@goauthentik/api 2024.6.3-1723050887 → 2024.6.3-1723053526
Sign up to get free protection for your applications and to get access to all the features.
- package/dist/esm/models/PatchedSAMLSourceRequest.d.ts +6 -0
- package/dist/esm/models/PatchedSAMLSourceRequest.js +2 -0
- package/dist/esm/models/SAMLSource.d.ts +6 -0
- package/dist/esm/models/SAMLSource.js +2 -0
- package/dist/esm/models/SAMLSourceRequest.d.ts +6 -0
- package/dist/esm/models/SAMLSourceRequest.js +2 -0
- package/dist/models/PatchedSAMLSourceRequest.d.ts +6 -0
- package/dist/models/PatchedSAMLSourceRequest.js +2 -0
- package/dist/models/SAMLSource.d.ts +6 -0
- package/dist/models/SAMLSource.js +2 -0
- package/dist/models/SAMLSourceRequest.d.ts +6 -0
- package/dist/models/SAMLSourceRequest.js +2 -0
- package/package.json +1 -1
- package/src/models/PatchedSAMLSourceRequest.ts +8 -0
- package/src/models/SAMLSource.ts +8 -0
- package/src/models/SAMLSourceRequest.ts +8 -0
@@ -160,6 +160,12 @@ export interface PatchedSAMLSourceRequest {
|
|
160
160
|
* @memberof PatchedSAMLSourceRequest
|
161
161
|
*/
|
162
162
|
temporaryUserDeleteAfter?: string;
|
163
|
+
/**
|
164
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
165
|
+
* @type {string}
|
166
|
+
* @memberof PatchedSAMLSourceRequest
|
167
|
+
*/
|
168
|
+
encryptionKp?: string | null;
|
163
169
|
}
|
164
170
|
/**
|
165
171
|
* Check if a given object implements the PatchedSAMLSourceRequest interface.
|
@@ -57,6 +57,7 @@ export function PatchedSAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator)
|
|
57
57
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
58
58
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
59
59
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
60
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
60
61
|
};
|
61
62
|
}
|
62
63
|
export function PatchedSAMLSourceRequestToJSON(value) {
|
@@ -90,5 +91,6 @@ export function PatchedSAMLSourceRequestToJSON(value) {
|
|
90
91
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
91
92
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
92
93
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
94
|
+
'encryption_kp': value.encryptionKp,
|
93
95
|
};
|
94
96
|
}
|
@@ -202,6 +202,12 @@ export interface SAMLSource {
|
|
202
202
|
* @memberof SAMLSource
|
203
203
|
*/
|
204
204
|
temporaryUserDeleteAfter?: string;
|
205
|
+
/**
|
206
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
207
|
+
* @type {string}
|
208
|
+
* @memberof SAMLSource
|
209
|
+
*/
|
210
|
+
encryptionKp?: string | null;
|
205
211
|
}
|
206
212
|
/**
|
207
213
|
* Check if a given object implements the SAMLSource interface.
|
@@ -75,6 +75,7 @@ export function SAMLSourceFromJSONTyped(json, ignoreDiscriminator) {
|
|
75
75
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
76
76
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
77
77
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
78
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
78
79
|
};
|
79
80
|
}
|
80
81
|
export function SAMLSourceToJSON(value) {
|
@@ -108,5 +109,6 @@ export function SAMLSourceToJSON(value) {
|
|
108
109
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
109
110
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
110
111
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
112
|
+
'encryption_kp': value.encryptionKp,
|
111
113
|
};
|
112
114
|
}
|
@@ -160,6 +160,12 @@ export interface SAMLSourceRequest {
|
|
160
160
|
* @memberof SAMLSourceRequest
|
161
161
|
*/
|
162
162
|
temporaryUserDeleteAfter?: string;
|
163
|
+
/**
|
164
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
165
|
+
* @type {string}
|
166
|
+
* @memberof SAMLSourceRequest
|
167
|
+
*/
|
168
|
+
encryptionKp?: string | null;
|
163
169
|
}
|
164
170
|
/**
|
165
171
|
* Check if a given object implements the SAMLSourceRequest interface.
