@goauthentik/api 2024.6.3-1723050887 → 2024.6.3-1723053526

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -160,6 +160,12 @@ export interface PatchedSAMLSourceRequest {
160
160
  * @memberof PatchedSAMLSourceRequest
161
161
  */
162
162
  temporaryUserDeleteAfter?: string;
163
+ /**
164
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
165
+ * @type {string}
166
+ * @memberof PatchedSAMLSourceRequest
167
+ */
168
+ encryptionKp?: string | null;
163
169
  }
164
170
  /**
165
171
  * Check if a given object implements the PatchedSAMLSourceRequest interface.
@@ -57,6 +57,7 @@ export function PatchedSAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator)
57
57
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
58
58
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
59
59
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
60
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
60
61
  };
61
62
  }
62
63
  export function PatchedSAMLSourceRequestToJSON(value) {
@@ -90,5 +91,6 @@ export function PatchedSAMLSourceRequestToJSON(value) {
90
91
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
91
92
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
92
93
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
94
+ 'encryption_kp': value.encryptionKp,
93
95
  };
94
96
  }
@@ -202,6 +202,12 @@ export interface SAMLSource {
202
202
  * @memberof SAMLSource
203
203
  */
204
204
  temporaryUserDeleteAfter?: string;
205
+ /**
206
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
207
+ * @type {string}
208
+ * @memberof SAMLSource
209
+ */
210
+ encryptionKp?: string | null;
205
211
  }
206
212
  /**
207
213
  * Check if a given object implements the SAMLSource interface.
@@ -75,6 +75,7 @@ export function SAMLSourceFromJSONTyped(json, ignoreDiscriminator) {
75
75
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
76
76
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
77
77
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
78
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
78
79
  };
79
80
  }
80
81
  export function SAMLSourceToJSON(value) {
@@ -108,5 +109,6 @@ export function SAMLSourceToJSON(value) {
108
109
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
109
110
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
110
111
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
112
+ 'encryption_kp': value.encryptionKp,
111
113
  };
112
114
  }
@@ -160,6 +160,12 @@ export interface SAMLSourceRequest {
160
160
  * @memberof SAMLSourceRequest
161
161
  */
162
162
  temporaryUserDeleteAfter?: string;
163
+ /**
164
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
165
+ * @type {string}
166
+ * @memberof SAMLSourceRequest
167
+ */
168
+ encryptionKp?: string | null;
163
169
  }
164
170
  /**
165
171
  * Check if a given object implements the SAMLSourceRequest interface.
@@ -61,6 +61,7 @@ export function SAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
61
61
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
62
62
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
63
63
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
64
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
64
65
  };
65
66
  }
66
67
  export function SAMLSourceRequestToJSON(value) {
@@ -94,5 +95,6 @@ export function SAMLSourceRequestToJSON(value) {
94
95
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
95
96
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
96
97
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
98
+ 'encryption_kp': value.encryptionKp,
97
99
  };
98
100
  }
@@ -160,6 +160,12 @@ export interface PatchedSAMLSourceRequest {
160
160
  * @memberof PatchedSAMLSourceRequest
161
161
  */
162
162
  temporaryUserDeleteAfter?: string;
163
+ /**
164
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
165
+ * @type {string}
166
+ * @memberof PatchedSAMLSourceRequest
167
+ */
168
+ encryptionKp?: string | null;
163
169
  }
164
170
  /**
165
171
  * Check if a given object implements the PatchedSAMLSourceRequest interface.
@@ -62,6 +62,7 @@ function PatchedSAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
62
62
  'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
63
63
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
64
64
  'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
65
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
65
66
  };
66
67
  }
67
68
  exports.PatchedSAMLSourceRequestFromJSONTyped = PatchedSAMLSourceRequestFromJSONTyped;
@@ -96,6 +97,7 @@ function PatchedSAMLSourceRequestToJSON(value) {
96
97
  'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
97
98
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
98
99
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
100
+ 'encryption_kp': value.encryptionKp,
99
101
  };
100
102
  }
101
103
  exports.PatchedSAMLSourceRequestToJSON = PatchedSAMLSourceRequestToJSON;
@@ -202,6 +202,12 @@ export interface SAMLSource {
202
202
  * @memberof SAMLSource
203
203
  */
204
204
  temporaryUserDeleteAfter?: string;
205
+ /**
206
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
207
+ * @type {string}
208
+ * @memberof SAMLSource
209
+ */
210
+ encryptionKp?: string | null;
205
211
  }
206
212
  /**
207
213
  * Check if a given object implements the SAMLSource interface.
@@ -80,6 +80,7 @@ function SAMLSourceFromJSONTyped(json, ignoreDiscriminator) {
80
80
  'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
81
81
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
82
82
  'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
83
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
83
84
  };
84
85
  }
85
86
  exports.SAMLSourceFromJSONTyped = SAMLSourceFromJSONTyped;
@@ -114,6 +115,7 @@ function SAMLSourceToJSON(value) {
114
115
  'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
115
116
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
116
117
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
118
+ 'encryption_kp': value.encryptionKp,
117
119
  };
118
120
  }
119
121
  exports.SAMLSourceToJSON = SAMLSourceToJSON;
@@ -160,6 +160,12 @@ export interface SAMLSourceRequest {
160
160
  * @memberof SAMLSourceRequest
161
161
  */
162
162
  temporaryUserDeleteAfter?: string;
163
+ /**
164
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
165
+ * @type {string}
166
+ * @memberof SAMLSourceRequest
167
+ */
168
+ encryptionKp?: string | null;
163
169
  }
164
170
  /**
165
171
  * Check if a given object implements the SAMLSourceRequest interface.
@@ -66,6 +66,7 @@ function SAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
66
66
  'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
67
67
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
68
68
  'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
69
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
69
70
  };
70
71
  }
71
72
  exports.SAMLSourceRequestFromJSONTyped = SAMLSourceRequestFromJSONTyped;
@@ -100,6 +101,7 @@ function SAMLSourceRequestToJSON(value) {
100
101
  'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
101
102
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
102
103
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
104
+ 'encryption_kp': value.encryptionKp,
103
105
  };
104
106
  }
105
107
  exports.SAMLSourceRequestToJSON = SAMLSourceRequestToJSON;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.6.3-1723050887",
3
+ "version": "2024.6.3-1723053526",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -200,6 +200,12 @@ export interface PatchedSAMLSourceRequest {
200
200
  * @memberof PatchedSAMLSourceRequest
201
201
  */
202
202
  temporaryUserDeleteAfter?: string;
203
+ /**
204
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
205
+ * @type {string}
206
+ * @memberof PatchedSAMLSourceRequest
207
+ */
208
+ encryptionKp?: string | null;
203
209
  }
204
210
 
