pop('_check_type', True) + _spec_property_naming = kwargs.pop('_spec_property_naming', False) + _path_to_item = kwargs.pop('_path_to_item', ()) + _configuration = kwargs.pop('_configuration', None) + _visited_composed_classes = kwargs.pop('_visited_composed_classes', ()) + + if args: + raise ApiTypeError( + "Invalid positional arguments=%s passed to %s. Remove those invalid positional arguments." % ( + args, + self.__class__.__name__, + ), + path_to_item=_path_to_item, + valid_classes=(self.__class__,), + ) + + self._data_store = {} + self._check_type = _check_type + self._spec_property_naming = _spec_property_naming + self._path_to_item = _path_to_item + self._configuration = _configuration + self._visited_composed_classes = _visited_composed_classes + (self.__class__,) + + self.identity_request = identity_request + for var_name, var_value in kwargs.items(): + if var_name not in self.attribute_map and \ + self._configuration is not None and \ + self._configuration.discard_unknown_keys and \ + self.additional_properties_type is None: + # discard variable. + continue + setattr(self, var_name, var_value) + if var_name in self.read_only_vars: + raise ApiAttributeError(f"`{var_name}` is a read-only attribute. Use `from_openapi_data` to instantiate " + f"class with read only attributes.") diff --git a/clients/python-legacy/lakefs_client/models/__init__.py b/clients/python-legacy/lakefs_client/models/__init__.py index ab42d92747f..a042d843e8b 100644 --- a/clients/python-legacy/lakefs_client/models/__init__.py +++ b/clients/python-legacy/lakefs_client/models/__init__.py @@ -34,6 +34,7 @@ from lakefs_client.model.diff_list import DiffList from lakefs_client.model.error import Error from lakefs_client.model.error_no_acl import ErrorNoACL +from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList diff --git a/clients/python-legacy/test/test_external_login_information.py b/clients/python-legacy/test/test_external_login_information.py new file mode 100644 index 00000000000..2660def38f1 --- /dev/null +++ b/clients/python-legacy/test/test_external_login_information.py @@ -0,0 +1,36 @@ +""" + lakeFS API + + lakeFS HTTP API # noqa: E501 + + The version of the OpenAPI document: 1.0.0 + Contact: services@treeverse.io + Generated by: https://openapi-generator.tech +""" + + +import sys +import unittest + +import lakefs_client +from lakefs_client.model.external_login_information import ExternalLoginInformation + + +class TestExternalLoginInformation(unittest.TestCase): + """ExternalLoginInformation unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def testExternalLoginInformation(self): + """Test ExternalLoginInformation""" + # FIXME: construct object with mandatory attributes with example values + # model = ExternalLoginInformation() # noqa: E501 + pass + + +if __name__ == '__main__': + unittest.main() diff --git a/clients/python/.openapi-generator/FILES b/clients/python/.openapi-generator/FILES index 75dd1cb6584..0d2e0450ebd 100644 --- a/clients/python/.openapi-generator/FILES +++ b/clients/python/.openapi-generator/FILES @@ -32,6 +32,7 @@ docs/Error.md docs/ErrorNoACL.md docs/ExperimentalApi.md docs/ExternalApi.md +docs/ExternalLoginInformation.md docs/ExternalPrincipal.md docs/ExternalPrincipalCreation.md docs/ExternalPrincipalList.md @@ -162,6 +163,7 @@ lakefs_sdk/models/diff.py lakefs_sdk/models/diff_list.py lakefs_sdk/models/error.py lakefs_sdk/models/error_no_acl.py +lakefs_sdk/models/external_login_information.py lakefs_sdk/models/external_principal.py lakefs_sdk/models/external_principal_creation.py lakefs_sdk/models/external_principal_list.py @@ -274,6 +276,7 @@ test/test_error.py test/test_error_no_acl.py test/test_experimental_api.py test/test_external_api.py +test/test_external_login_information.py test/test_external_principal.py test/test_external_principal_creation.py test/test_external_principal_list.py diff --git a/clients/python/README.md b/clients/python/README.md index 3b53e933bac..c5fd6744269 100644 --- a/clients/python/README.md +++ b/clients/python/README.md @@ -279,6 +279,7 @@ Class | Method | HTTP request | Description - [DiffList](docs/DiffList.md) - [Error](docs/Error.md) - [ErrorNoACL](docs/ErrorNoACL.md) + - [ExternalLoginInformation](docs/ExternalLoginInformation.md) - [ExternalPrincipal](docs/ExternalPrincipal.md) - [ExternalPrincipalCreation](docs/ExternalPrincipalCreation.md) - [ExternalPrincipalList](docs/ExternalPrincipalList.md) diff --git a/clients/python/docs/ExperimentalApi.md b/clients/python/docs/ExperimentalApi.md index d4145afc322..1a91df2d8ca 100644 --- a/clients/python/docs/ExperimentalApi.md +++ b/clients/python/docs/ExperimentalApi.md @@ -600,7 +600,7 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **external_principal_login** -> AuthenticationToken external_principal_login(body=body) +> AuthenticationToken external_principal_login(external_login_information=external_login_information) perform a login using an external authenticator @@ -612,6 +612,7 @@ import time import os import lakefs_sdk from lakefs_sdk.models.authentication_token import AuthenticationToken +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.rest import ApiException from pprint import pprint @@ -626,11 +627,11 @@ configuration = lakefs_sdk.Configuration( with lakefs_sdk.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = lakefs_sdk.ExperimentalApi(api_client) - body = None # object | (optional) + external_login_information = lakefs_sdk.ExternalLoginInformation() # ExternalLoginInformation | (optional) try: # perform a login using an external authenticator - api_response = api_instance.external_principal_login(body=body) + api_response = api_instance.external_principal_login(external_login_information=external_login_information) print("The response of ExperimentalApi->external_principal_login:\n") pprint(api_response) except Exception as e: @@ -644,7 +645,7 @@ with lakefs_sdk.ApiClient(configuration) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **object**| | [optional] + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] ### Return type diff --git a/clients/python/docs/ExternalApi.md b/clients/python/docs/ExternalApi.md index 5b4d3c77162..f65514dc4f1 100644 --- a/clients/python/docs/ExternalApi.md +++ b/clients/python/docs/ExternalApi.md @@ -234,7 +234,7 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **external_principal_login** -> AuthenticationToken external_principal_login(body=body) +> AuthenticationToken external_principal_login(external_login_information=external_login_information) perform a login using an external authenticator @@ -246,6 +246,7 @@ import time import os import lakefs_sdk from lakefs_sdk.models.authentication_token import AuthenticationToken +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.rest import ApiException from pprint import pprint @@ -260,11 +261,11 @@ configuration = lakefs_sdk.Configuration( with lakefs_sdk.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = lakefs_sdk.ExternalApi(api_client) - body = None # object | (optional) + external_login_information = lakefs_sdk.ExternalLoginInformation() # ExternalLoginInformation | (optional) try: # perform a login using an external authenticator - api_response = api_instance.external_principal_login(body=body) + api_response = api_instance.external_principal_login(external_login_information=external_login_information) print("The response of ExternalApi->external_principal_login:\n") pprint(api_response) except Exception as e: @@ -278,7 +279,7 @@ with lakefs_sdk.ApiClient(configuration) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | **object**| | [optional] + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] ### Return type diff --git a/clients/python/docs/ExternalLoginInformation.md b/clients/python/docs/ExternalLoginInformation.md new file mode 100644 index 00000000000..8b454d9335a --- /dev/null +++ b/clients/python/docs/ExternalLoginInformation.md @@ -0,0 +1,30 @@ +# ExternalLoginInformation + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**token_expiration_duration** | **int** | | [optional] +**identity_request** | **object** | | + +## Example + +```python +from lakefs_sdk.models.external_login_information import ExternalLoginInformation + +# TODO update the JSON string below +json = "{}" +# create an instance of ExternalLoginInformation from a JSON string +external_login_information_instance = ExternalLoginInformation.from_json(json) +# print the JSON string representation of the object +print ExternalLoginInformation.to_json() + +# convert the object into a dict +external_login_information_dict = external_login_information_instance.to_dict() +# create an instance of ExternalLoginInformation from a dict +external_login_information_form_dict = external_login_information.from_dict(external_login_information_dict) +``` +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/clients/python/lakefs_sdk/__init__.py b/clients/python/lakefs_sdk/__init__.py index ec354e5f9bb..4527c35ba0f 100644 --- a/clients/python/lakefs_sdk/__init__.py +++ b/clients/python/lakefs_sdk/__init__.py @@ -72,6 +72,7 @@ from lakefs_sdk.models.diff_list import DiffList from lakefs_sdk.models.error import Error from lakefs_sdk.models.error_no_acl import ErrorNoACL +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList diff --git a/clients/python/lakefs_sdk/api/experimental_api.py b/clients/python/lakefs_sdk/api/experimental_api.py index 963da83911a..cc6d51f226e 100644 --- a/clients/python/lakefs_sdk/api/experimental_api.py +++ b/clients/python/lakefs_sdk/api/experimental_api.py @@ -22,11 +22,12 @@ from pydantic import Field, StrictBool, StrictInt, StrictStr, conint -from typing import Any, Dict, Optional +from typing import Optional from lakefs_sdk.models.abort_presign_multipart_upload import AbortPresignMultipartUpload from lakefs_sdk.models.authentication_token import AuthenticationToken from lakefs_sdk.models.complete_presign_multipart_upload import CompletePresignMultipartUpload +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList @@ -882,17 +883,17 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri _request_auth=_params.get('_request_auth')) @validate_arguments - def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_principal_login(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_principal_login(body, async_req=True) + >>> thread = api.external_principal_login(external_login_information, async_req=True) >>> result = thread.get() - :param body: - :type body: object + :param external_login_information: + :type external_login_information: ExternalLoginInformation :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _request_timeout: timeout setting for this request. If one @@ -907,20 +908,20 @@ def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwa kwargs['_return_http_data_only'] = True if '_preload_content' in kwargs: raise ValueError("Error! Please call the external_principal_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") - return self.external_principal_login_with_http_info(body, **kwargs) # noqa: E501 + return self.external_principal_login_with_http_info(external_login_information, **kwargs) # noqa: E501 @validate_arguments - def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_principal_login_with_http_info(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_principal_login_with_http_info(body, async_req=True) + >>> thread = api.external_principal_login_with_http_info(external_login_information, async_req=True) >>> result = thread.get() - :param body: - :type body: object + :param external_login_information: + :type external_login_information: ExternalLoginInformation :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _preload_content: if False, the ApiResponse.data will @@ -949,7 +950,7 @@ def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any] _params = locals() _all_params = [ - 'body' + 'external_login_information' ] _all_params.extend( [ @@ -987,8 +988,8 @@ def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any] _files = {} # process the body parameter _body_params = None - if _params['body'] is not None: - _body_params = _params['body'] + if _params['external_login_information'] is not None: + _body_params = _params['external_login_information'] # set the HTTP header `Accept` _header_params['Accept'] = self.api_client.select_header_accept( diff --git a/clients/python/lakefs_sdk/api/external_api.py