Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(101)

Unified Diff: generated/googleapis/lib/identitytoolkit/v3.dart

Issue 2485703002: Api-roll 42: 2016-11-08 (Closed)
Patch Set: Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « generated/googleapis/lib/iam/v1.dart ('k') | generated/googleapis/lib/logging/v2.dart » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: generated/googleapis/lib/identitytoolkit/v3.dart
diff --git a/generated/googleapis/lib/identitytoolkit/v3.dart b/generated/googleapis/lib/identitytoolkit/v3.dart
index a745589eae83549c2e7728590933ae83f71e3b2b..cafd23c74109c83ae91a82ce5d3d20cde4b2b871 100644
--- a/generated/googleapis/lib/identitytoolkit/v3.dart
+++ b/generated/googleapis/lib/identitytoolkit/v3.dart
@@ -17,6 +17,9 @@ const core.String USER_AGENT = 'dart-api-client identitytoolkit/v3';
/** Help the third party sites to implement federated login. */
class IdentitytoolkitApi {
+ /** View and administer all your Firebase data and settings */
+ static const FirebaseScope = "https://www.googleapis.com/auth/firebase";
+
final commons.ApiRequester _requester;
@@ -1036,6 +1039,13 @@ class IdentitytoolkitRelyingpartyCreateAuthUriRequest {
*/
core.String continueUri;
/**
+ * The query parameter that client can customize by themselves in auth url.
+ * The following parameters are reserved for server so that they cannot be
+ * customized by clients: client_id, response_type, scope, redirect_uri,
+ * state, oauth_token.
+ */
+ core.Map<core.String, core.String> customParameter;
+ /**
* The hosted domain to restrict sign-in to accounts at that domain for Google
* Apps hosted accounts.
*/
@@ -1083,6 +1093,9 @@ class IdentitytoolkitRelyingpartyCreateAuthUriRequest {
if (_json.containsKey("continueUri")) {
continueUri = _json["continueUri"];
}
+ if (_json.containsKey("customParameter")) {
+ customParameter = _json["customParameter"];
+ }
if (_json.containsKey("hostedDomain")) {
hostedDomain = _json["hostedDomain"];
}
@@ -1126,6 +1139,9 @@ class IdentitytoolkitRelyingpartyCreateAuthUriRequest {
if (continueUri != null) {
_json["continueUri"] = continueUri;
}
+ if (customParameter != null) {
+ _json["customParameter"] = customParameter;
+ }
if (hostedDomain != null) {
_json["hostedDomain"] = hostedDomain;
}
@@ -1298,6 +1314,7 @@ class IdentitytoolkitRelyingpartyGetProjectConfigResponse {
core.List<core.String> authorizedDomains;
/** Change email template. */
EmailTemplate changeEmailTemplate;
+ core.String dynamicLinksDomain;
/** Whether anonymous user is enabled. */
core.bool enableAnonymousUser;
/** OAuth2 provider configuration. */
@@ -1328,6 +1345,9 @@ class IdentitytoolkitRelyingpartyGetProjectConfigResponse {
if (_json.containsKey("changeEmailTemplate")) {
changeEmailTemplate = new EmailTemplate.fromJson(_json["changeEmailTemplate"]);
}
+ if (_json.containsKey("dynamicLinksDomain")) {
+ dynamicLinksDomain = _json["dynamicLinksDomain"];
+ }
if (_json.containsKey("enableAnonymousUser")) {
enableAnonymousUser = _json["enableAnonymousUser"];
}
@@ -1365,6 +1385,9 @@ class IdentitytoolkitRelyingpartyGetProjectConfigResponse {
if (changeEmailTemplate != null) {
_json["changeEmailTemplate"] = (changeEmailTemplate).toJson();
}
+ if (dynamicLinksDomain != null) {
+ _json["dynamicLinksDomain"] = dynamicLinksDomain;
+ }
if (enableAnonymousUser != null) {
_json["enableAnonymousUser"] = enableAnonymousUser;
}
@@ -1845,16 +1868,24 @@ class IdentitytoolkitRelyingpartySignupNewUserRequest {
core.String captchaChallenge;
/** Response to the captcha. */
core.String captchaResponse;
+ /** Whether to disable the user. Only can be used by service account. */
+ core.bool disabled;
/** The name of the user. */
core.String displayName;
/** The email of the user. */
core.String email;
+ /**
+ * Mark the email as verified or not. Only can be used by service account.
