Skip to content
Merged
5 changes: 5 additions & 0 deletions .changeset/blue-comics-kneel.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
'@clerk/backend': minor
---

Add missing properties to OAuthApplicationJSON
2 changes: 2 additions & 0 deletions .changeset/small-moments-find.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
---
---
Comment on lines +1 to +2
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Verification agent

🧩 Analysis chain

Empty changeset frontmatter — specify package(s) and bump type, or CI/release will fail

This file contains only two --- lines with no package bump metadata or description. Changesets require a YAML frontmatter block mapping package names to semver bump types, followed by a description. Given the PR adds new OAuthApplication fields (public surface) and TypeDoc, this likely warrants a minor bump for the backend SDK. Please fill this out (or remove the file if no release is intended).

Suggested content (verify package names and bump types before committing):

---- 
----
+---
+  '@clerk/backend': minor
+---
+
+feat(backend): Add TypeDoc to OAuthApplication and surface new fields
+
+- JSON: client_uri, client_image_url, dynamically_registered, consent_screen_enabled, pkce_required
+- Class: clientUri, clientImageUrl, dynamicallyRegistered, consentScreenEnabled, pkceRequired

If additional published packages are affected, list them in the same frontmatter block with their respective bump types.

Run this script to verify the correct package name(s) and decide bump levels based on changed files:


🏁 Script executed:

#!/bin/bash
set -euo pipefail

# List changed files against main (adjust base if needed)
BASE_REF=${BASE_REF:-origin/main}
git fetch -q origin || true
CHANGED_FILES=$(git diff --name-only "${BASE_REF}"...HEAD)

echo "Changed files:"
printf "%s\n" "${CHANGED_FILES}"

echo
echo "Resolving impacted package roots and names:"
echo "${CHANGED_FILES}" | while read -r f; do
  # Walk up to find nearest package.json
  dir="$(dirname "$f")"
  while [[ "$dir" != "." && "$dir" != "/" ]]; do
    if [[ -f "$dir/package.json" ]]; then
      echo "$dir/package.json"
      break
    fi
    dir="$(dirname "$dir")"
  done
done | sort -u | while read -r pkgjson; do
  name=$(jq -r '.name' "$pkgjson" 2>/dev/null || echo null)
  private=$(jq -r '.private // false' "$pkgjson" 2>/dev/null || echo false)
  echo "$(dirname "$pkgjson") — name: $name — private: $private"
done

echo
echo "Tip:"
echo "- Use 'minor' if you surfaced new public fields/types; 'patch' if purely docs/internal."

Length of output: 3324


Specify the changeset frontmatter for @clerk/backend

Your .changeset/small-moments-find.md is currently empty, which will cause CI/release to fail. Since your PR adds new public fields/types to the backend SDK, you should apply a minor bump to @clerk/backend. Please update the file to include:

---
-  
+
+---
+  '@clerk/backend': minor
+---
+
+feat(backend): add TypeDoc & expose new OAuthApplication fields
+
+- JSON: client_uri, client_image_url, dynamically_registered, consent_screen_enabled, pkce_required  
+- Class: clientUri, clientImageUrl, dynamicallyRegistered, consentScreenEnabled, pkceRequired

• File needing update:

  • .changeset/small-moments-find.md

Tag the correct package and bump type to ensure the release goes out smoothly.

Committable suggestion skipped: line range outside the PR's diff.

🧰 Tools
🪛 LanguageTool

[grammar] ~1-~1: Hier könnte ein Fehler sein.
Context: --- ---

(QB_NEW_DE)

🤖 Prompt for AI Agents
In .changeset/small-moments-find.md around lines 1 to 2, the file is empty and
missing the required changeset frontmatter; add a valid changeset YAML block
that lists the package @clerk/backend and sets the bump type to "minor" (and
include a short summary message), ensuring the file begins and ends with --- and
contains the package name and "minor" bump so CI/release will succeed.