b/clients/python/lakefs_sdk/api/external_api.py index f2fa019ef77..8b5462faff2 100644 --- a/clients/python/lakefs_sdk/api/external_api.py +++ b/clients/python/lakefs_sdk/api/external_api.py @@ -22,9 +22,10 @@ from pydantic import Field, StrictStr, conint -from typing import Any, Dict, Optional +from typing import Optional from lakefs_sdk.models.authentication_token import AuthenticationToken +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList @@ -351,17 +352,17 @@ def delete_user_external_principal_with_http_info(self, user_id : StrictStr, pri _request_auth=_params.get('_request_auth')) @validate_arguments - def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + def external_principal_login(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> AuthenticationToken: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_principal_login(body, async_req=True) + >>> thread = api.external_principal_login(external_login_information, async_req=True) >>> result = thread.get() - :param body: - :type body: object + :param external_login_information: + :type external_login_information: ExternalLoginInformation :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _request_timeout: timeout setting for this request. If one @@ -376,20 +377,20 @@ def external_principal_login(self, body : Optional[Dict[str, Any]] = None, **kwa kwargs['_return_http_data_only'] = True if '_preload_content' in kwargs: raise ValueError("Error! Please call the external_principal_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") - return self.external_principal_login_with_http_info(body, **kwargs) # noqa: E501 + return self.external_principal_login_with_http_info(external_login_information, **kwargs) # noqa: E501 @validate_arguments - def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any]] = None, **kwargs) -> ApiResponse: # noqa: E501 + def external_principal_login_with_http_info(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> ApiResponse: # noqa: E501 """perform a login using an external authenticator # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.external_principal_login_with_http_info(body, async_req=True) + >>> thread = api.external_principal_login_with_http_info(external_login_information, async_req=True) >>> result = thread.get() - :param body: - :type body: object + :param external_login_information: + :type external_login_information: ExternalLoginInformation :param async_req: Whether to execute the request asynchronously. :type async_req: bool, optional :param _preload_content: if False, the ApiResponse.data will @@ -418,7 +419,7 @@ def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any] _params = locals() _all_params = [ - 'body' + 'external_login_information' ] _all_params.extend( [ @@ -456,8 +457,8 @@ def external_principal_login_with_http_info(self, body : Optional[Dict[str, Any] _files = {} # process the body parameter _body_params = None - if _params['body'] is not None: - _body_params = _params['body'] + if _params['external_login_information'] is not None: + _body_params = _params['external_login_information'] # set the HTTP header `Accept` _header_params['Accept'] = self.api_client.select_header_accept( diff --git a/clients/python/lakefs_sdk/models/__init__.py b/clients/python/lakefs_sdk/models/__init__.py index ac53774ac3a..943a4a52f39 100644 --- a/clients/python/lakefs_sdk/models/__init__.py +++ b/clients/python/lakefs_sdk/models/__init__.py @@ -40,6 +40,7 @@ from lakefs_sdk.models.diff_list import DiffList from lakefs_sdk.models.error import Error from lakefs_sdk.models.error_no_acl import ErrorNoACL +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList diff --git a/clients/python/lakefs_sdk/models/external_login_information.py b/clients/python/lakefs_sdk/models/external_login_information.py new file mode 100644 index 00000000000..266b862dab0 --- /dev/null +++ b/clients/python/lakefs_sdk/models/external_login_information.py @@ -0,0 +1,74 @@ +# coding: utf-8 + +""" + lakeFS API + + lakeFS HTTP API + + The version of the OpenAPI document: 1.0.0 + Contact: services@treeverse.io + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +from __future__ import annotations +import pprint +import re # noqa: F401 +import json + + +from typing import Any, Dict, Optional +from pydantic import BaseModel, Field, StrictInt + +class ExternalLoginInformation(BaseModel): + """ + ExternalLoginInformation + """ + token_expiration_duration: Optional[StrictInt] = None + identity_request: Dict[str, Any] = Field(..., alias="identityRequest") + __properties = ["token_expiration_duration", "identityRequest"] + + class Config: + """Pydantic configuration""" + allow_population_by_field_name = True + validate_assignment = True + + def to_str(self) -> str: + """Returns the string representation of the model using alias""" + return pprint.pformat(self.dict(by_alias=True)) + + def to_json(self) -> str: + """Returns the JSON representation of the model using alias""" + return json.dumps(self.to_dict()) + + @classmethod + def from_json(cls, json_str: str) -> ExternalLoginInformation: + """Create an instance of ExternalLoginInformation from a JSON string""" + return cls.from_dict(json.loads(json_str)) + + def to_dict(self): + """Returns the dictionary representation of the model using alias""" + _dict = self.dict(by_alias=True, + exclude={ + }, + exclude_none=True) + return _dict + + @classmethod + def from_dict(cls, obj: dict) -> ExternalLoginInformation: + """Create an instance of ExternalLoginInformation from a dict""" + if obj is None: + return None + + if not isinstance(obj, dict): + return ExternalLoginInformation.parse_obj(obj) + + _obj = ExternalLoginInformation.parse_obj({ + "token_expiration_duration": obj.get("token_expiration_duration"), + "identity_request": obj.get("identityRequest") + }) + return _obj + + diff --git a/clients/python/test/test_external_login_information.py b/clients/python/test/test_external_login_information.py new file mode 100644 index 00000000000..b2cfb95eb4f --- /dev/null +++ b/clients/python/test/test_external_login_information.py @@ -0,0 +1,57 @@ +# coding: utf-8 + +""" + lakeFS API + + lakeFS HTTP API + + The version of the OpenAPI document: 1.0.0 + Contact: services@treeverse.io + Generated by OpenAPI Generator (https://openapi-generator.tech) + + Do not edit the class manually. +""" # noqa: E501 + + +import unittest +import datetime + +import lakefs_sdk +from lakefs_sdk.models.external_login_information import ExternalLoginInformation # noqa: E501 +from lakefs_sdk.rest import ApiException + +class TestExternalLoginInformation(unittest.TestCase): + """ExternalLoginInformation unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test ExternalLoginInformation + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # uncomment below to create an instance of `ExternalLoginInformation` + """ + model = lakefs_sdk.models.external_login_information.ExternalLoginInformation() # noqa: E501 + if include_optional : + return ExternalLoginInformation( + token_expiration_duration = 56, + identity_request = None + ) + else : + return ExternalLoginInformation( + identity_request = None, + ) + """ + + def testExternalLoginInformation(self): + """Test ExternalLoginInformation""" + # inst_req_only = self.make_instance(include_optional=False) + # inst_req_and_optional = self.make_instance(include_optional=True) + +if __name__ == '__main__': + unittest.main() diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index 54c9f8e6187..25ff0f74d8c 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -1053,6 +1053,13 @@ components: ExternalLoginInformation: type: object + required: + - identityRequest + properties: + token_expiration_duration: + type: integer + identityRequest: + type: object StsAuthRequest: type: object diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 1f6cfac3dcb..2394241c461 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -563,18 +563,15 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque return } c.LogAction(ctx, "external_principal_login", r, "", "", "") - externalPrincipal, err := c.Authentication.ExternalPrincipalLogin(ctx, body) - if c.handleAPIError(ctx, w, r, err) { - return - } - user, err := c.Auth.GetUserByExternalID(ctx, externalPrincipal.Id) + externalPrincipal, err := c.Authentication.ExternalPrincipalLogin(ctx, body.IdentityRequest) if c.handleAPIError(ctx, w, r, err) { return } + externalPrincipalIDInfo, err := c.Auth.GetExternalPrincipal(ctx, externalPrincipal.Id) - duration, ok := body["login_expire"].(time.Duration) - if !ok { - duration = c.Config.Auth.LoginDuration + duration := c.Config.Auth.LoginDuration + if swag.IntValue(body.TokenExpirationDuration) > 0 { + duration = time.Second * time.Duration(*body.TokenExpirationDuration) } if duration > c.Config.Auth.LoginMaxDuration { c.Logger.WithFields(logging.Fields{"duration": duration, "max_duration": c.Config.Auth.LoginMaxDuration}).Warn("Login duration exceeds maximum allowed, using maximum allowed") @@ -583,7 +580,7 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque loginTime := time.Now() expires := loginTime.Add(duration) secret := c.Auth.SecretStore().SharedSecret() - tokenString, err := GenerateJWTLogin(secret, *user.FriendlyName, loginTime.Unix(), expires.Unix()) + tokenString, err := GenerateJWTLogin(secret, externalPrincipalIDInfo.UserID, loginTime.Unix(), expires.Unix()) if err != nil { writeError(w, r, http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError)) return diff --git a/pkg/authentication/service.go b/pkg/authentication/service.go index fd4274eebc5..d84d6035a4e 100644 --- a/pkg/authentication/service.go +++ b/pkg/authentication/service.go @@ -17,7 +17,7 @@ import ( type Service interface { IsExternalPrincipalsEnabled() bool ValidateSTS(ctx context.Context, code, redirectURI, state string) (*STSResponseData, error) - ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (*apiclient.ExternalPrincipal, error) + ExternalPrincipalLogin(ctx context.Context, IdentityRequest map[string]interface{}) (*apiclient.ExternalPrincipal, error) } type DummyService struct{} @@ -133,11 +133,11 @@ func (s *APIService) ValidateSTS(ctx context.Context, code, redirectURI, state s }, nil } -func (s *APIService) ExternalPrincipalLogin(ctx context.Context, externalLoginInfo map[string]interface{}) (*apiclient.ExternalPrincipal, error) { +func (s *APIService) ExternalPrincipalLogin(ctx context.Context, IdentityRequest map[string]interface{}) (*apiclient.ExternalPrincipal, error) { if !s.IsExternalPrincipalsEnabled() { return nil, fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) } - resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, externalLoginInfo) + resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, IdentityRequest) if err != nil { return nil, fmt.Errorf("failed to authenticate user: %w", err) } From bbbe23ee20d74bb834127ce84a48239068cff387 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Tue, 2 Apr 2024 19:23:39 +0300 Subject: [PATCH 24/33] Fix test --- pkg/authentication/service_test.go | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/pkg/authentication/service_test.go b/pkg/authentication/service_test.go index 16799c1f7c6..cf223d4d0d1 100644 --- a/pkg/authentication/service_test.go +++ b/pkg/authentication/service_test.go @@ -158,7 +158,6 @@ func TestAPIAuthService_ExternalLogin(t *testing.T) { mockClient, s := NewTestApiService(t, map[string]string{}, true) ctx := context.Background() principalId := "arn" - userId := "userId" externalLoginInfo := map[string]interface{}{"IdentityToken": "Token"} mockClient.EXPECT().ExternalPrincipalLoginWithResponse(gomock.Any(), gomock.Eq(externalLoginInfo)).Return( @@ -166,11 +165,10 @@ func TestAPIAuthService_ExternalLogin(t *testing.T) { HTTPResponse: &http.Response{ StatusCode: http.StatusOK, }, - JSON200: &apiclient.ExternalPrincipal{Id: principalId, UserId: userId}, + JSON200: &apiclient.ExternalPrincipal{Id: principalId}, }, nil) resp, err := s.ExternalPrincipalLogin(ctx, externalLoginInfo) require.NoError(t, err) require.Equal(t, principalId, resp.Id) - require.Equal(t, userId, resp.UserId) } From 9fbc1b0c39e7fd4d5903f5b553b9879de8ff841d Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Tue, 2 Apr 2024 19:36:56 +0300 Subject: [PATCH 25/33] Lint --- pkg/authentication/service.go | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkg/authentication/service.go