+ */
+ core.bool emailVerified;
/** The GITKit token of the authenticated user. */
core.String idToken;
/** Instance id token of the app. */
core.String instanceId;
/** The new password of the user. */
core.String password;
+ /** The photo url of the user. */
+ core.String photoUrl;
IdentitytoolkitRelyingpartySignupNewUserRequest();
@@ -1865,12 +1896,18 @@ class IdentitytoolkitRelyingpartySignupNewUserRequest {
if (_json.containsKey("captchaResponse")) {
captchaResponse = _json["captchaResponse"];
}
+ if (_json.containsKey("disabled")) {
+ disabled = _json["disabled"];
+ }
if (_json.containsKey("displayName")) {
displayName = _json["displayName"];
}
if (_json.containsKey("email")) {
email = _json["email"];
}
+ if (_json.containsKey("emailVerified")) {
+ emailVerified = _json["emailVerified"];
+ }
if (_json.containsKey("idToken")) {
idToken = _json["idToken"];
}
@@ -1880,6 +1917,9 @@ class IdentitytoolkitRelyingpartySignupNewUserRequest {
if (_json.containsKey("password")) {
password = _json["password"];
}
+ if (_json.containsKey("photoUrl")) {
+ photoUrl = _json["photoUrl"];
+ }
}
core.Map toJson() {
@@ -1890,12 +1930,18 @@ class IdentitytoolkitRelyingpartySignupNewUserRequest {
if (captchaResponse != null) {
_json["captchaResponse"] = captchaResponse;
}
+ if (disabled != null) {
+ _json["disabled"] = disabled;
+ }
if (displayName != null) {
_json["displayName"] = displayName;
}
if (email != null) {
_json["email"] = email;
}
+ if (emailVerified != null) {
+ _json["emailVerified"] = emailVerified;
+ }
if (idToken != null) {
_json["idToken"] = idToken;
}
@@ -1905,12 +1951,17 @@ class IdentitytoolkitRelyingpartySignupNewUserRequest {
if (password != null) {
_json["password"] = password;
}
+ if (photoUrl != null) {
+ _json["photoUrl"] = photoUrl;
+ }
return _json;
}
}
/** Request to upload user account in batch. */
class IdentitytoolkitRelyingpartyUploadAccountRequest {
+ /** Whether allow overwrite existing account when user local_id exists. */
+ core.bool allowOverwrite;
/**
* GCP project number of the requesting delegated app. Currently only intended
* for Firebase V1 migration.
@@ -1931,6 +1982,11 @@ class IdentitytoolkitRelyingpartyUploadAccountRequest {
void set saltSeparatorAsBytes(core.List<core.int> _bytes) {
saltSeparator = convert.BASE64.encode(_bytes).replaceAll("/", "_").replaceAll("+", "-");
}
+ /**
+ * If true, backend will do sanity check(including duplicate email and
+ * federated id) when uploading account.
+ */
+ core.bool sanityCheck;
/** The key for to hash the password. */
core.String signerKey;
core.List<core.int> get signerKeyAsBytes {
@@ -1940,12 +1996,20 @@ class IdentitytoolkitRelyingpartyUploadAccountRequest {
void set signerKeyAsBytes(core.List<core.int> _bytes) {
signerKey = convert.BASE64.encode(_bytes).replaceAll("/", "_").replaceAll("+", "-");
}
+ /**
+ * Specify which project (field value is actually project id) to operate. Only
+ * used when provided credential.
+ */
+ core.String targetProjectId;
/** The account info to be stored. */
core.List<UserInfo> users;
IdentitytoolkitRelyingpartyUploadAccountRequest();
IdentitytoolkitRelyingpartyUploadAccountRequest.fromJson(core.Map _json) {
+ if (_json.containsKey("allowOverwrite")) {
+ allowOverwrite = _json["allowOverwrite"];
+ }
if (_json.containsKey("delegatedProjectNumber")) {
delegatedProjectNumber = _json["delegatedProjectNumber"];
}
@@ -1961,9 +2025,15 @@ class IdentitytoolkitRelyingpartyUploadAccountRequest {
if (_json.containsKey("saltSeparator")) {
saltSeparator = _json["saltSeparator"];
}
+ if (_json.containsKey("sanityCheck")) {
+ sanityCheck = _json["sanityCheck"];
+ }
if (_json.containsKey("signerKey")) {
signerKey = _json["signerKey"];
}
+ if (_json.containsKey("targetProjectId")) {
+ targetProjectId = _json["targetProjectId"];
+ }
if (_json.containsKey("users")) {
users = _json["users"].map((value) => new UserInfo.fromJson(value)).toList();
}
@@ -1971,6 +2041,9 @@ class IdentitytoolkitRelyingpartyUploadAccountRequest {
core.Map toJson() {
var _json = new core.Map();
+ if (allowOverwrite != null) {
+ _json["allowOverwrite"] = allowOverwrite;
+ }
if (delegatedProjectNumber != null) {
_json["delegatedProjectNumber"] = delegatedProjectNumber;
}
@@ -1986,9 +2059,15 @@ class IdentitytoolkitRelyingpartyUploadAccountRequest {
if (saltSeparator != null) {
_json["saltSeparator"] = saltSeparator;
}
+ if (sanityCheck != null) {
+ _json["sanityCheck"] = sanityCheck;
+ }
if (signerKey != null) {
_json["signerKey"] = signerKey;
}
+ if (targetProjectId != null) {
+ _json["targetProjectId"] = targetProjectId;
+ }
if (users != null) {
_json["users"] = users.map((value) => (value).toJson()).toList();
}
@@ -2393,10 +2472,17 @@ class Relyingparty {
/** Response of resetting the password. */
class ResetPasswordResponse {
- /** The user's email. */
+ /**
+ * The user's email. If the out-of-band code is for email recovery, the user's
+ * original email.