|
@@ -61,6 +61,7 @@ export function SAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
61
61
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
62
62
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
63
63
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
64
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
64
65
|
};
|
65
66
|
}
|
66
67
|
export function SAMLSourceRequestToJSON(value) {
|
@@ -94,5 +95,6 @@ export function SAMLSourceRequestToJSON(value) {
|
|
94
95
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
95
96
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
96
97
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
98
|
+
'encryption_kp': value.encryptionKp,
|
97
99
|
};
|
98
100
|
}
|
@@ -160,6 +160,12 @@ export interface PatchedSAMLSourceRequest {
|
|
160
160
|
* @memberof PatchedSAMLSourceRequest
|
161
161
|
*/
|
162
162
|
temporaryUserDeleteAfter?: string;
|
163
|
+
/**
|
164
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
165
|
+
* @type {string}
|
166
|
+
* @memberof PatchedSAMLSourceRequest
|
167
|
+
*/
|
168
|
+
encryptionKp?: string | null;
|
163
169
|
}
|
164
170
|
/**
|
165
171
|
* Check if a given object implements the PatchedSAMLSourceRequest interface.
|
@@ -62,6 +62,7 @@ function PatchedSAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
62
62
|
'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
|
63
63
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
64
64
|
'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
65
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
65
66
|
};
|
66
67
|
}
|
67
68
|
exports.PatchedSAMLSourceRequestFromJSONTyped = PatchedSAMLSourceRequestFromJSONTyped;
|
@@ -96,6 +97,7 @@ function PatchedSAMLSourceRequestToJSON(value) {
|
|
96
97
|
'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
|
97
98
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
98
99
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
100
|
+
'encryption_kp': value.encryptionKp,
|
99
101
|
};
|
100
102
|
}
|
101
103
|
exports.PatchedSAMLSourceRequestToJSON = PatchedSAMLSourceRequestToJSON;
|
@@ -202,6 +202,12 @@ export interface SAMLSource {
|
|
202
202
|
* @memberof SAMLSource
|
203
203
|
*/
|
204
204
|
temporaryUserDeleteAfter?: string;
|
205
|
+
/**
|
206
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
207
|
+
* @type {string}
|
208
|
+
* @memberof SAMLSource
|
209
|
+
*/
|
210
|
+
encryptionKp?: string | null;
|
205
211
|
}
|
206
212
|
/**
|
207
213
|
* Check if a given object implements the SAMLSource interface.
|
@@ -80,6 +80,7 @@ function SAMLSourceFromJSONTyped(json, ignoreDiscriminator) {
|
|
80
80
|
'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
|
81
81
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
82
82
|
'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
83
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
83
84
|
};
|
84
85
|
}
|
85
86
|
exports.SAMLSourceFromJSONTyped = SAMLSourceFromJSONTyped;
|
@@ -114,6 +115,7 @@ function SAMLSourceToJSON(value) {
|
|
114
115
|
'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
|
115
116
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
116
117
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
118
|
+
'encryption_kp': value.encryptionKp,
|
117
119
|
};
|
118
120
|
}
|
119
121
|
exports.SAMLSourceToJSON = SAMLSourceToJSON;
|
@@ -160,6 +160,12 @@ export interface SAMLSourceRequest {
|
|
160
160
|
* @memberof SAMLSourceRequest
|
161
161
|
*/
|
162
162
|
temporaryUserDeleteAfter?: string;
|
163
|
+
/**
|
164
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
165
|
+
* @type {string}
|
166
|
+
* @memberof SAMLSourceRequest
|
167
|
+
*/
|
168
|
+
encryptionKp?: string | null;
|
163
169
|
}
|
164
170
|
/**
|
165
171
|
* Check if a given object implements the SAMLSourceRequest interface.