b/pkg/authentication/service.go index d84d6035a4e..b9b462115cf 100644 --- a/pkg/authentication/service.go +++ b/pkg/authentication/service.go @@ -17,7 +17,7 @@ import ( type Service interface { IsExternalPrincipalsEnabled() bool ValidateSTS(ctx context.Context, code, redirectURI, state string) (*STSResponseData, error) - ExternalPrincipalLogin(ctx context.Context, IdentityRequest map[string]interface{}) (*apiclient.ExternalPrincipal, error) + ExternalPrincipalLogin(ctx context.Context, identityRequest map[string]interface{}) (*apiclient.ExternalPrincipal, error) } type DummyService struct{} @@ -133,11 +133,11 @@ func (s *APIService) ValidateSTS(ctx context.Context, code, redirectURI, state s }, nil } -func (s *APIService) ExternalPrincipalLogin(ctx context.Context, IdentityRequest map[string]interface{}) (*apiclient.ExternalPrincipal, error) { +func (s *APIService) ExternalPrincipalLogin(ctx context.Context, identityRequest map[string]interface{}) (*apiclient.ExternalPrincipal, error) { if !s.IsExternalPrincipalsEnabled() { return nil, fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) } - resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, IdentityRequest) + resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, identityRequest) if err != nil { return nil, fmt.Errorf("failed to authenticate user: %w", err) } From 68422ae491d0878a475af4b252725ad763a054eb Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 3 Apr 2024 11:44:21 +0300 Subject: [PATCH 26/33] Fix --- pkg/api/controller.go | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 99a429d31d7..d7636cf3861 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -571,7 +571,9 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque return } externalPrincipalIDInfo, err := c.Auth.GetExternalPrincipal(ctx, externalPrincipal.Id) - + if c.handleAPIError(ctx, w, r, err) { + return + } duration := c.Config.Auth.LoginDuration if swag.IntValue(body.TokenExpirationDuration) > 0 { duration = time.Second * time.Duration(*body.TokenExpirationDuration) From e8a2349f355f0db3529c48d7eac0c284f2a1a1a1 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Sun, 7 Apr 2024 13:19:38 +0300 Subject: [PATCH 27/33] Update docs --- api/swagger.yml | 4 +-- clients/java-legacy/api/openapi.yaml | 4 +-- clients/java-legacy/docs/StsAuthRequest.md | 2 +- .../clients/api/model/StsAuthRequest.java | 4 +-- clients/java/api/openapi.yaml | 4 +-- clients/java/docs/StsAuthRequest.md | 2 +- .../clients/sdk/model/StsAuthRequest.java | 2 +- clients/python-legacy/docs/StsAuthRequest.md | 2 +- .../lakefs_client/model/sts_auth_request.py | 4 +-- clients/python/docs/StsAuthRequest.md | 2 +- .../lakefs_sdk/models/sts_auth_request.py | 2 +- docs/assets/js/swagger.yml | 4 +-- docs/reference/configuration.md | 1 + lakefs.yaml | 32 +++++++++++++++++++ 14 files changed, 51 insertions(+), 18 deletions(-) diff --git a/api/swagger.yml b/api/swagger.yml index 82cb8912c6d..7f7e38a8011 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -1078,8 +1078,8 @@ components: type: integer format: int64 description: | - The time-to-live for the generated token in seconds. The maximum - value is 3600 seconds (1 hour) max is 12 hours. + The time-to-live for the generated token in seconds. The default + value is 3600 seconds (1 hour) maximum time allowed is 12 hours. AuthenticationToken: type: object required: diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index c4e25c99cb7..fecf69d145c 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -8257,8 +8257,8 @@ components: type: string ttl_seconds: description: | - The time-to-live for the generated token in seconds. The maximum - value is 3600 seconds (1 hour) max is 12 hours. + The time-to-live for the generated token in seconds. The default + value is 3600 seconds (1 hour) maximum time allowed is 12 hours. format: int64 type: integer required: diff --git a/clients/java-legacy/docs/StsAuthRequest.md b/clients/java-legacy/docs/StsAuthRequest.md index ee58c5376c9..fa6d915593e 100644 --- a/clients/java-legacy/docs/StsAuthRequest.md +++ b/clients/java-legacy/docs/StsAuthRequest.md @@ -10,7 +10,7 @@ Name | Type | Description | Notes **code** | **String** | | **state** | **String** | | **redirectUri** | **String** | | -**ttlSeconds** | **Long** | The time-to-live for the generated token in seconds. The maximum value is 3600 seconds (1 hour) max is 12 hours. | [optional] +**ttlSeconds** | **Long** | The time-to-live for the generated token in seconds. The default value is 3600 seconds (1 hour) maximum time allowed is 12 hours. | [optional] diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/model/StsAuthRequest.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/model/StsAuthRequest.java index 18be384d5c5..38bac11faf1 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/model/StsAuthRequest.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/model/StsAuthRequest.java @@ -122,11 +122,11 @@ public StsAuthRequest ttlSeconds(Long ttlSeconds) { } /** - * The time-to-live for the generated token in seconds. The maximum value is 3600 seconds (1 hour) max is 12 hours. + * The time-to-live for the generated token in seconds. The default value is 3600 seconds (1 hour) maximum time allowed is 12 hours. * @return ttlSeconds **/ @javax.annotation.Nullable - @ApiModelProperty(value = "The time-to-live for the generated token in seconds. The maximum value is 3600 seconds (1 hour) max is 12 hours. ") + @ApiModelProperty(value = "The time-to-live for the generated token in seconds. The default value is 3600 seconds (1 hour) maximum time allowed is 12 hours. ") public Long getTtlSeconds() { return ttlSeconds; diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index aa060f0b557..de1326f27f0 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -8231,8 +8231,8 @@ components: type: string ttl_seconds: description: | - The time-to-live for the generated token in seconds. The maximum - value is 3600 seconds (1 hour) max is 12 hours. + The time-to-live for the generated token in seconds. The default + value is 3600 seconds (1 hour) maximum time allowed is 12 hours. format: int64 type: integer required: diff --git a/clients/java/docs/StsAuthRequest.md b/clients/java/docs/StsAuthRequest.md index bf1683b4810..0aec048a03e 100644 --- a/clients/java/docs/StsAuthRequest.md +++ b/clients/java/docs/StsAuthRequest.md @@ -10,7 +10,7 @@ |**code** | **String** | | | |**state** | **String** | | | |**redirectUri** | **String** | | | -|**ttlSeconds** | **Long** | The time-to-live for the generated token in seconds. The maximum value is 3600 seconds (1 hour) max is 12 hours. | [optional] | +|**ttlSeconds** | **Long** | The time-to-live for the generated token in seconds. The default value is 3600 seconds (1 hour) maximum time allowed is 12 hours. | [optional] | diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/model/StsAuthRequest.java b/clients/java/src/main/java/io/lakefs/clients/sdk/model/StsAuthRequest.java index 5d6bd245e2c..b3e67353f7d 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/model/StsAuthRequest.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/model/StsAuthRequest.java @@ -141,7 +141,7 @@ public StsAuthRequest ttlSeconds(Long ttlSeconds) { } /** - * The time-to-live for the generated token in seconds. The maximum value is 3600 seconds (1 hour) max is 12 hours. + * The time-to-live for the generated token in seconds. The default value is 3600 seconds (1 hour) maximum time allowed is 12 hours. * @return ttlSeconds **/ @javax.annotation.Nullable diff --git a/clients/python-legacy/docs/StsAuthRequest.md b/clients/python-legacy/docs/StsAuthRequest.md index c21cd844ee1..3ed7faaa7a9 100644 --- a/clients/python-legacy/docs/StsAuthRequest.md +++ b/clients/python-legacy/docs/StsAuthRequest.md @@ -7,7 +7,7 @@ Name | Type | Description | Notes **code** | **str** | | **state** | **str** | | **redirect_uri** | **str** | | -**ttl_seconds** | **int** | The time-to-live for the generated token in seconds. The maximum value is 3600 seconds (1 hour) max is 12 hours. | [optional] +**ttl_seconds** | **int** | The time-to-live for the generated token in seconds. The default value is 3600 seconds (1 hour) maximum time allowed is 12 hours. | [optional] **any string name** | **bool, date, datetime, dict, float, int, list, str, none_type** | any string name can be used but the value must be the correct type | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/clients/python-legacy/lakefs_client/model/sts_auth_request.py b/clients/python-legacy/lakefs_client/model/sts_auth_request.py index 6cea53cffc8..fde8b5f19dd 100644 --- a/clients/python-legacy/lakefs_client/model/sts_auth_request.py +++ b/clients/python-legacy/lakefs_client/model/sts_auth_request.py @@ -146,7 +146,7 @@ def _from_openapi_data(cls, code, state, redirect_uri, *args, **kwargs): # noqa Animal class but this time we won't travel through its discriminator because we passed in _visited_composed_classes = (Animal,) - ttl_seconds (int): The time-to-live for the generated token in seconds. The maximum value is 3600 seconds (1 hour) max is 12 hours. . [optional] # noqa: E501 + ttl_seconds (int): The time-to-live for the generated token in seconds. The default value is 3600 seconds (1 hour) maximum time allowed is 12 hours. . [optional] # noqa: E501 """ _check_type = kwargs.pop('_check_type', True) @@ -236,7 +236,7 @@ def __init__(self, code, state, redirect_uri, *args, **kwargs): # noqa: E501 Animal class but this time we won't travel through its discriminator because we passed in _visited_composed_classes = (Animal,) - ttl_seconds (int): The time-to-live for the generated token in seconds. The maximum value is 3600 seconds (1 hour) max is 12 hours. . [optional] # noqa: E501 + ttl_seconds (int): The time-to-live for the generated token in seconds. The default value is 3600 seconds (1 hour) maximum time allowed is 12 hours. . [optional] # noqa: E501 """ _check_type = kwargs.pop('_check_type', True) diff --git a/clients/python/docs/StsAuthRequest.md b/clients/python/docs/StsAuthRequest.md index 430a34cdc0c..2ec418f8f36 100644 --- a/clients/python/docs/StsAuthRequest.md +++ b/clients/python/docs/StsAuthRequest.md @@ -8,7 +8,7 @@ Name | Type | Description | Notes **code** | **str** | | **state** | **str** | | **redirect_uri** | **str** | | -**ttl_seconds** | **int** | The time-to-live for the generated token in seconds. The maximum value is 3600 seconds (1 hour) max is 12 hours. | [optional] +**ttl_seconds** | **int** | The time-to-live for the generated token in seconds. The default value is 3600 seconds (1 hour) maximum time allowed is 12 hours. | [optional] ## Example diff --git a/clients/python/lakefs_sdk/models/sts_auth_request.py b/clients/python/lakefs_sdk/models/sts_auth_request.py index c588f98d3f0..7ae48616940 100644 --- a/clients/python/lakefs_sdk/models/sts_auth_request.py +++ b/clients/python/lakefs_sdk/models/sts_auth_request.py @@ -29,7 +29,7 @@ class StsAuthRequest(BaseModel): code: StrictStr = Field(...) state: StrictStr = Field(...) redirect_uri: StrictStr = Field(...) - ttl_seconds: Optional[StrictInt] = Field(None, description="The time-to-live for the generated token in seconds. The maximum value is 3600 seconds (1 hour) max is 12 hours. ") + ttl_seconds: Optional[StrictInt] = Field(None, description="The time-to-live for the generated token in seconds. The default value is 3600 seconds (1 hour) maximum time allowed is 12 hours. ") __properties = ["code", "state", "redirect_uri", "ttl_seconds"] class Config: diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index 82cb8912c6d..7f7e38a8011 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -1078,8 +1078,8 @@ components: type: integer format: int64 description: | - The time-to-live for the generated token in seconds. The maximum - value is 3600 seconds (1 hour) max is 12 hours. + The time-to-live for the generated token in seconds. The default + value is 3600 seconds (1 hour) maximum time allowed is 12 hours. AuthenticationToken: type: object required: diff --git a/docs/reference/configuration.md b/docs/reference/configuration.md index 5134bc9ca42..60e39c54d4b 100644 --- a/docs/reference/configuration.md +++ b/docs/reference/configuration.md @@ -84,6 +84,7 @@ This reference uses `.