@goauthentik/api 2024.6.3-1723050887 → 2024.6.3-1723053526
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/esm/models/PatchedSAMLSourceRequest.d.ts +6 -0
- package/dist/esm/models/PatchedSAMLSourceRequest.js +2 -0
- package/dist/esm/models/SAMLSource.d.ts +6 -0
- package/dist/esm/models/SAMLSource.js +2 -0
- package/dist/esm/models/SAMLSourceRequest.d.ts +6 -0
- package/dist/esm/models/SAMLSourceRequest.js +2 -0
- package/dist/models/PatchedSAMLSourceRequest.d.ts +6 -0
- package/dist/models/PatchedSAMLSourceRequest.js +2 -0
- package/dist/models/SAMLSource.d.ts +6 -0
- package/dist/models/SAMLSource.js +2 -0
- package/dist/models/SAMLSourceRequest.d.ts +6 -0
- package/dist/models/SAMLSourceRequest.js +2 -0
- package/package.json +1 -1
- package/src/models/PatchedSAMLSourceRequest.ts +8 -0
- package/src/models/SAMLSource.ts +8 -0
- package/src/models/SAMLSourceRequest.ts +8 -0
|
@@ -160,6 +160,12 @@ export interface PatchedSAMLSourceRequest {
|
|
|
160
160
|
* @memberof PatchedSAMLSourceRequest
|
|
161
161
|
*/
|
|
162
162
|
temporaryUserDeleteAfter?: string;
|
|
163
|
+
/**
|
|
164
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
165
|
+
* @type {string}
|
|
166
|
+
* @memberof PatchedSAMLSourceRequest
|
|
167
|
+
*/
|
|
168
|
+
encryptionKp?: string | null;
|
|
163
169
|
}
|
|
164
170
|
/**
|
|
165
171
|
* Check if a given object implements the PatchedSAMLSourceRequest interface.
|
|
@@ -57,6 +57,7 @@ export function PatchedSAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator)
|
|
|
57
57
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
|
58
58
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
59
59
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
|
60
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
60
61
|
};
|
|
61
62
|
}
|
|
62
63
|
export function PatchedSAMLSourceRequestToJSON(value) {
|
|
@@ -90,5 +91,6 @@ export function PatchedSAMLSourceRequestToJSON(value) {
|
|
|
90
91
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
|
91
92
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
92
93
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
|
94
|
+
'encryption_kp': value.encryptionKp,
|
|
93
95
|
};
|
|
94
96
|
}
|
|
@@ -202,6 +202,12 @@ export interface SAMLSource {
|
|
|
202
202
|
* @memberof SAMLSource
|
|
203
203
|
*/
|
|
204
204
|
temporaryUserDeleteAfter?: string;
|
|
205
|
+
/**
|
|
206
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
207
|
+
* @type {string}
|
|
208
|
+
* @memberof SAMLSource
|
|
209
|
+
*/
|
|
210
|
+
encryptionKp?: string | null;
|
|
205
211
|
}
|
|
206
212
|
/**
|
|
207
213
|
* Check if a given object implements the SAMLSource interface.
|
|
@@ -75,6 +75,7 @@ export function SAMLSourceFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
75
75
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
|
76
76
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
77
77
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
|
78
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
78
79
|
};
|
|
79
80
|
}
|
|
80
81
|
export function SAMLSourceToJSON(value) {
|
|
@@ -108,5 +109,6 @@ export function SAMLSourceToJSON(value) {
|
|
|
108
109
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
|
109
110
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
110
111
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
|
112
|
+
'encryption_kp': value.encryptionKp,
|
|
111
113
|
};
|
|
112
114
|
}
|
|
@@ -160,6 +160,12 @@ export interface SAMLSourceRequest {
|
|
|
160
160
|
* @memberof SAMLSourceRequest
|
|
161
161
|
*/
|
|
162
162
|
temporaryUserDeleteAfter?: string;
|
|
163
|
+
/**
|
|
164
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
165
|
+
* @type {string}
|
|
166
|
+
* @memberof SAMLSourceRequest
|
|
167
|
+
*/
|
|
168
|
+
encryptionKp?: string | null;
|
|
163
169
|
}
|
|
164
170
|
/**
|
|
165
171
|
* Check if a given object implements the SAMLSourceRequest interface.
