You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Nov 18, 2024. It is now read-only.
|`tune_provider_timeout_seconds`| Maximum duration to wait for a response from the provider for background credential operations. | Integer | 30 | No |
266
+
|`tune_provider_timeout_expiry_leeway_factor`| A multiplier for the `tune_provider_timeout_seconds` option to allow a slow provider to respond as a credential approaches expiration. Must be at least 1. | Number | 1.5 | No |
267
+
|`tune_refresh_check_interval_seconds`| Number of seconds between checking tokens for refresh. Set to 0 to disable automatic background refreshing. | Integer | 60 | No |
268
+
|`tune_refresh_expiry_delta_factor`| A multiplier for the refresh check interval to use to detect tokens that will expire soon after the impending refresh. Must be at least 1. | Number | 1.2 | No |
269
+
|`tune_reap_check_interval_seconds`| Number of seconds between running the reaper process. Set to 0 to disable automatic reaping of expired credentials. | Integer | 300<supid="ret-1">[1](#footnote-1)</sup> | No |
270
+
|`tune_reap_dry_run`| If set, the reaper process will only report which credentials it would remove, but not actually delete them from storage. | Boolean | False | No |
271
+
|`tune_reap_non_refreshable_seconds`| Minimum additional time to wait before automatically deleting an expired credential that does not have a refresh token. Set to 0 to disable this reaping criterion. | Integer | 86400 | No |
272
+
|`tune_reap_revoked_seconds`| Minimum additional time to wait before automatically deleting an expired credential that has a revoked refresh token. Set to 0 to disable this reaping criterion. | Integer | 3600 | No |
273
+
|`tune_reap_transient_error_attempts`| Minimum number of refresh attempts to make before automatically deleting an expired credential. Set to 0 to disable this reaping criterion. | Integer | 10 | No |
274
+
|`tune_reap_transient_error_seconds`| Minimum additional time to wait before automatically deleting an expired credential that cannot be refreshed because of a transient problem like network connectivity issues. Set to 0 to disable this reaping criterion. | Integer | 86400 | No |
200
275
201
276
#### `DELETE` (`delete`)
202
277
@@ -218,7 +293,7 @@ endpoint will return an error.
218
293
|`redirect_url`| The URL to redirect to once the user has authorized this application. | String | None | No |
219
294
|`scopes`| A list of explicit scopes to request. | List of String | None | No |
220
295
|`state`| The unique state to send to the authorization URL. | String | None | Yes |
221
-
|`provider_options`| A list of options to pass on to the provider for configuring the authorization code URL. | Map of String🠦String | None |None|
296
+
|`provider_options`| A list of options to pass on to the provider for configuring the authorization code URL. | Map of String🠦String | None |No|
222
297
223
298
### `config/self/:name`
224
299
@@ -237,7 +312,7 @@ the `client_credentials` grant type.
|`token_url_params`| A map of additional query string parameters to provide to the token URL. If any keys in this map conflict with the parameters stored in the configuration, the configuration's parameters take precedence. | Map of String🠦String | None | No |
239
314
|`scopes`| A list of explicit scopes to request. | List of String | None | No |
240
-
|`provider_options`| A list of options to pass on to the provider for configuring this token exchange. | Map of String🠦String | None |None|
315
+
|`provider_options`| A list of options to pass on to the provider for configuring this token exchange. | Map of String🠦String | None |No|
241
316
242
317
#### `DELETE` (`delete`)
243
318
@@ -257,10 +332,7 @@ using the `refresh_token` grant type if possible.
257
332
258
333
| Name | Description | Type | Default | Required |
|`minimum_seconds`| Minimum seconds before access token expires | Integer | * | No |
261
-
262
-
\* Defaults to underlying library default, which is 10 seconds unless
263
-
the token expiration time is set to zero.
335
+
|`minimum_seconds`| Minimum additional duration to require the access token to be valid for. | Integer | 10<supid="ret-2-a">[2](#footnote-2)</sup> | No |
264
336
265
337
#### `PUT` (`write`)
266
338
@@ -270,7 +342,7 @@ type.
270
342
271
343
| Name | Description | Type | Default | Required |
|`grant_type`| The grant type to use. Must be one of `authorization_code`, `refresh_token`, or `urn:ietf:params:oauth:grant-type:device_code`. | String |`authorization_code`*| No |
345
+
|`grant_type`| The grant type to use. Must be one of `authorization_code`, `refresh_token`, or `urn:ietf:params:oauth:grant-type:device_code`. | String |`authorization_code`<supid="ret-3">[3](#footnote-3)</sup>| No |
274
346
|`provider_options`| A list of options to pass on to the provider for configuring this token exchange. | Map of String🠦String | None | Refer to provider documentation |
275
347
276
348
This operation takes additional fields depending on which grant type is chosen:
@@ -295,8 +367,6 @@ This operation takes additional fields depending on which grant type is chosen:
295
367
|`device_code`| A device code that has already been retrieved. If not specified, a new device code will be retrieved. | String | None | No |
296
368
|`scopes`| If a device code is not specified, the scopes to request. | List of String | None | No |
297
369
298
-
\* For compatibility, if `grant_type` is not provided and `refresh_token` is set, the `grant_type` will default to `refresh_token`.
299
-
300
370
#### `DELETE` (`delete`)
301
371
302
372
Remove the credential information from storage. This does not delete the
@@ -316,10 +386,7 @@ new credential using the `client_credentials` grant type.
316
386
317
387
| Name | Description | Type | Default | Required |
|`minimum_seconds`| Minimum seconds before access token expires | Integer | * | No |
320
-
321
-
\* Defaults to underlying library default, which is 10 seconds unless
322
-
the token expiration time is set to zero.
389
+
|`minimum_seconds`| Minimum additional duration to require the access token to be valid for. | Integer | 10<supid="ret-2-b">[2](#footnote-2)</sup> | No |
0 commit comments