` to denote the nesting of values. * `auth.cache.jitter` `(time duration : "3s")` - A random amount of time between 0 and this value is added to each item's TTL. This is done to avoid a large bulk of keys expiring at once and overwhelming the database. * `auth.encrypt.secret_key` `(string : required)` - A random (cryptographically safe) generated string that is used for encryption and HMAC signing * `auth.login_duration` `(time duration : "168h")` - The duration the login token is valid for +* `auth.login_max_duration` `(time duration : "168h")` - The maximum duration user can ask for a login token * `auth.cookie_domain` `(string : "")` - [Domain attribute](https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#define_where_cookies_are_sent) to set the access_token cookie on (the default is an empty string which defaults to the same host that sets the cookie) * `auth.api.endpoint` `(string: https://external.service/api/v1)` - URL to external Authorization Service described at [authorization.yml](https://github.com/treeverse/lakeFS/blob/master/api/authorization.yml); * `auth.api.token` `(string: eyJhbGciOiJIUzI1NiIsInR5...)` - API token used to authenticate requests to api endpoint diff --git a/lakefs.yaml b/lakefs.yaml index e69de29bb2d..42d80536c3a 100644 --- a/lakefs.yaml +++ b/lakefs.yaml @@ -0,0 +1,32 @@ +security: + check_latest_version_cache: false +# database: +# type: local +database: + type: postgres + postgres: + connection_string: postgres://lakefs:lakefs@localhost:5433/postgres?sslmode=disable + +logging: + audit_log_level: "INFO" + +blockstore: + type: local + local: + path: /tmp/lakefs/iam_auth + +auth: + authentication_api: + endpoint: http://localhost:8080/api/v1 + api: + #endpoint: https://auth.us-east-1.internal.lakefscloud.ninja/api/v1 + endpoint: http://localhost:9006/api/v1 + supports_invites: true + remote_authenticator: + enabled: true + external_principals_enabled: true + endpoint: http://localhost:9006/api/v1 + encrypt: + secret_key: shared-secrey-key + ui_config: + rbac: internal From 77f7bb3498a618065b14e817934faf8e3383b503 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Tue, 9 Apr 2024 18:36:26 +0300 Subject: [PATCH 28/33] PR review --- lakefs.yaml | 32 -------------------------------- pkg/api/controller.go | 6 ++++++ pkg/authentication/service.go | 4 ++-- 3 files changed, 8 insertions(+), 34 deletions(-) delete mode 100644 lakefs.yaml diff --git a/lakefs.yaml b/lakefs.yaml deleted file mode 100644 index 42d80536c3a..00000000000 --- a/lakefs.yaml +++ /dev/null @@ -1,32 +0,0 @@ -security: - check_latest_version_cache: false -# database: -# type: local -database: - type: postgres - postgres: - connection_string: postgres://lakefs:lakefs@localhost:5433/postgres?sslmode=disable - -logging: - audit_log_level: "INFO" - -blockstore: - type: local - local: - path: /tmp/lakefs/iam_auth - -auth: - authentication_api: - endpoint: http://localhost:8080/api/v1 - api: - #endpoint: https://auth.us-east-1.internal.lakefscloud.ninja/api/v1 - endpoint: http://localhost:9006/api/v1 - supports_invites: true - remote_authenticator: - enabled: true - external_principals_enabled: true - endpoint: http://localhost:9006/api/v1 - encrypt: - secret_key: shared-secrey-key - ui_config: - rbac: internal diff --git a/pkg/api/controller.go b/pkg/api/controller.go index d7636cf3861..574d0d5a1af 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -566,14 +566,19 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque return } c.LogAction(ctx, "external_principal_login", r, "", "", "") + c.Logger.Debug("external principal login") externalPrincipal, err := c.Authentication.ExternalPrincipalLogin(ctx, body.IdentityRequest) if c.handleAPIError(ctx, w, r, err) { + c.Logger.WithError(err).Error("external principal login failed") return } + c.Logger.WithField("external_principal_id", externalPrincipal.Id).Debug("external principal login success, trying to get external principal ID info") externalPrincipalIDInfo, err := c.Auth.GetExternalPrincipal(ctx, externalPrincipal.Id) if c.handleAPIError(ctx, w, r, err) { + c.Logger.WithField("external_principal_id", externalPrincipal.Id).WithError(err).Error("failed to get external principal ID info") return } + c.Logger.WithField("user_id", externalPrincipalIDInfo.UserID).Debug("got external principal ID info, generating a new JWT") duration := c.Config.Auth.LoginDuration if swag.IntValue(body.TokenExpirationDuration) > 0 { duration = time.Second * time.Duration(*body.TokenExpirationDuration) @@ -587,6 +592,7 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque secret := c.Auth.SecretStore().SharedSecret() tokenString, err := GenerateJWTLogin(secret, externalPrincipalIDInfo.UserID, loginTime, expires) if err != nil { + c.Logger.WithField("user_id", externalPrincipalIDInfo.UserID).WithError(err).Error("failed to generate JWT") writeError(w, r, http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError)) return } diff --git a/pkg/authentication/service.go b/pkg/authentication/service.go index 7e8ef7623f3..7f34df44b51 100644 --- a/pkg/authentication/service.go +++ b/pkg/authentication/service.go @@ -123,11 +123,11 @@ func (s *APIService) ExternalPrincipalLogin(ctx context.Context, identityRequest } resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, identityRequest) if err != nil { - return nil, fmt.Errorf("failed to authenticate user: %w", err) + return nil, fmt.Errorf("calling authenticate user: %w", err) } if resp.StatusCode() != http.StatusOK { - return nil, fmt.Errorf("failed to authenticate user: %w", ErrInvalidRequest) + return nil, fmt.Errorf("calling authenticate user: %w, status code: %d", ErrInvalidRequest, resp.StatusCode()) } return resp.JSON200, nil From 77b65c1ed9a0b341678a479631c53f9e5402a2a8 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 10 Apr 2024 10:11:05 +0300 Subject: [PATCH 29/33] Return external login status code --- pkg/api/controller.go | 16 +++++++++++++++- pkg/authentication/service.go | 17 ++++------------- pkg/authentication/service_test.go | 2 +- 3 files changed, 20 insertions(+), 15 deletions(-) diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 574d0d5a1af..7dfc988652d 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -567,11 +567,25 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque } c.LogAction(ctx, "external_principal_login", r, "", "", "") c.Logger.Debug("external principal login") - externalPrincipal, err := c.Authentication.ExternalPrincipalLogin(ctx, body.IdentityRequest) + externalPrincipalLoginResponse, err := c.Authentication.ExternalPrincipalLogin(ctx, body.IdentityRequest) if c.handleAPIError(ctx, w, r, err) { c.Logger.WithError(err).Error("external principal login failed") return } + if externalPrincipalLoginResponse.StatusCode() != http.StatusOK || externalPrincipalLoginResponse.JSON200 == nil { + switch externalPrincipalLoginResponse.StatusCode() { + case http.StatusBadRequest: + writeError(w, r, http.StatusBadRequest, "Bad Request") + case http.StatusUnauthorized: + writeError(w, r, http.StatusUnauthorized, "Unauthorized") + case http.StatusForbidden: + writeError(w, r, http.StatusForbidden, "Forbidden") + default: + writeError(w, r, http.StatusInternalServerError, "Internal Server Error") + } + return + } + externalPrincipal := externalPrincipalLoginResponse.JSON200 c.Logger.WithField("external_principal_id", externalPrincipal.Id).Debug("external principal login success, trying to get external principal ID info") externalPrincipalIDInfo, err := c.Auth.GetExternalPrincipal(ctx, externalPrincipal.Id) if c.handleAPIError(ctx, w, r, err) { diff --git a/pkg/authentication/service.go b/pkg/authentication/service.go index 7f34df44b51..73521877f2c 100644 --- a/pkg/authentication/service.go +++ b/pkg/authentication/service.go @@ -15,7 +15,7 @@ import ( type Service interface { IsExternalPrincipalsEnabled() bool - ExternalPrincipalLogin(ctx context.Context, identityRequest map[string]interface{}) (*apiclient.ExternalPrincipal, error) + ExternalPrincipalLogin(ctx context.Context, identityRequest map[string]interface{}) (*apiclient.ExternalPrincipalLoginResponse, error) // ValidateSTS validates the STS parameters and returns the external user ID ValidateSTS(ctx context.Context, code, redirectURI, state string) (string, error) } @@ -30,7 +30,7 @@ func (d DummyService) ValidateSTS(ctx context.Context, code, redirectURI, state return "", ErrNotImplemented } -func (d DummyService) ExternalPrincipalLogin(_ context.Context, _ map[string]interface{}) (*apiclient.ExternalPrincipal, error) { +func (d DummyService) ExternalPrincipalLogin(_ context.Context, _ map[string]interface{}) (*apiclient.ExternalPrincipalLoginResponse, error) { return nil, ErrNotImplemented } @@ -117,20 +117,11 @@ func (s *APIService) ValidateSTS(ctx context.Context, code, redirectURI, state s return subject, nil } -func (s *APIService) ExternalPrincipalLogin(ctx context.Context, identityRequest map[string]interface{}) (*apiclient.ExternalPrincipal, error) { +func (s *APIService) ExternalPrincipalLogin(ctx context.Context, identityRequest map[string]interface{}) (*apiclient.ExternalPrincipalLoginResponse, error) { if !s.IsExternalPrincipalsEnabled() { return nil, fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) } - resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, identityRequest) - if err != nil { - return nil, fmt.Errorf("calling authenticate user: %w", err) - } - - if resp.StatusCode() != http.StatusOK { - return nil, fmt.Errorf("calling authenticate user: %w, status code: %d", ErrInvalidRequest, resp.StatusCode()) - } - - return resp.JSON200, nil + return s.apiClient.ExternalPrincipalLoginWithResponse(ctx, identityRequest) } func (s *APIService) IsExternalPrincipalsEnabled() bool { diff --git a/pkg/authentication/service_test.go b/pkg/authentication/service_test.go index 6235f9abb8c..8e7cabec421 100644 --- a/pkg/authentication/service_test.go +++ b/pkg/authentication/service_test.go @@ -148,5 +148,5 @@ func TestAPIAuthService_ExternalLogin(t *testing.T) { resp, err := s.ExternalPrincipalLogin(ctx, externalLoginInfo) require.NoError(t, err) - require.Equal(t, principalId, resp.Id) + require.Equal(t, principalId, resp.JSON200.Id) } From 6bdbe62fc19938f3dd8ec5fd4803d02d52948337 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 10 Apr 2024 14:10:34 +0300 Subject: [PATCH 30/33] Error handling --- cmd/lakefs/cmd/run.go | 4 +-- pkg/api/controller.go | 27 +++++++------------ pkg/auth/remoteauthenticator/authenticator.go | 2 -- pkg/authentication/service.go | 24 ++++++++++++++--- pkg/authentication/service_test.go | 2 +- pkg/config/config.go | 6 ++--- 6 files changed, 35 insertions(+), 30 deletions(-) diff --git a/cmd/lakefs/cmd/run.go b/cmd/lakefs/cmd/run.go index 64d6055afdc..ac994a88f0c 100644 --- a/cmd/lakefs/cmd/run.go +++ b/cmd/lakefs/cmd/run.go @@ -121,7 +121,7 @@ var runCmd = &cobra.Command{ apiService, err := auth.NewAPIAuthService( cfg.Auth.API.Endpoint, cfg.Auth.API.Token.SecureValue(), - cfg.Auth.RemoteAuthenticator.ExternalPrincipalsEnabled, + cfg.Auth.AuthenticationAPI.ExternalPrincipalsEnabled, crypt.NewSecretStore([]byte(cfg.Auth.Encrypt.SecretKey)), authparams.ServiceCache(cfg.Auth.Cache), logger.WithField("service", "auth_api"), @@ -146,7 +146,7 @@ var runCmd = &cobra.Command{ // initialize authentication service var authenticationService authentication.Service if cfg.IsAuthenticationTypeAPI() { - authenticationService, err = authentication.NewAPIService(cfg.Auth.AuthenticationAPI.Endpoint, cfg.Auth.CookieAuthVerification.ValidateIDTokenClaims, logger.WithField("service", "authentication_api"), cfg.Auth.RemoteAuthenticator.ExternalPrincipalsEnabled) + authenticationService, err = authentication.NewAPIService(cfg.Auth.AuthenticationAPI.Endpoint, cfg.Auth.CookieAuthVerification.ValidateIDTokenClaims, logger.WithField("service", "authentication_api"), cfg.Auth.AuthenticationAPI.ExternalPrincipalsEnabled) if err != nil { logger.WithError(err).Fatal("failed to create authentication service") } diff --git a/pkg/api/controller.go b/pkg/api/controller.go index 7dfc988652d..11e0823bac6 100644 --- a/pkg/api/controller.go +++ b/pkg/api/controller.go @@ -567,25 +567,11 @@ func (c *Controller) ExternalPrincipalLogin(w http.ResponseWriter, r *http.Reque } c.LogAction(ctx, "external_principal_login", r, "", "", "") c.Logger.Debug("external principal login") - externalPrincipalLoginResponse, err := c.Authentication.ExternalPrincipalLogin(ctx, body.IdentityRequest) + externalPrincipal, err := c.Authentication.ExternalPrincipalLogin(ctx, body.IdentityRequest) if c.handleAPIError(ctx, w, r, err) { c.Logger.WithError(err).Error("external principal login failed") return } - if externalPrincipalLoginResponse.StatusCode() != http.StatusOK || externalPrincipalLoginResponse.JSON200 == nil { - switch externalPrincipalLoginResponse.StatusCode() { - case http.StatusBadRequest: - writeError(w, r, http.StatusBadRequest, "Bad Request") - case http.StatusUnauthorized: - writeError(w, r, http.StatusUnauthorized, "Unauthorized") - case http.StatusForbidden: - writeError(w, r, http.StatusForbidden, "Forbidden") - default: - writeError(w, r, http.StatusInternalServerError, "Internal Server Error") - } - return - } - externalPrincipal := externalPrincipalLoginResponse.JSON200 c.Logger.WithField("external_principal_id", externalPrincipal.Id).Debug("external principal login success, trying to get external principal ID info") externalPrincipalIDInfo, err := c.Auth.GetExternalPrincipal(ctx, externalPrincipal.Id) if c.handleAPIError(ctx, w, r, err) { @@ -2660,10 +2646,15 @@ func (c *Controller) handleAPIErrorCallback(ctx context.Context, w http.Response case errors.Is(err, block.ErrForbidden), errors.Is(err, graveler.ErrProtectedBranch), - errors.Is(err, graveler.ErrReadOnlyRepository), - errors.Is(err, authentication.ErrSessionExpired): + errors.Is(err, graveler.ErrReadOnlyRepository): cb(w, r, http.StatusForbidden, err) + case errors.Is(err, authentication.ErrSessionExpired): + cb(w, r, http.StatusForbidden, "session expired") + + case errors.Is(err, authentication.ErrInvalidTokenFormat): + cb(w, r, http.StatusUnauthorized, "invalid token format") + case errors.Is(err, graveler.ErrDirtyBranch), errors.Is(err, graveler.ErrCommitMetaRangeDirtyBranch), errors.Is(err, graveler.ErrInvalidValue), @@ -2681,7 +2672,7 @@ func (c *Controller) handleAPIErrorCallback(ctx context.Context, w http.Response errors.Is(err, graveler.ErrInvalidMergeStrategy), errors.Is(err, block.ErrInvalidAddress), errors.Is(err, block.ErrOperationNotSupported), - errors.Is(err, authentication.ErrInvalidTokenFormat): + errors.Is(err, authentication.ErrInvalidRequest): log.Debug("Bad request") cb(w, r, http.StatusBadRequest, err) diff --git a/pkg/auth/remoteauthenticator/authenticator.go b/pkg/auth/remoteauthenticator/authenticator.go index e79c0775bdd..2b59ddeb393 100644 --- a/pkg/auth/remoteauthenticator/authenticator.go +++ b/pkg/auth/remoteauthenticator/authenticator.go @@ -24,8 +24,6 @@ var ErrBadConfig = errors.New("invalid configuration") type AuthenticatorConfig struct { // Enabled if set true will enable authenticator Enabled bool - // ExternalPrincipalAuth support external principals - ExternalPrincipalsEnabled bool // Endpoint URL of the remote authentication service (e.g. https://my-auth.example.com/auth) Endpoint string // DefaultUserGroup is the default group for the users authenticated by the remote service diff --git a/pkg/authentication/service.go b/pkg/authentication/service.go index 73521877f2c..afffb12c988 100644 --- a/pkg/authentication/service.go +++ b/pkg/authentication/service.go @@ -15,7 +15,7 @@ import ( type Service interface { IsExternalPrincipalsEnabled() bool - ExternalPrincipalLogin(ctx context.Context, identityRequest map[string]interface{}) (*apiclient.ExternalPrincipalLoginResponse, error) + ExternalPrincipalLogin(ctx context.Context, identityRequest map[string]interface{}) (*apiclient.ExternalPrincipal, error) // ValidateSTS validates the STS parameters and returns the external user ID ValidateSTS(ctx context.Context, code, redirectURI, state string) (string, error) } @@ -30,7 +30,7 @@ func (d DummyService) ValidateSTS(ctx context.Context, code, redirectURI, state return "", ErrNotImplemented } -func (d DummyService) ExternalPrincipalLogin(_ context.Context, _ map[string]interface{}) (*apiclient.ExternalPrincipalLoginResponse, error) { +func (d DummyService) ExternalPrincipalLogin(_ context.Context, _ map[string]interface{}) (*apiclient.ExternalPrincipal, error) { return nil, ErrNotImplemented } @@ -117,11 +117,27 @@ func (s *APIService) ValidateSTS(ctx context.Context, code, redirectURI, state s return subject, nil } -func (s *APIService) ExternalPrincipalLogin(ctx context.Context, identityRequest map[string]interface{}) (*apiclient.ExternalPrincipalLoginResponse, error) { +func (s *APIService) ExternalPrincipalLogin(ctx context.Context, identityRequest map[string]interface{}) (*apiclient.ExternalPrincipal, error) { if !s.IsExternalPrincipalsEnabled() { return nil, fmt.Errorf("external principals disabled: %w", ErrInvalidRequest) } - return s.apiClient.ExternalPrincipalLoginWithResponse(ctx, identityRequest) + resp, err := s.apiClient.ExternalPrincipalLoginWithResponse(ctx, identityRequest) + if err != nil { + return nil, fmt.Errorf("calling authenticate user: %w", err) + } + if resp.StatusCode() != http.StatusOK || resp.JSON200 == nil { + switch resp.StatusCode() { + case http.StatusBadRequest: + return nil, ErrInvalidRequest + case http.StatusUnauthorized: + return nil, ErrInvalidTokenFormat + case http.StatusForbidden: + return nil, ErrSessionExpired + default: + return nil, fmt.Errorf("%w - got %d expected %d", ErrUnexpectedStatusCode, resp.StatusCode(), http.StatusOK) + } + } + return resp.JSON200, nil } func (s *APIService) IsExternalPrincipalsEnabled() bool { diff --git a/pkg/authentication/service_test.go b/pkg/authentication/service_test.go index 8e7cabec421..6235f9abb8c 100644 --- a/pkg/authentication/service_test.go +++ b/pkg/authentication/service_test.go @@ -148,5 +148,5 @@ func TestAPIAuthService_ExternalLogin(t *testing.T) { resp, err := s.ExternalPrincipalLogin(ctx, externalLoginInfo) require.NoError(t, err) - require.Equal(t, principalId, resp.JSON200.Id) + require.Equal(t, principalId, resp.Id) } diff --git a/pkg/config/config.go b/pkg/config/config.go index 353c7ff2c4f..630be306a98 100644 --- a/pkg/config/config.go +++ b/pkg/config/config.go @@ -190,12 +190,12 @@ type Config struct { AuthenticationAPI struct { // Endpoint for authentication operations Endpoint string `mapstructure:"endpoint"` + // ExternalPrincipalAuth configuration related external principals + ExternalPrincipalsEnabled bool `mapstructure:"external_principals_enabled"` } `mapstructure:"authentication_api"` RemoteAuthenticator struct { // Enabled if set true will enable remote authentication Enabled bool `mapstructure:"enabled"` - // ExternalPrincipalAuth configuration related external principals - ExternalPrincipalsEnabled bool `mapstructure:"external_principals_enabled"` // Endpoint URL of the remote authentication service (e.g. https://my-auth.example.com/auth) Endpoint string `mapstructure:"endpoint"` // DefaultUserGroup is the default group for the users authenticated by the remote service @@ -542,7 +542,7 @@ func (c *Config) IsAuthTypeAPI() bool { func (c *Config) IsExternalPrincipalsEnabled() bool { // IsAuthTypeAPI must be true since the local auth service doesnt support external principals // ExternalPrincipalsEnabled indicates that the remote auth service enables external principals support since its optional extension - return c.IsAuthTypeAPI() && c.Auth.RemoteAuthenticator.ExternalPrincipalsEnabled + return c.IsAuthTypeAPI() && c.Auth.AuthenticationAPI.ExternalPrincipalsEnabled } func (c *Config) UISnippets() []apiparams.CodeSnippet { From 05a794a069c1bfc17ff0de1b5b407fa9164b64ce Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 10 Apr 2024 15:49:34 +0300 Subject: [PATCH 31/33] PR review --- docs/reference/configuration.md | 2 ++ pkg/authentication/service.go | 2 +- 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/docs/reference/configuration.md b/docs/reference/configuration.md index 60e39c54d4b..d6a524364c8 100644 --- a/docs/reference/configuration.md +++ b/docs/reference/configuration.md @@ -90,6 +90,8 @@ This reference uses `.` to denote the nesting of values. * `auth.api.token` `(string: eyJhbGciOiJIUzI1NiIsInR5...)` - API token used to authenticate requests to api endpoint * `auth.api.health_check_timeout` `(time duration : "20s")` - Timeout duration for external auth API health check * `auth.api.skip_health_check` `(bool : false)` - Skip external auth API health check +* `auth.authentication_api.endpoint` `(string : "")` - URL to external Authentication Service described at [authentication.yml](https://github.com/treeverse/lakeFS/blob/master/api/authentication.yml); +* `auth.authentication_api.external_principals_enabled` `(bool : false)` - If true, external principals API will be enabled, e.g auth service and login api's. **Note:** It is best to keep this somewhere safe such as KMS or Hashicorp Vault, and provide it to the system at run time {: .note } diff --git a/pkg/authentication/service.go b/pkg/authentication/service.go index afffb12c988..ac13f4f15f9 100644 --- a/pkg/authentication/service.go +++ b/pkg/authentication/service.go @@ -125,7 +125,7 @@ func (s *APIService) ExternalPrincipalLogin(ctx context.Context, identityRequest if err != nil { return nil, fmt.Errorf("calling authenticate user: %w", err) } - if resp.StatusCode() != http.StatusOK || resp.JSON200 == nil { + if resp.StatusCode() != http.StatusOK { switch resp.StatusCode() { case http.StatusBadRequest: return nil, ErrInvalidRequest From 1a2755f4fa623840a7a4e230c6b8b9f37968c1bd Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 10 Apr 2024 15:53:44 +0300 Subject: [PATCH 32/33] Docs update --- api/swagger.yml | 1 + clients/java-legacy/README.md | 1 + clients/java-legacy/api/openapi.yaml | 1 + clients/java-legacy/docs/AuthApi.md | 67 +++++++ .../java/io/lakefs/clients/api/AuthApi.java | 131 ++++++++++++ .../io/lakefs/clients/api/AuthApiTest.java | 16 ++ clients/java/README.md | 1 + clients/java/api/openapi.yaml | 1 + clients/java/docs/AuthApi.md | 69 +++++++ .../java/io/lakefs/clients/sdk/AuthApi.java | 186 ++++++++++++++++++ .../io/lakefs/clients/sdk/AuthApiTest.java | 15 ++ clients/python-legacy/README.md | 1 + clients/python-legacy/docs/AuthApi.md | 78 ++++++++ .../lakefs_client/api/auth_api.py | 110 +++++++++++ clients/python-legacy/test/test_auth_api.py | 7 + clients/python/README.md | 1 + clients/python/docs/AuthApi.md | 76 +++++++ clients/python/lakefs_sdk/api/auth_api.py | 150 ++++++++++++++ clients/python/test/test_auth_api.py | 7 + docs/assets/js/swagger.yml | 1 + 20 files changed, 920 insertions(+) diff --git a/api/swagger.yml b/api/swagger.yml index 7f7e38a8011..fb011a03ac0 100644 --- a/api/swagger.yml +++ b/api/swagger.yml @@ -1838,6 +1838,7 @@ paths: tags: - external - experimental + - auth operationId: externalPrincipalLogin summary: perform a login using an external authenticator security: [] diff --git a/clients/java-legacy/README.md b/clients/java-legacy/README.md index 14eb87b0f52..8043f90c992 100644 --- a/clients/java-legacy/README.md +++ b/clients/java-legacy/README.md @@ -155,6 +155,7 @@ Class | Method | HTTP request | Description *AuthApi* | [**deleteUserExternalPrincipal**](docs/AuthApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user *AuthApi* | [**detachPolicyFromGroup**](docs/AuthApi.md#detachPolicyFromGroup) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group *AuthApi* | [**detachPolicyFromUser**](docs/AuthApi.md#detachPolicyFromUser) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +*AuthApi* | [**externalPrincipalLogin**](docs/AuthApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator *AuthApi* | [**getCredentials**](docs/AuthApi.md#getCredentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials *AuthApi* | [**getCurrentUser**](docs/AuthApi.md#getCurrentUser) | **GET** /user | get current user *AuthApi* | [**getExternalPrincipal**](docs/AuthApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id diff --git a/clients/java-legacy/api/openapi.yaml b/clients/java-legacy/api/openapi.yaml index fecf69d145c..98ec6b1c984 100644 --- a/clients/java-legacy/api/openapi.yaml +++ b/clients/java-legacy/api/openapi.yaml @@ -226,6 +226,7 @@ paths: tags: - external - experimental + - auth x-contentType: application/json x-accepts: application/json /sts/login: diff --git a/clients/java-legacy/docs/AuthApi.md b/clients/java-legacy/docs/AuthApi.md index b6308ae3dd4..536fd454137 100644 --- a/clients/java-legacy/docs/AuthApi.md +++ b/clients/java-legacy/docs/AuthApi.md @@ -20,6 +20,7 @@ Method | HTTP request | Description [**deleteUserExternalPrincipal**](AuthApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user [**detachPolicyFromGroup**](AuthApi.md#detachPolicyFromGroup) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group [**detachPolicyFromUser**](AuthApi.md#detachPolicyFromUser) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +[**externalPrincipalLogin**](AuthApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator [**getCredentials**](AuthApi.md#getCredentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials [**getCurrentUser**](AuthApi.md#getCurrentUser) | **GET** /user | get current user [**getExternalPrincipal**](AuthApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id @@ -1524,6 +1525,72 @@ null (empty response body) **420** | too many requests | - | **0** | Internal Server Error | - | + +# **externalPrincipalLogin** +> AuthenticationToken externalPrincipalLogin(externalLoginInformation) + +perform a login using an external authenticator + +### Example +```java +// Import classes: +import io.lakefs.clients.api.ApiClient; +import io.lakefs.clients.api.ApiException; +import io.lakefs.clients.api.Configuration; +import io.lakefs.clients.api.models.