diff --git a/.stainless/stainless.yml b/.stainless/stainless.yml index 6976f945..af2154f9 100644 --- a/.stainless/stainless.yml +++ b/.stainless/stainless.yml @@ -348,6 +348,8 @@ resources: oauth_credential_create_request_fields: '#/components/schemas/OauthCredentialCreateRequestFields' oauth_credential_verify_request: '#/components/schemas/OauthCredentialVerifyRequest' oauth_credential_verify_request_fields: '#/components/schemas/OauthCredentialVerifyRequestFields' + oauth_credential_additional_challenge: '#/components/schemas/OauthCredentialAdditionalChallenge' + oauth_credential_additional_challenge_fields: '#/components/schemas/OauthCredentialAdditionalChallengeFields' exchange_rates: methods: list: diff --git a/mintlify/openapi.yaml b/mintlify/openapi.yaml index 7c5528c8..0fd3af70 100644 --- a/mintlify/openapi.yaml +++ b/mintlify/openapi.yaml @@ -3810,6 +3810,13 @@ paths: payloadToSign: '{"requestId":"7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21","type":"EMAIL_OTP","accountId":"InternalAccount:01HF3Z4QWERTY","expiresAt":"2026-04-08T15:35:00Z"}' requestId: 7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21 expiresAt: '2026-04-08T15:35:00Z' + oauth: + summary: Additional OAuth credential challenge + value: + type: OAUTH + payloadToSign: Y2hhbGxlbmdlLXBheWxvYWQtdG8tc2lnbg== + requestId: 7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21 + expiresAt: '2026-04-08T15:35:00Z' '400': description: Bad request. Returned with `EMAIL_OTP_CREDENTIAL_ALREADY_EXISTS` when registering an `EMAIL_OTP` credential on an internal account that already has one — only one email OTP credential is supported per internal account at this time. content: @@ -13396,13 +13403,30 @@ components: allOf: - $ref: '#/components/schemas/AuthCredentialAdditionalChallenge' - $ref: '#/components/schemas/EmailOtpCredentialAdditionalChallengeFields' + OauthCredentialAdditionalChallengeFields: + type: object + required: + - type + properties: + type: + type: string + enum: + - OAUTH + description: Discriminator value identifying this as an additional-credential challenge for an OAuth credential. + OauthCredentialAdditionalChallenge: + title: OAuth Credential Additional Challenge + allOf: + - $ref: '#/components/schemas/AuthCredentialAdditionalChallenge' + - $ref: '#/components/schemas/OauthCredentialAdditionalChallengeFields' AuthCredentialAdditionalChallengeOneOf: oneOf: - $ref: '#/components/schemas/EmailOtpCredentialAdditionalChallenge' + - $ref: '#/components/schemas/OauthCredentialAdditionalChallenge' discriminator: propertyName: type mapping: EMAIL_OTP: '#/components/schemas/EmailOtpCredentialAdditionalChallenge' + OAUTH: '#/components/schemas/OauthCredentialAdditionalChallenge' AuthCredentialVerifyRequest: type: object required: diff --git a/openapi.yaml b/openapi.yaml index 7c5528c8..0fd3af70 100644 --- a/openapi.yaml +++ b/openapi.yaml @@ -3810,6 +3810,13 @@ paths: payloadToSign: '{"requestId":"7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21","type":"EMAIL_OTP","accountId":"InternalAccount:01HF3Z4QWERTY","expiresAt":"2026-04-08T15:35:00Z"}' requestId: 7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21 expiresAt: '2026-04-08T15:35:00Z' + oauth: + summary: Additional OAuth credential challenge + value: + type: OAUTH + payloadToSign: Y2hhbGxlbmdlLXBheWxvYWQtdG8tc2lnbg== + requestId: 7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21 + expiresAt: '2026-04-08T15:35:00Z' '400': description: Bad request. Returned with `EMAIL_OTP_CREDENTIAL_ALREADY_EXISTS` when registering an `EMAIL_OTP` credential on an internal account that already has one — only one email OTP credential is