|
|
@@ -61,6 +61,7 @@ export function SAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
61
61
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
|
62
62
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
63
63
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
|
64
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
64
65
|
};
|
|
65
66
|
}
|
|
66
67
|
export function SAMLSourceRequestToJSON(value) {
|
|
@@ -94,5 +95,6 @@ export function SAMLSourceRequestToJSON(value) {
|
|
|
94
95
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
|
95
96
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
96
97
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
|
98
|
+
'encryption_kp': value.encryptionKp,
|
|
97
99
|
};
|
|
98
100
|
}
|
|
@@ -160,6 +160,12 @@ export interface PatchedSAMLSourceRequest {
|
|
|
160
160
|
* @memberof PatchedSAMLSourceRequest
|
|
161
161
|
*/
|
|
162
162
|
temporaryUserDeleteAfter?: string;
|
|
163
|
+
/**
|
|
164
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
165
|
+
* @type {string}
|
|
166
|
+
* @memberof PatchedSAMLSourceRequest
|
|
167
|
+
*/
|
|
168
|
+
encryptionKp?: string | null;
|
|
163
169
|
}
|
|
164
170
|
/**
|
|
165
171
|
* Check if a given object implements the PatchedSAMLSourceRequest interface.
|
|
@@ -62,6 +62,7 @@ function PatchedSAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
62
62
|
'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
|
|
63
63
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
|
64
64
|
'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
|
65
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
65
66
|
};
|
|
66
67
|
}
|
|
67
68
|
exports.PatchedSAMLSourceRequestFromJSONTyped = PatchedSAMLSourceRequestFromJSONTyped;
|
|
@@ -96,6 +97,7 @@ function PatchedSAMLSourceRequestToJSON(value) {
|
|
|
96
97
|
'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
|
|
97
98
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
|
98
99
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
|
100
|
+
'encryption_kp': value.encryptionKp,
|
|
99
101
|
};
|
|
100
102
|
}
|
|
101
103
|
exports.PatchedSAMLSourceRequestToJSON = PatchedSAMLSourceRequestToJSON;
|
|
@@ -202,6 +202,12 @@ export interface SAMLSource {
|
|
|
202
202
|
* @memberof SAMLSource
|
|
203
203
|
*/
|
|
204
204
|
temporaryUserDeleteAfter?: string;
|
|
205
|
+
/**
|
|
206
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
207
|
+
* @type {string}
|
|
208
|
+
* @memberof SAMLSource
|
|
209
|
+
*/
|
|
210
|
+
encryptionKp?: string | null;
|
|
205
211
|
}
|
|
206
212
|
/**
|
|
207
213
|
* Check if a given object implements the SAMLSource interface.
|
|
@@ -80,6 +80,7 @@ function SAMLSourceFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
80
80
|
'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
|
|
81
81
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
|
82
82
|
'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
|
83
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
83
84
|
};
|
|
84
85
|
}
|
|
85
86
|
exports.SAMLSourceFromJSONTyped = SAMLSourceFromJSONTyped;
|
|
@@ -114,6 +115,7 @@ function SAMLSourceToJSON(value) {
|
|
|
114
115
|
'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
|
|
115
116
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
|
116
117
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
|
118
|
+
'encryption_kp': value.encryptionKp,
|
|
117
119
|
};
|
|
118
120
|
}
|
|
119
121
|
exports.SAMLSourceToJSON = SAMLSourceToJSON;
|
|
@@ -160,6 +160,12 @@ export interface SAMLSourceRequest {
|
|
|
160
160
|
* @memberof SAMLSourceRequest
|
|
161
161
|
*/
|
|
162
162
|
temporaryUserDeleteAfter?: string;
|
|
163
|
+
/**
|
|
164
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
165
|
+
* @type {string}
|
|
166
|
+
* @memberof SAMLSourceRequest
|
|
167
|
+
*/
|
|
168
|
+
encryptionKp?: string | null;
|
|
163
169
|
}
|
|
164
170
|
/**
|
|
165
171
|
* Check if a given object implements the SAMLSourceRequest interface.