*; +import io.lakefs.clients.api.AuthApi; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("http://localhost/api/v1"); + + AuthApi apiInstance = new AuthApi(defaultClient); + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + try { + AuthenticationToken result = apiInstance.externalPrincipalLogin(externalLoginInformation); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling AuthApi#externalPrincipalLogin"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful external login | - | +**400** | Bad Request | - | +**401** | Unauthorized | - | +**403** | Forbidden | - | +**404** | Resource Not Found | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + # **getCredentials** > Credentials getCredentials(userId, accessKeyId) diff --git a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java index f17d4f8483c..585ef6add21 100644 --- a/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java +++ b/clients/java-legacy/src/main/java/io/lakefs/clients/api/AuthApi.java @@ -35,6 +35,7 @@ import io.lakefs.clients.api.model.CurrentUser; import io.lakefs.clients.api.model.Error; import io.lakefs.clients.api.model.ErrorNoACL; +import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -2172,6 +2173,136 @@ public okhttp3.Call detachPolicyFromUserAsync(String userId, String policyId, fi localVarApiClient.executeAsync(localVarCall, _callback); return localVarCall; } + /** + * Build call for externalPrincipalLogin + * @param externalLoginInformation (optional) + * @param _callback Callback for upload/download progress + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + + + + + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call externalPrincipalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + Object localVarPostBody = externalLoginInformation; + + // create path and map variables + String localVarPath = "/auth/external/principal/login"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + localVarHeaderParams.put("Content-Type", localVarContentType); + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + + okhttp3.Call localVarCall = externalPrincipalLoginCall(externalLoginInformation, _callback); + return localVarCall; + + } + + /** + * perform a login using an external authenticator + * + * @param externalLoginInformation (optional) + * @return AuthenticationToken + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + + + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
+ */ + public AuthenticationToken externalPrincipalLogin(ExternalLoginInformation externalLoginInformation) throws ApiException { + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(externalLoginInformation); + return localVarResp.getData(); + } + + /** + * perform a login using an external authenticator + * + * @param externalLoginInformation (optional) + * @return ApiResponse<AuthenticationToken> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + + + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
+ */ + public ApiResponse externalPrincipalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * perform a login using an external authenticator (asynchronously) + * + * @param externalLoginInformation (optional) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + + + + + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call externalPrincipalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for getCredentials * @param userId (required) diff --git a/clients/java-legacy/src/test/java/io/lakefs/clients/api/AuthApiTest.java b/clients/java-legacy/src/test/java/io/lakefs/clients/api/AuthApiTest.java index aff3996512e..1ffe4a11ce9 100644 --- a/clients/java-legacy/src/test/java/io/lakefs/clients/api/AuthApiTest.java +++ b/clients/java-legacy/src/test/java/io/lakefs/clients/api/AuthApiTest.java @@ -22,6 +22,7 @@ import io.lakefs.clients.api.model.CurrentUser; import io.lakefs.clients.api.model.Error; import io.lakefs.clients.api.model.ErrorNoACL; +import io.lakefs.clients.api.model.ExternalLoginInformation; import io.lakefs.clients.api.model.ExternalPrincipal; import io.lakefs.clients.api.model.ExternalPrincipalCreation; import io.lakefs.clients.api.model.ExternalPrincipalList; @@ -301,6 +302,21 @@ public void detachPolicyFromUserTest() throws ApiException { // TODO: test validations } + /** + * perform a login using an external authenticator + * + * + * + * @throws ApiException + * if the Api call fails + */ + @Test + public void externalPrincipalLoginTest() throws ApiException { + ExternalLoginInformation externalLoginInformation = null; + AuthenticationToken response = api.externalPrincipalLogin(externalLoginInformation); + // TODO: test validations + } + /** * get credentials * diff --git a/clients/java/README.md b/clients/java/README.md index a22654073d1..3953f80aa60 100644 --- a/clients/java/README.md +++ b/clients/java/README.md @@ -163,6 +163,7 @@ Class | Method | HTTP request | Description *AuthApi* | [**deleteUserExternalPrincipal**](docs/AuthApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user *AuthApi* | [**detachPolicyFromGroup**](docs/AuthApi.md#detachPolicyFromGroup) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group *AuthApi* | [**detachPolicyFromUser**](docs/AuthApi.md#detachPolicyFromUser) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +*AuthApi* | [**externalPrincipalLogin**](docs/AuthApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator *AuthApi* | [**getCredentials**](docs/AuthApi.md#getCredentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials *AuthApi* | [**getCurrentUser**](docs/AuthApi.md#getCurrentUser) | **GET** /user | get current user *AuthApi* | [**getExternalPrincipal**](docs/AuthApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id diff --git a/clients/java/api/openapi.yaml b/clients/java/api/openapi.yaml index de1326f27f0..db50fed50a2 100644 --- a/clients/java/api/openapi.yaml +++ b/clients/java/api/openapi.yaml @@ -226,6 +226,7 @@ paths: tags: - external - experimental + - auth x-content-type: application/json x-accepts: application/json /sts/login: diff --git a/clients/java/docs/AuthApi.md b/clients/java/docs/AuthApi.md index febab38cd46..b5c34ea6849 100644 --- a/clients/java/docs/AuthApi.md +++ b/clients/java/docs/AuthApi.md @@ -20,6 +20,7 @@ All URIs are relative to */api/v1* | [**deleteUserExternalPrincipal**](AuthApi.md#deleteUserExternalPrincipal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user | | [**detachPolicyFromGroup**](AuthApi.md#detachPolicyFromGroup) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group | | [**detachPolicyFromUser**](AuthApi.md#detachPolicyFromUser) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user | +| [**externalPrincipalLogin**](AuthApi.md#externalPrincipalLogin) | **POST** /auth/external/principal/login | perform a login using an external authenticator | | [**getCredentials**](AuthApi.md#getCredentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials | | [**getCurrentUser**](AuthApi.md#getCurrentUser) | **GET** /user | get current user | | [**getExternalPrincipal**](AuthApi.md#getExternalPrincipal) | **GET** /auth/external/principals | describe external principal by id | @@ -1543,6 +1544,74 @@ null (empty response body) | **420** | too many requests | - | | **0** | Internal Server Error | - | + +# **externalPrincipalLogin** +> AuthenticationToken externalPrincipalLogin().externalLoginInformation(externalLoginInformation).execute(); + +perform a login using an external authenticator + +### Example +```java +// Import classes: +import io.lakefs.clients.sdk.ApiClient; +import io.lakefs.clients.sdk.ApiException; +import io.lakefs.clients.sdk.Configuration; +import io.lakefs.clients.sdk.models.*; +import io.lakefs.clients.sdk.AuthApi; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("/api/v1"); + + AuthApi apiInstance = new AuthApi(defaultClient); + ExternalLoginInformation externalLoginInformation = new ExternalLoginInformation(); // ExternalLoginInformation | + try { + AuthenticationToken result = apiInstance.externalPrincipalLogin() + .externalLoginInformation(externalLoginInformation) + .execute(); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling AuthApi#externalPrincipalLogin"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +| Name | Type | Description | Notes | +|------------- | ------------- | ------------- | -------------| +| **externalLoginInformation** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] | + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +| **200** | successful external login | - | +| **400** | Bad Request | - | +| **401** | Unauthorized | - | +| **403** | Forbidden | - | +| **404** | Resource Not Found | - | +| **420** | too many requests | - | +| **0** | Internal Server Error | - | + # **getCredentials** > Credentials getCredentials(userId, accessKeyId).execute(); diff --git a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java index 87deaed69fc..6a7c627c1a4 100644 --- a/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java +++ b/clients/java/src/main/java/io/lakefs/clients/sdk/AuthApi.java @@ -35,6 +35,7 @@ import io.lakefs.clients.sdk.model.CurrentUser; import io.lakefs.clients.sdk.model.Error; import io.lakefs.clients.sdk.model.ErrorNoACL; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -2915,6 +2916,191 @@ public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiEx public APIdetachPolicyFromUserRequest detachPolicyFromUser(String userId, String policyId) { return new APIdetachPolicyFromUserRequest(userId, policyId); } + private okhttp3.Call externalPrincipalLoginCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + String basePath = null; + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = externalLoginInformation; + + // create path and map variables + String localVarPath = "/auth/external/principal/login"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call externalPrincipalLoginValidateBeforeCall(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + return externalPrincipalLoginCall(externalLoginInformation, _callback); + + } + + + private ApiResponse externalPrincipalLoginWithHttpInfo(ExternalLoginInformation externalLoginInformation) throws ApiException { + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + private okhttp3.Call externalPrincipalLoginAsync(ExternalLoginInformation externalLoginInformation, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = externalPrincipalLoginValidateBeforeCall(externalLoginInformation, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } + + public class APIexternalPrincipalLoginRequest { + private ExternalLoginInformation externalLoginInformation; + + private APIexternalPrincipalLoginRequest() { + } + + /** + * Set externalLoginInformation + * @param externalLoginInformation (optional) + * @return APIexternalPrincipalLoginRequest + */ + public APIexternalPrincipalLoginRequest externalLoginInformation(ExternalLoginInformation externalLoginInformation) { + this.externalLoginInformation = externalLoginInformation; + return this; + } + + /** + * Build call for externalPrincipalLogin + * @param _callback ApiCallback API callback + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + + + + + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call buildCall(final ApiCallback _callback) throws ApiException { + return externalPrincipalLoginCall(externalLoginInformation, _callback); + } + + /** + * Execute externalPrincipalLogin request + * @return AuthenticationToken + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + + + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