|
@@ -66,6 +66,7 @@ function SAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
66
66
|
'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
|
67
67
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
68
68
|
'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
69
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
69
70
|
};
|
70
71
|
}
|
71
72
|
exports.SAMLSourceRequestFromJSONTyped = SAMLSourceRequestFromJSONTyped;
|
@@ -100,6 +101,7 @@ function SAMLSourceRequestToJSON(value) {
|
|
100
101
|
'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
|
101
102
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
102
103
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
104
|
+
'encryption_kp': value.encryptionKp,
|
103
105
|
};
|
104
106
|
}
|
105
107
|
exports.SAMLSourceRequestToJSON = SAMLSourceRequestToJSON;
|
package/package.json
CHANGED
@@ -200,6 +200,12 @@ export interface PatchedSAMLSourceRequest {
|
|
200
200
|
* @memberof PatchedSAMLSourceRequest
|
201
201
|
*/
|
202
202
|
temporaryUserDeleteAfter?: string;
|
203
|
+
/**
|
204
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
205
|
+
* @type {string}
|
206
|
+
* @memberof PatchedSAMLSourceRequest
|
207
|
+
*/
|
208
|
+
encryptionKp?: string | null;
|
203
209
|
}
|
204
210
|
|
205
211
|
/**
|
@@ -244,6 +250,7 @@ export function PatchedSAMLSourceRequestFromJSONTyped(json: any, ignoreDiscrimin
|
|
244
250
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
245
251
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
246
252
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
253
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
247
254
|
};
|
248
255
|
}
|
249
256
|
|
@@ -279,6 +286,7 @@ export function PatchedSAMLSourceRequestToJSON(value?: PatchedSAMLSourceRequest
|
|
279
286
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
280
287
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
281
288
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
289
|
+
'encryption_kp': value.encryptionKp,
|
282
290
|
};
|
283
291
|
}
|
284
292
|
|
package/src/models/SAMLSource.ts
CHANGED
@@ -242,6 +242,12 @@ export interface SAMLSource {
|
|
242
242
|
* @memberof SAMLSource
|
243
243
|
*/
|
244
244
|
temporaryUserDeleteAfter?: string;
|
245
|
+
/**
|
246
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
247
|
+
* @type {string}
|
248
|
+
* @memberof SAMLSource
|
249
|
+
*/
|
250
|
+
encryptionKp?: string | null;
|
245
251
|
}
|
246
252
|
|
247
253
|
/**
|
@@ -304,6 +310,7 @@ export function SAMLSourceFromJSONTyped(json: any, ignoreDiscriminator: boolean)
|
|
304
310
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
305
311
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
306
312
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
313
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
307
314
|
};
|
308
315
|
}
|
309
316
|
|
@@ -339,6 +346,7 @@ export function SAMLSourceToJSON(value?: SAMLSource | null): any {
|
|
339
346
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
340
347
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
341
348
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
349
|
+
'encryption_kp': value.encryptionKp,
|
342
350
|
};
|
343
351
|
}
|
344
352
|
|
@@ -200,6 +200,12 @@ export interface SAMLSourceRequest {
|
|
200
200
|
* @memberof SAMLSourceRequest
|
201
201
|
*/
|
202
202
|
temporaryUserDeleteAfter?: string;
|
203
|
+
/**
|
204
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
205
|
+
* @type {string}
|
206
|
+
* @memberof SAMLSourceRequest
|
207
|
+
*/
|
208
|
+
encryptionKp?: string | null;
|
203
209
|
}
|
204
210
|
|
205
211
|
/**
|
@@ -248,6 +254,7 @@ export function SAMLSourceRequestFromJSONTyped(json: any, ignoreDiscriminator: b
|
|
248
254
|
'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
|
249
255
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
250
256
|
'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
|
257
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
251
258
|
};
|
252
259
|
}
|
253
260
|
|
@@ -283,6 +290,7 @@ export function SAMLSourceRequestToJSON(value?: SAMLSourceRequest | null): any {
|
|
283
290
|
'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
|
284
291
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
285
292
|
'temporary_user_delete_after': value.temporaryUserDeleteAfter,
|
293
|
+
'encryption_kp': value.encryptionKp,
|
286
294
|
};
|
287
295
|
}
|
288
296
|
|