supported per internal account at this time. content: @@ -13396,13 +13403,30 @@ components: allOf: - $ref: '#/components/schemas/AuthCredentialAdditionalChallenge' - $ref: '#/components/schemas/EmailOtpCredentialAdditionalChallengeFields' + OauthCredentialAdditionalChallengeFields: + type: object + required: + - type + properties: + type: + type: string + enum: + - OAUTH + description: Discriminator value identifying this as an additional-credential challenge for an OAuth credential. + OauthCredentialAdditionalChallenge: + title: OAuth Credential Additional Challenge + allOf: + - $ref: '#/components/schemas/AuthCredentialAdditionalChallenge' + - $ref: '#/components/schemas/OauthCredentialAdditionalChallengeFields' AuthCredentialAdditionalChallengeOneOf: oneOf: - $ref: '#/components/schemas/EmailOtpCredentialAdditionalChallenge' + - $ref: '#/components/schemas/OauthCredentialAdditionalChallenge' discriminator: propertyName: type mapping: EMAIL_OTP: '#/components/schemas/EmailOtpCredentialAdditionalChallenge' + OAUTH: '#/components/schemas/OauthCredentialAdditionalChallenge' AuthCredentialVerifyRequest: type: object required: diff --git a/openapi/components/schemas/auth/AuthCredentialAdditionalChallengeOneOf.yaml b/openapi/components/schemas/auth/AuthCredentialAdditionalChallengeOneOf.yaml index 717a103b..9448c792 100644 --- a/openapi/components/schemas/auth/AuthCredentialAdditionalChallengeOneOf.yaml +++ b/openapi/components/schemas/auth/AuthCredentialAdditionalChallengeOneOf.yaml @@ -1,6 +1,8 @@ oneOf: - $ref: ./EmailOtpCredentialAdditionalChallenge.yaml + - $ref: ./OauthCredentialAdditionalChallenge.yaml discriminator: propertyName: type mapping: EMAIL_OTP: ./EmailOtpCredentialAdditionalChallenge.yaml + OAUTH: ./OauthCredentialAdditionalChallenge.yaml diff --git a/openapi/components/schemas/auth/OauthCredentialAdditionalChallenge.yaml b/openapi/components/schemas/auth/OauthCredentialAdditionalChallenge.yaml new file mode 100644 index 00000000..933d11fb --- /dev/null +++ b/openapi/components/schemas/auth/OauthCredentialAdditionalChallenge.yaml @@ -0,0 +1,4 @@ +title: OAuth Credential Additional Challenge +allOf: + - $ref: ./AuthCredentialAdditionalChallenge.yaml + - $ref: ./OauthCredentialAdditionalChallengeFields.yaml diff --git a/openapi/components/schemas/auth/OauthCredentialAdditionalChallengeFields.yaml b/openapi/components/schemas/auth/OauthCredentialAdditionalChallengeFields.yaml new file mode 100644 index 00000000..88923c51 --- /dev/null +++ b/openapi/components/schemas/auth/OauthCredentialAdditionalChallengeFields.yaml @@ -0,0 +1,11 @@ +type: object +required: + - type +properties: + type: + type: string + enum: + - OAUTH + description: >- + Discriminator value identifying this as an additional-credential + challenge for an OAuth credential. diff --git a/openapi/paths/auth/auth_credentials.yaml b/openapi/paths/auth/auth_credentials.yaml index 525ebea5..1bbac911 100644 --- a/openapi/paths/auth/auth_credentials.yaml +++ b/openapi/paths/auth/auth_credentials.yaml @@ -114,6 +114,13 @@ post: payloadToSign: '{"requestId":"7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21","type":"EMAIL_OTP","accountId":"InternalAccount:01HF3Z4QWERTY","expiresAt":"2026-04-08T15:35:00Z"}' requestId: 7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21 expiresAt: '2026-04-08T15:35:00Z' + oauth: + summary: Additional OAuth credential challenge + value: + type: OAUTH + payloadToSign: Y2hhbGxlbmdlLXBheWxvYWQtdG8tc2lnbg== + requestId: 7c4a8d09-ca37-4e3e-9e0d-8c2b3e9a1f21 + expiresAt: '2026-04-08T15:35:00Z' '400': description: >- Bad request. Returned with `EMAIL_OTP_CREDENTIAL_ALREADY_EXISTS` when