+ */ + public AuthenticationToken execute() throws ApiException { + ApiResponse localVarResp = externalPrincipalLoginWithHttpInfo(externalLoginInformation); + return localVarResp.getData(); + } + + /** + * Execute externalPrincipalLogin request with HTTP info returned + * @return ApiResponse<AuthenticationToken> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + + + + + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
+ */ + public ApiResponse executeWithHttpInfo() throws ApiException { + return externalPrincipalLoginWithHttpInfo(externalLoginInformation); + } + + /** + * Execute externalPrincipalLogin request (asynchronously) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + + + + + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
+ */ + public okhttp3.Call executeAsync(final ApiCallback _callback) throws ApiException { + return externalPrincipalLoginAsync(externalLoginInformation, _callback); + } + } + + /** + * perform a login using an external authenticator + * + * @return APIexternalPrincipalLoginRequest + * @http.response.details + + + + + + + + + +
Status Code Description Response Headers
200 successful external login -
400 Bad Request -
401 Unauthorized -
403 Forbidden -
404 Resource Not Found -
420 too many requests -
0 Internal Server Error -
+ */ + public APIexternalPrincipalLoginRequest externalPrincipalLogin() { + return new APIexternalPrincipalLoginRequest(); + } private okhttp3.Call getCredentialsCall(String userId, String accessKeyId, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers diff --git a/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java b/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java index f9d84601df9..0e1114c79fc 100644 --- a/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java +++ b/clients/java/src/test/java/io/lakefs/clients/sdk/AuthApiTest.java @@ -22,6 +22,7 @@ import io.lakefs.clients.sdk.model.CurrentUser; import io.lakefs.clients.sdk.model.Error; import io.lakefs.clients.sdk.model.ErrorNoACL; +import io.lakefs.clients.sdk.model.ExternalLoginInformation; import io.lakefs.clients.sdk.model.ExternalPrincipal; import io.lakefs.clients.sdk.model.ExternalPrincipalCreation; import io.lakefs.clients.sdk.model.ExternalPrincipalList; @@ -271,6 +272,20 @@ public void detachPolicyFromUserTest() throws ApiException { // TODO: test validations } + /** + * perform a login using an external authenticator + * + * @throws ApiException if the Api call fails + */ + @Test + public void externalPrincipalLoginTest() throws ApiException { + ExternalLoginInformation externalLoginInformation = null; + AuthenticationToken response = api.externalPrincipalLogin() + .externalLoginInformation(externalLoginInformation) + .execute(); + // TODO: test validations + } + /** * get credentials * diff --git a/clients/python-legacy/README.md b/clients/python-legacy/README.md index 46d9fe6909f..362b8560ef9 100644 --- a/clients/python-legacy/README.md +++ b/clients/python-legacy/README.md @@ -136,6 +136,7 @@ Class | Method | HTTP request | Description *AuthApi* | [**delete_user_external_principal**](docs/AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user *AuthApi* | [**detach_policy_from_group**](docs/AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group *AuthApi* | [**detach_policy_from_user**](docs/AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +*AuthApi* | [**external_principal_login**](docs/AuthApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator *AuthApi* | [**get_credentials**](docs/AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials *AuthApi* | [**get_current_user**](docs/AuthApi.md#get_current_user) | **GET** /user | get current user *AuthApi* | [**get_external_principal**](docs/AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id diff --git a/clients/python-legacy/docs/AuthApi.md b/clients/python-legacy/docs/AuthApi.md index d80931429c1..c73a1b73998 100644 --- a/clients/python-legacy/docs/AuthApi.md +++ b/clients/python-legacy/docs/AuthApi.md @@ -20,6 +20,7 @@ Method | HTTP request | Description [**delete_user_external_principal**](AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user [**detach_policy_from_group**](AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group [**detach_policy_from_user**](AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +[**external_principal_login**](AuthApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator [**get_credentials**](AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials [**get_current_user**](AuthApi.md#get_current_user) | **GET** /user | get current user [**get_external_principal**](AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id @@ -1804,6 +1805,83 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **external_principal_login** +> AuthenticationToken external_principal_login() + +perform a login using an external authenticator + +### Example + + +```python +import time +import lakefs_client +from lakefs_client.api import auth_api +from lakefs_client.model.authentication_token import AuthenticationToken +from lakefs_client.model.external_login_information import ExternalLoginInformation +from lakefs_client.model.error import Error +from pprint import pprint +# Defining the host is optional and defaults to http://localhost/api/v1 +# See configuration.py for a list of all supported configuration parameters. +configuration = lakefs_client.Configuration( + host = "http://localhost/api/v1" +) + + +# Enter a context with an instance of the API client +with lakefs_client.ApiClient() as api_client: + # Create an instance of the API class + api_instance = auth_api.AuthApi(api_client) + external_login_information = ExternalLoginInformation( + token_expiration_duration=1, + identity_request={}, + ) # ExternalLoginInformation | (optional) + + # example passing only required values which don't have defaults set + # and optional values + try: + # perform a login using an external authenticator + api_response = api_instance.external_principal_login(external_login_information=external_login_information) + pprint(api_response) + except lakefs_client.ApiException as e: + print("Exception when calling AuthApi->external_principal_login: %s\n" % e) +``` + + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful external login | - | +**400** | Bad Request | - | +**401** | Unauthorized | - | +**403** | Forbidden | - | +**404** | Resource Not Found | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **get_credentials** > Credentials get_credentials(user_id, access_key_id) diff --git a/clients/python-legacy/lakefs_client/api/auth_api.py b/clients/python-legacy/lakefs_client/api/auth_api.py index 62d7e032a2f..81990d1319f 100644 --- a/clients/python-legacy/lakefs_client/api/auth_api.py +++ b/clients/python-legacy/lakefs_client/api/auth_api.py @@ -30,6 +30,7 @@ from lakefs_client.model.current_user import CurrentUser from lakefs_client.model.error import Error from lakefs_client.model.error_no_acl import ErrorNoACL +from lakefs_client.model.external_login_information import ExternalLoginInformation from lakefs_client.model.external_principal import ExternalPrincipal from lakefs_client.model.external_principal_creation import ExternalPrincipalCreation from lakefs_client.model.external_principal_list import ExternalPrincipalList @@ -994,6 +995,54 @@ def __init__(self, api_client=None): }, api_client=api_client ) + self.external_principal_login_endpoint = _Endpoint( + settings={ + 'response_type': (AuthenticationToken,), + 'auth': [], + 'endpoint_path': '/auth/external/principal/login', + 'operation_id': 'external_principal_login', + 'http_method': 'POST', + 'servers': None, + }, + params_map={ + 'all': [ + 'external_login_information', + ], + 'required': [], + 'nullable': [ + ], + 'enum': [ + ], + 'validation': [ + ] + }, + root_map={ + 'validations': { + }, + 'allowed_values': { + }, + 'openapi_types': { + 'external_login_information': + (ExternalLoginInformation,), + }, + 'attribute_map': { + }, + 'location_map': { + 'external_login_information': 'body', + }, + 'collection_format_map': { + } + }, + headers_map={ + 'accept': [ + 'application/json' + ], + 'content_type': [ + 'application/json' + ] + }, + api_client=api_client + ) self.get_credentials_endpoint = _Endpoint( settings={ 'response_type': (Credentials,), @@ -3288,6 +3337,67 @@ def detach_policy_from_user( policy_id return self.detach_policy_from_user_endpoint.call_with_http_info(**kwargs) + def external_principal_login( + self, + **kwargs + ): + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_principal_login(async_req=True) + >>> result = thread.get() + + + Keyword Args: + external_login_information (ExternalLoginInformation): [optional] + _return_http_data_only (bool): response data without head status + code and headers. Default is True. + _preload_content (bool): if False, the urllib3.HTTPResponse object + will be returned without reading/decoding response data. + Default is True. + _request_timeout (int/float/tuple): timeout setting for this request. If + one number provided, it will be total request timeout. It can also + be a pair (tuple) of (connection, read) timeouts. + Default is None. + _check_input_type (bool): specifies if type checking + should be done one the data sent to the server. + Default is True. + _check_return_type (bool): specifies if type checking + should be done one the data received from the server. + Default is True. + _host_index (int/None): specifies the index of the server + that we want to use. + Default is read from the configuration. + async_req (bool): execute request asynchronously + + Returns: + AuthenticationToken + If the method is called asynchronously, returns the request + thread. + """ + kwargs['async_req'] = kwargs.get( + 'async_req', False + ) + kwargs['_return_http_data_only'] = kwargs.get( + '_return_http_data_only', True + ) + kwargs['_preload_content'] = kwargs.get( + '_preload_content', True + ) + kwargs['_request_timeout'] = kwargs.get( + '_request_timeout', None + ) + kwargs['_check_input_type'] = kwargs.get( + '_check_input_type', True + ) + kwargs['_check_return_type'] = kwargs.get( + '_check_return_type', True + ) + kwargs['_host_index'] = kwargs.get('_host_index') + return self.external_principal_login_endpoint.call_with_http_info(**kwargs) + def get_credentials( self, user_id, diff --git a/clients/python-legacy/test/test_auth_api.py b/clients/python-legacy/test/test_auth_api.py index 82ad0a11214..d35e074af90 100644 --- a/clients/python-legacy/test/test_auth_api.py +++ b/clients/python-legacy/test/test_auth_api.py @@ -136,6 +136,13 @@ def test_detach_policy_from_user(self): """ pass + def test_external_principal_login(self): + """Test case for external_principal_login + + perform a login using an external authenticator # noqa: E501 + """ + pass + def test_get_credentials(self): """Test case for get_credentials diff --git a/clients/python/README.md b/clients/python/README.md index 1679427eb5b..c13eee0dbe3 100644 --- a/clients/python/README.md +++ b/clients/python/README.md @@ -139,6 +139,7 @@ Class | Method | HTTP request | Description *AuthApi* | [**delete_user_external_principal**](docs/AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user *AuthApi* | [**detach_policy_from_group**](docs/AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group *AuthApi* | [**detach_policy_from_user**](docs/AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +*AuthApi* | [**external_principal_login**](docs/AuthApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator *AuthApi* | [**get_credentials**](docs/AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials *AuthApi* | [**get_current_user**](docs/AuthApi.md#get_current_user) | **GET** /user | get current user *AuthApi* | [**get_external_principal**](docs/AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id diff --git a/clients/python/docs/AuthApi.md b/clients/python/docs/AuthApi.md index bd9416ecbfd..dfd5f7b2a63 100644 --- a/clients/python/docs/AuthApi.md +++ b/clients/python/docs/AuthApi.md @@ -20,6 +20,7 @@ Method | HTTP request | Description [**delete_user_external_principal**](AuthApi.md#delete_user_external_principal) | **DELETE** /auth/users/{userId}/external/principals | delete external principal from user [**detach_policy_from_group**](AuthApi.md#detach_policy_from_group) | **DELETE** /auth/groups/{groupId}/policies/{policyId} | detach policy from group [**detach_policy_from_user**](AuthApi.md#detach_policy_from_user) | **DELETE** /auth/users/{userId}/policies/{policyId} | detach policy from user +[**external_principal_login**](AuthApi.md#external_principal_login) | **POST** /auth/external/principal/login | perform a login using an external authenticator [**get_credentials**](AuthApi.md#get_credentials) | **GET** /auth/users/{userId}/credentials/{accessKeyId} | get credentials [**get_current_user**](AuthApi.md#get_current_user) | **GET** /user | get current user [**get_external_principal**](AuthApi.md#get_external_principal) | **GET** /auth/external/principals | describe external principal by id @@ -1791,6 +1792,81 @@ void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **external_principal_login** +> AuthenticationToken external_principal_login(external_login_information=external_login_information) + +perform a login using an external authenticator + +### Example + + +```python +import time +import os +import lakefs_sdk +from lakefs_sdk.models.authentication_token import AuthenticationToken +from lakefs_sdk.models.external_login_information import ExternalLoginInformation +from lakefs_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to /api/v1 +# See configuration.py for a list of all supported configuration parameters. +configuration = lakefs_sdk.Configuration( + host = "/api/v1" +) + + +# Enter a context with an instance of the API client +with lakefs_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = lakefs_sdk.AuthApi(api_client) + external_login_information = lakefs_sdk.ExternalLoginInformation() # ExternalLoginInformation | (optional) + + try: + # perform a login using an external authenticator + api_response = api_instance.external_principal_login(external_login_information=external_login_information) + print("The response of AuthApi->external_principal_login:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling AuthApi->external_principal_login: %s\n" % e) +``` + + + +### Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **external_login_information** | [**ExternalLoginInformation**](ExternalLoginInformation.md)| | [optional] + +### Return type + +[**AuthenticationToken**](AuthenticationToken.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | successful external login | - | +**400** | Bad Request | - | +**401** | Unauthorized | - | +**403** | Forbidden | - | +**404** | Resource Not Found | - | +**420** | too many requests | - | +**0** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **get_credentials** > Credentials get_credentials(user_id, access_key_id) diff --git a/clients/python/lakefs_sdk/api/auth_api.py b/clients/python/lakefs_sdk/api/auth_api.py index d7a68967d37..d289979a193 100644 --- a/clients/python/lakefs_sdk/api/auth_api.py +++ b/clients/python/lakefs_sdk/api/auth_api.py @@ -30,6 +30,7 @@ from lakefs_sdk.models.credentials_list import CredentialsList from lakefs_sdk.models.credentials_with_secret import CredentialsWithSecret from lakefs_sdk.models.current_user import CurrentUser +from lakefs_sdk.models.external_login_information import ExternalLoginInformation from lakefs_sdk.models.external_principal import ExternalPrincipal from lakefs_sdk.models.external_principal_creation import ExternalPrincipalCreation from lakefs_sdk.models.external_principal_list import ExternalPrincipalList @@ -2353,6 +2354,155 @@ def detach_policy_from_user_with_http_info(self, user_id : StrictStr, policy_id collection_formats=_collection_formats, _request_auth=_params.get('_request_auth')) + @validate_arguments + def external_principal_login(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> AuthenticationToken: # noqa: E501 + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_principal_login(external_login_information, async_req=True) + >>> result = thread.get() + + :param external_login_information: + :type external_login_information: ExternalLoginInformation + :param async_req: Whether to execute the request asynchronously. + :type async_req: bool, optional + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: Returns the result object. + If the method is called asynchronously, + returns the request thread. + :rtype: AuthenticationToken + """ + kwargs['_return_http_data_only'] = True + if '_preload_content' in kwargs: + raise ValueError("Error! Please call the external_principal_login_with_http_info method with `_preload_content` instead and obtain raw data from ApiResponse.raw_data") + return self.external_principal_login_with_http_info(external_login_information, **kwargs) # noqa: E501 + + @validate_arguments + def external_principal_login_with_http_info(self, external_login_information : Optional[ExternalLoginInformation] = None, **kwargs) -> ApiResponse: # noqa: E501 + """perform a login using an external authenticator # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + + >>> thread = api.external_principal_login_with_http_info(external_login_information, async_req=True) + >>> result = thread.get() + + :param external_login_information: + :type external_login_information: ExternalLoginInformation + :param async_req: Whether to execute the request asynchronously. + :type async_req: bool, optional + :param _preload_content: if False, the ApiResponse.data will + be set to none and raw_data will store the + HTTP response body without reading/decoding. + Default is True. + :type _preload_content: bool, optional + :param _return_http_data_only: response data instead of ApiResponse + object with status code, headers, etc + :type _return_http_data_only: bool, optional + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the authentication + in the spec for a single request. + :type _request_auth: dict, optional + :type _content_type: string, optional: force content-type for the request + :return: Returns the result object. + If the method is called asynchronously, + returns the request thread. + :rtype: tuple(AuthenticationToken, status_code(int), headers(HTTPHeaderDict)) + """ + + _params = locals() + + _all_params = [ + 'external_login_information' + ] + _all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout', + '_request_auth', + '_content_type', + '_headers' + ] + ) + + # validate the arguments + for _key, _val in _params['kwargs'].items(): + if _key not in _all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method external_principal_login" % _key + ) + _params[_key] = _val + del _params['kwargs'] + + _collection_formats = {} + + # process the path parameters + _path_params = {} + + # process the query parameters + _query_params = [] + # process the header parameters + _header_params = dict(_params.get('_headers', {})) + # process the form parameters + _form_params = [] + _files = {} + # process the body parameter + _body_params = None + if _params['external_login_information'] is not None: + _body_params = _params['external_login_information'] + + # set the HTTP header `Accept` + _header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # set the HTTP header `Content-Type` + _content_types_list = _params.get('_content_type', + self.api_client.select_header_content_type( + ['application/json'])) + if _content_types_list: + _header_params['Content-Type'] = _content_types_list + + # authentication setting + _auth_settings = [] # noqa: E501 + + _response_types_map = { + '200': "AuthenticationToken", + '400': "Error", + '401': "Error", + '403': "Error", + '404': "Error", + '420': None, + } + + return self.api_client.call_api( + '/auth/external/principal/login', 'POST', + _path_params, + _query_params, + _header_params, + body=_body_params, + post_params=_form_params, + files=_files, + response_types_map=_response_types_map, + auth_settings=_auth_settings, + async_req=_params.get('async_req'), + _return_http_data_only=_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=_params.get('_preload_content', True), + _request_timeout=_params.get('_request_timeout'), + collection_formats=_collection_formats, + _request_auth=_params.get('_request_auth')) + @validate_arguments def get_credentials(self, user_id : StrictStr, access_key_id : StrictStr, **kwargs) -> Credentials: # noqa: E501 """get credentials # noqa: E501 diff --git a/clients/python/test/test_auth_api.py b/clients/python/test/test_auth_api.py index 0438975ef2f..96dfe3671c5 100644 --- a/clients/python/test/test_auth_api.py +++ b/clients/python/test/test_auth_api.py @@ -141,6 +141,13 @@ def test_detach_policy_from_user(self): """ pass + def test_external_principal_login(self): + """Test case for external_principal_login + + perform a login using an external authenticator # noqa: E501 + """ + pass + def test_get_credentials(self): """Test case for get_credentials diff --git a/docs/assets/js/swagger.yml b/docs/assets/js/swagger.yml index 7f7e38a8011..fb011a03ac0 100644 --- a/docs/assets/js/swagger.yml +++ b/docs/assets/js/swagger.yml @@ -1838,6 +1838,7 @@ paths: tags: - external - experimental + - auth operationId: externalPrincipalLogin summary: perform a login using an external authenticator security: [] From 1e5fa4cc621bded50d515edd01885a4f654e6584 Mon Sep 17 00:00:00 2001 From: Idan Novogroder Date: Wed, 10 Apr 2024 16:00:03 +0300 Subject: [PATCH 33/33] Fix docs --- docs/reference/configuration.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/docs/reference/configuration.md b/docs/reference/configuration.md index d6a524364c8..83e4e15472c 100644 --- a/docs/reference/configuration.md +++ b/docs/reference/configuration.md @@ -83,6 +83,9 @@ This reference uses `.` to denote the nesting of values. * `auth.cache.ttl` `(time duration : "20s")` - How long to store an item in the auth cache. Using a higher value reduces load on the database, but will cause changes longer to take effect for cached users. * `auth.cache.jitter` `(time duration : "3s")` - A random amount of time between 0 and this value is added to each item's TTL. This is done to avoid a large bulk of keys expiring at once and overwhelming the database. * `auth.encrypt.secret_key` `(string : required)` - A random (cryptographically safe) generated string that is used for encryption and HMAC signing + **Note:** It is best to keep this somewhere safe such as KMS or Hashicorp Vault, and provide it to the system at run time + {: .note } + * `auth.login_duration` `(time duration : "168h")` - The duration the login token is valid for * `auth.login_max_duration` `(time duration : "168h")` - The maximum duration user can ask for a login token * `auth.cookie_domain` `(string : "")` - [Domain attribute](https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#define_where_cookies_are_sent) to set the access_token cookie on (the default is an empty string which defaults to the same host that sets the cookie) @@ -92,11 +95,7 @@ This reference uses `.` to denote the nesting of values. * `auth.api.skip_health_check` `(bool : false)` - Skip external auth API health check * `auth.authentication_api.endpoint` `(string : "")` - URL to external Authentication Service described at [authentication.yml](https://github.com/treeverse/lakeFS/blob/master/api/authentication.yml); * `auth.authentication_api.external_principals_enabled` `(bool : false)` - If true, external principals API will be enabled, e.g auth service and login api's. - - **Note:** It is best to keep this somewhere safe such as KMS or Hashicorp Vault, and provide it to the system at run time - {: .note } * `auth.remote_authenticator.enabled` `(bool : false)` - If specified, also authenticate users via this Remote Authenticator server. -* `auth.remote_authenticator.external_principals_enabled` `(bool : false)` - If true, external principals will be enabled, e.g auth service and login api's. * `auth.remote_authenticator.endpoint` `(string : required)` - Endpoint URL of the remote authentication service (e.g. https://my-auth.example.com/auth). * `auth.remote_authenticator.default_user_group` `(string : Viewers)` - Create users in this group (i.e `Viewers`, `Developers`, etc). * `auth.remote_authenticator.request_timeout` `(duration : 10s)` - If specified, timeout for remote authentication requests.