+ */
core.String email;
/** The fixed string "identitytoolkit#ResetPasswordResponse". */
core.String kind;
+ /** If the out-of-band code is for email recovery, the user's new email. */
+ core.String newEmail;
+ /** The request type. */
+ core.String requestType;
ResetPasswordResponse();
@@ -2407,6 +2493,12 @@ class ResetPasswordResponse {
if (_json.containsKey("kind")) {
kind = _json["kind"];
}
+ if (_json.containsKey("newEmail")) {
+ newEmail = _json["newEmail"];
+ }
+ if (_json.containsKey("requestType")) {
+ requestType = _json["requestType"];
+ }
}
core.Map toJson() {
@@ -2417,6 +2509,12 @@ class ResetPasswordResponse {
if (kind != null) {
_json["kind"] = kind;
}
+ if (newEmail != null) {
+ _json["newEmail"] = newEmail;
+ }
+ if (requestType != null) {
+ _json["requestType"] = requestType;
+ }
return _json;
}
}
@@ -2734,9 +2832,7 @@ class UserInfoProviderUserInfo {
core.String providerId;
/** User's raw identifier directly returned from IDP. */
core.String rawId;
- /** Raw IDP-returned user info. */
- core.String rawUserInfo;
- /** User's screen name at Twitter. */
+ /** User's screen name at Twitter or login name at Github. */
core.String screenName;
UserInfoProviderUserInfo();
@@ -2760,9 +2856,6 @@ class UserInfoProviderUserInfo {
if (_json.containsKey("rawId")) {
rawId = _json["rawId"];
}
- if (_json.containsKey("rawUserInfo")) {
- rawUserInfo = _json["rawUserInfo"];
- }
if (_json.containsKey("screenName")) {
screenName = _json["screenName"];
}
@@ -2788,9 +2881,6 @@ class UserInfoProviderUserInfo {
if (rawId != null) {
_json["rawId"] = rawId;
}
- if (rawUserInfo != null) {
- _json["rawUserInfo"] = rawUserInfo;
- }
if (screenName != null) {
_json["screenName"] = screenName;
}
@@ -2802,6 +2892,8 @@ class UserInfoProviderUserInfo {
class UserInfo {
/** User creation timestamp. */
core.String createdAt;
+ /** Whether the user is authenticated by the developer. */
+ core.bool customAuth;
/** Whether the user is disabled. */
core.bool disabled;
/** The name of the user. */
@@ -2829,6 +2921,8 @@ class UserInfo {
core.String photoUrl;
/** The IDP of the user. */
core.List<UserInfoProviderUserInfo> providerUserInfo;
+ /** The user's plain text password. */
+ core.String rawPassword;
/** The user's password salt. */
core.String salt;
core.List<core.int> get saltAsBytes {
@@ -2838,7 +2932,7 @@ class UserInfo {
void set saltAsBytes(core.List<core.int> _bytes) {
salt = convert.BASE64.encode(_bytes).replaceAll("/", "_").replaceAll("+", "-");
}
- /** User's screen name at Twitter. */
+ /** User's screen name at Twitter or login name at Github. */
core.String screenName;
/** Timestamp in seconds for valid login token. */
core.String validSince;
@@ -2851,6 +2945,9 @@ class UserInfo {
if (_json.containsKey("createdAt")) {
createdAt = _json["createdAt"];
}
+ if (_json.containsKey("customAuth")) {
+ customAuth = _json["customAuth"];
+ }
if (_json.containsKey("disabled")) {
disabled = _json["disabled"];
}
@@ -2881,6 +2978,9 @@ class UserInfo {
if (_json.containsKey("providerUserInfo")) {
providerUserInfo = _json["providerUserInfo"].map((value) => new UserInfoProviderUserInfo.fromJson(value)).toList();
}
+ if (_json.containsKey("rawPassword")) {
+ rawPassword = _json["rawPassword"];
+ }
if (_json.containsKey("salt")) {
salt = _json["salt"];
}
@@ -2900,6 +3000,9 @@ class UserInfo {
if (createdAt != null) {
_json["createdAt"] = createdAt;
}
+ if (customAuth != null) {
+ _json["customAuth"] = customAuth;
+ }
if (disabled != null) {
_json["disabled"] = disabled;
}
@@ -2930,6 +3033,9 @@ class UserInfo {
if (providerUserInfo != null) {
_json["providerUserInfo"] = providerUserInfo.map((value) => (value).toJson()).toList();
}
+ if (rawPassword != null) {
+ _json["rawPassword"] = rawPassword;
+ }
if (salt != null) {
_json["salt"] = salt;
}
@@ -3051,7 +3157,7 @@ class VerifyAssertionResponse {
core.String rawUserInfo;
/** If idToken is STS id token, then this field will be refresh token. */
core.String refreshToken;
- /** The screen_name of a Twitter user. */
+ /** The screen_name of a Twitter user or the login name at Github. */
core.String screenName;
/** The timezone of the user. */
core.String timeZone;
« no previous file with comments | « generated/googleapis/lib/iam/v1.dart ('k') | generated/googleapis/lib/logging/v2.dart » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698