Original file line number Diff line number Diff line change
Expand Up @@ -237,6 +237,7 @@ exports[`Typedoc output > should have a deliberate file structure 1`] = `
"backend/infer-auth-object-from-token.mdx",
"backend/invitation-status.mdx",
"backend/invitation.mdx",
"backend/o-auth-application.mdx",
"backend/organization-invitation-status.mdx",
"backend/organization-invitation.mdx",
"backend/organization-membership-public-user-data.mdx",
Expand Down
5 changes: 5 additions & 0 deletions packages/backend/src/api/resources/JSON.ts
Original file line number Diff line number Diff line change
Expand Up @@ -320,6 +320,11 @@ export interface OAuthApplicationJSON extends ClerkResourceJSON {
instance_id: string;
name: string;
client_id: string;
client_uri: string | null;
client_image_url: string | null;
dynamically_registered: boolean;
consent_screen_enabled: boolean;
pkce_required: boolean;
public: boolean;
scopes: string;
redirect_uris: Array<string>;
Expand Down
73 changes: 73 additions & 0 deletions packages/backend/src/api/resources/OAuthApplication.ts
Original file line number Diff line number Diff line change
@@ -1,21 +1,89 @@
import type { OAuthApplicationJSON } from './JSON';

/**
* The Backend `OAuthApplication` object holds information about an OAuth application.
*/
export class OAuthApplication {
constructor(
/**
* The unique identifier for the OAuth application.
*/
readonly id: string,
/**
* The ID of the instance that this OAuth application belongs to.
*/
readonly instanceId: string,
/**
* The name of the new OAuth application.
*/
readonly name: string,
/**
* The ID of the client associated with the OAuth application.
*/
readonly clientId: string,
/**
* The public-facing URL of the OAuth application, often shown on consent screens.
*/
readonly clientUri: string | null,
/**
* The URL of the image or logo representing the OAuth application.
*/
readonly clientImageUrl: string | null,
/**
* Specifies whether the OAuth application is dynamically registered.
*/
readonly dynamicallyRegistered: boolean,
/**
* Specifies whether the consent screen should be displayed in the authentication flow. Cannot be disabled for dynamically registered OAuth applications.
*/
readonly consentScreenEnabled: boolean,
/**
* Specifies whether the Proof Key of Code Exchange (PKCE) flow should be required in the authentication flow.
*/
readonly pkceRequired: boolean,
/**
* Indicates whether the client is public. If true, the Proof Key of Code Exchange (PKCE) flow can be used.
*/
readonly isPublic: boolean, // NOTE: `public` is reserved
/**
* Scopes for the new OAuth application.
*/
readonly scopes: string,
/**
* An array of redirect URIs of the new OAuth application.
*/
readonly redirectUris: Array<string>,
/**
* The URL used to authorize the user and obtain an authorization code.
*/
readonly authorizeUrl: string,
/**
* The URL used by the client to exchange an authorization code for an access token.
*/
readonly tokenFetchUrl: string,
/**
* The URL where the client can retrieve user information using an access token.
*/
readonly userInfoUrl: string,
/**
* The OpenID Connect discovery endpoint URL for this OAuth application.
*/
readonly discoveryUrl: string,
/**
* The URL used to introspect and validate issued access tokens.
*/
readonly tokenIntrospectionUrl: string,
/**
* The date when the OAuth application was first created.
*/
readonly createdAt: number,
/**
* The date when the OAuth application was last updated.
*/
readonly updatedAt: number,
/**
* The client secret associated with the OAuth application. Empty if public client.
*/
readonly clientSecret?: string,
) {}

Expand All @@ -25,6 +93,11 @@ export class OAuthApplication {
data.instance_id,
data.name,
data.client_id,
data.client_uri,
data.client_image_url,
data.dynamically_registered,
data.consent_screen_enabled,
data.pkce_required,
data.public,
data.scopes,
data.redirect_uris,
Expand Down