205
211
  /**
@@ -244,6 +250,7 @@ export function PatchedSAMLSourceRequestFromJSONTyped(json: any, ignoreDiscrimin
244
250
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
245
251
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
246
252
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
253
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
247
254
  };
248
255
  }
249
256
 
@@ -279,6 +286,7 @@ export function PatchedSAMLSourceRequestToJSON(value?: PatchedSAMLSourceRequest
279
286
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
280
287
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
281
288
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
289
+ 'encryption_kp': value.encryptionKp,
282
290
  };
283
291
  }
284
292
 
@@ -242,6 +242,12 @@ export interface SAMLSource {
242
242
  * @memberof SAMLSource
243
243
  */
244
244
  temporaryUserDeleteAfter?: string;
245
+ /**
246
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
247
+ * @type {string}
248
+ * @memberof SAMLSource
249
+ */
250
+ encryptionKp?: string | null;
245
251
  }
246
252
 
247
253
  /**
@@ -304,6 +310,7 @@ export function SAMLSourceFromJSONTyped(json: any, ignoreDiscriminator: boolean)
304
310
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
305
311
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
306
312
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
313
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
307
314
  };
308
315
  }
309
316
 
@@ -339,6 +346,7 @@ export function SAMLSourceToJSON(value?: SAMLSource | null): any {
339
346
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
340
347
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
341
348
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
349
+ 'encryption_kp': value.encryptionKp,
342
350
  };
343
351
  }
344
352
 
@@ -200,6 +200,12 @@ export interface SAMLSourceRequest {
200
200
  * @memberof SAMLSourceRequest
201
201
  */
202
202
  temporaryUserDeleteAfter?: string;
203
+ /**
204
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
205
+ * @type {string}
206
+ * @memberof SAMLSourceRequest
207
+ */
208
+ encryptionKp?: string | null;
203
209
  }
204
210
 
205
211
  /**
@@ -248,6 +254,7 @@ export function SAMLSourceRequestFromJSONTyped(json: any, ignoreDiscriminator: b
248
254
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
249
255
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
250
256
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
257
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
251
258
  };
252
259
  }
253
260
 
@@ -283,6 +290,7 @@ export function SAMLSourceRequestToJSON(value?: SAMLSourceRequest | null): any {
283
290
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
284
291
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
285
292
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
293
+ 'encryption_kp': value.encryptionKp,
286
294
  };
287
295
  }
288
296