|
|
@@ -66,6 +66,7 @@ function SAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
66
66
|
'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
|
|
67
67
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
|
68
68
|
'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
|
69
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
69
70
|
};
|
|
70
71
|
}
|
|
71
72
|
exports.SAMLSourceRequestFromJSONTyped = SAMLSourceRequestFromJSONTyped;
|
|
@@ -100,6 +101,7 @@ function SAMLSourceRequestToJSON(value) {
|
|
|
100
101
|
'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
|
|
101
102
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
|
102
103
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
|
104
|
+
'encryption_kp': value.encryptionKp,
|
|
103
105
|
};
|
|
104
106
|
}
|
|
105
107
|
exports.SAMLSourceRequestToJSON = SAMLSourceRequestToJSON;
|
package/package.json
CHANGED
|
@@ -200,6 +200,12 @@ export interface PatchedSAMLSourceRequest {
|
|
|
200
200
|
* @memberof PatchedSAMLSourceRequest
|
|
201
201
|
*/
|
|
202
202
|
temporaryUserDeleteAfter?: string;
|
|
203
|
+
/**
|
|
204
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
205
|
+
* @type {string}
|
|
206
|
+
* @memberof PatchedSAMLSourceRequest
|
|
207
|
+
*/
|
|
208
|
+
encryptionKp?: string | null;
|
|
203
209
|
}
|
|
204
210
|
|
|
205
211
|
/**
|
|
@@ -244,6 +250,7 @@ export function PatchedSAMLSourceRequestFromJSONTyped(json: any, ignoreDiscrimin
|
|
|
244
250
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
|
245
251
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
246
252
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
|
253
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
247
254
|
};
|
|
248
255
|
}
|
|
249
256
|
|
|
@@ -279,6 +286,7 @@ export function PatchedSAMLSourceRequestToJSON(value?: PatchedSAMLSourceRequest
|
|
|
279
286
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
|
280
287
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
281
288
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
|
289
|
+
'encryption_kp': value.encryptionKp,
|
|
282
290
|
};
|
|
283
291
|
}
|
|
284
292
|
|
package/src/models/SAMLSource.ts
CHANGED
|
@@ -242,6 +242,12 @@ export interface SAMLSource {
|
|
|
242
242
|
* @memberof SAMLSource
|
|
243
243
|
*/
|
|
244
244
|
temporaryUserDeleteAfter?: string;
|
|
245
|
+
/**
|
|
246
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
247
|
+
* @type {string}
|
|
248
|
+
* @memberof SAMLSource
|
|
249
|
+
*/
|
|
250
|
+
encryptionKp?: string | null;
|
|
245
251
|
}
|
|
246
252
|
|
|
247
253
|
/**
|
|
@@ -304,6 +310,7 @@ export function SAMLSourceFromJSONTyped(json: any, ignoreDiscriminator: boolean)
|
|
|
304
310
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
|
305
311
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
306
312
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
|
313
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
307
314
|
};
|
|
308
315
|
}
|
|
309
316
|
|
|
@@ -339,6 +346,7 @@ export function SAMLSourceToJSON(value?: SAMLSource | null): any {
|
|
|
339
346
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
|
340
347
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
341
348
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
|
349
|
+
'encryption_kp': value.encryptionKp,
|
|
342
350
|
};
|
|
343
351
|
}
|
|
344
352
|
|
|
@@ -200,6 +200,12 @@ export interface SAMLSourceRequest {
|
|
|
200
200
|
* @memberof SAMLSourceRequest
|
|
201
201
|
*/
|
|
202
202
|
temporaryUserDeleteAfter?: string;
|
|
203
|
+
/**
|
|
204
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
205
|
+
* @type {string}
|
|
206
|
+
* @memberof SAMLSourceRequest
|
|
207
|
+
*/
|
|
208
|
+
encryptionKp?: string | null;
|
|
203
209
|
}
|
|
204
210
|
|
|
205
211
|
/**
|
|
@@ -248,6 +254,7 @@ export function SAMLSourceRequestFromJSONTyped(json: any, ignoreDiscriminator: b
|
|
|
248
254
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
|
249
255
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
250
256
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
|
257
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
251
258
|
};
|
|
252
259
|
}
|
|
253
260
|
|
|
@@ -283,6 +290,7 @@ export function SAMLSourceRequestToJSON(value?: SAMLSourceRequest | null): any {
|
|
|
283
290
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
|
284
291
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
285
292
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
|
293
|
+
'encryption_kp': value.encryptionKp,
|
|
286
294
|
};
|
|
287
295
|
}
|
|
288
296
|
|