@goauthentik/api 2024.6.3-1723050887 → 2024.6.3-1723053526

Sign up to get free protection for your applications and to get access to all the features.
@@ -160,6 +160,12 @@ export interface PatchedSAMLSourceRequest {
160
160
  * @memberof PatchedSAMLSourceRequest
161
161
  */
162
162
  temporaryUserDeleteAfter?: string;
163
+ /**
164
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
165
+ * @type {string}
166
+ * @memberof PatchedSAMLSourceRequest
167
+ */
168
+ encryptionKp?: string | null;
163
169
  }
164
170
  /**
165
171
  * Check if a given object implements the PatchedSAMLSourceRequest interface.
@@ -57,6 +57,7 @@ export function PatchedSAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator)
57
57
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
58
58
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
59
59
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
60
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
60
61
  };
61
62
  }
62
63
  export function PatchedSAMLSourceRequestToJSON(value) {
@@ -90,5 +91,6 @@ export function PatchedSAMLSourceRequestToJSON(value) {
90
91
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
91
92
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
92
93
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
94
+ 'encryption_kp': value.encryptionKp,
93
95
  };
94
96
  }
@@ -202,6 +202,12 @@ export interface SAMLSource {
202
202
  * @memberof SAMLSource
203
203
  */
204
204
  temporaryUserDeleteAfter?: string;
205
+ /**
206
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
207
+ * @type {string}
208
+ * @memberof SAMLSource
209
+ */
210
+ encryptionKp?: string | null;
205
211
  }
206
212
  /**
207
213
  * Check if a given object implements the SAMLSource interface.
@@ -75,6 +75,7 @@ export function SAMLSourceFromJSONTyped(json, ignoreDiscriminator) {
75
75
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
76
76
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
77
77
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
78
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
78
79
  };
79
80
  }
80
81
  export function SAMLSourceToJSON(value) {
@@ -108,5 +109,6 @@ export function SAMLSourceToJSON(value) {
108
109
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
109
110
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
110
111
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
112
+ 'encryption_kp': value.encryptionKp,
111
113
  };
112
114
  }
@@ -160,6 +160,12 @@ export interface SAMLSourceRequest {
160
160
  * @memberof SAMLSourceRequest
161
161
  */
162
162
  temporaryUserDeleteAfter?: string;
163
+ /**
164
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
165
+ * @type {string}
166
+ * @memberof SAMLSourceRequest
167
+ */
168
+ encryptionKp?: string | null;
163
169
  }
164
170
  /**
165
171
  * Check if a given object implements the SAMLSourceRequest interface.
@@ -61,6 +61,7 @@ export function SAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
61
61
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
62
62
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
63
63
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
64
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
64
65
  };
65
66
  }
66
67
  export function SAMLSourceRequestToJSON(value) {
@@ -94,5 +95,6 @@ export function SAMLSourceRequestToJSON(value) {
94
95
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
95
96
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
96
97
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
98
+ 'encryption_kp': value.encryptionKp,
97
99
  };
98
100
  }
@@ -160,6 +160,12 @@ export interface PatchedSAMLSourceRequest {
160
160
  * @memberof PatchedSAMLSourceRequest
161
161
  */
162
162
  temporaryUserDeleteAfter?: string;
163
+ /**
164
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
165
+ * @type {string}
166
+ * @memberof PatchedSAMLSourceRequest
167
+ */
168
+ encryptionKp?: string | null;
163
169
  }
164
170
  /**
165
171
  * Check if a given object implements the PatchedSAMLSourceRequest interface.
@@ -62,6 +62,7 @@ function PatchedSAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
62
62
  'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
63
63
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
64
64
  'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
65
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
65
66
  };
66
67
  }
67
68
  exports.PatchedSAMLSourceRequestFromJSONTyped = PatchedSAMLSourceRequestFromJSONTyped;
@@ -96,6 +97,7 @@ function PatchedSAMLSourceRequestToJSON(value) {
96
97
  'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
97
98
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
98
99
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
100
+ 'encryption_kp': value.encryptionKp,
99
101
  };
100
102
  }
101
103
  exports.PatchedSAMLSourceRequestToJSON = PatchedSAMLSourceRequestToJSON;
@@ -202,6 +202,12 @@ export interface SAMLSource {
202
202
  * @memberof SAMLSource
203
203
  */
204
204
  temporaryUserDeleteAfter?: string;
205
+ /**
206
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
207
+ * @type {string}
208
+ * @memberof SAMLSource
209
+ */
210
+ encryptionKp?: string | null;
205
211
  }
206
212
  /**
207
213
  * Check if a given object implements the SAMLSource interface.
@@ -80,6 +80,7 @@ function SAMLSourceFromJSONTyped(json, ignoreDiscriminator) {
80
80
  'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
81
81
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
82
82
  'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
83
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
83
84
  };
84
85
  }
85
86
  exports.SAMLSourceFromJSONTyped = SAMLSourceFromJSONTyped;
@@ -114,6 +115,7 @@ function SAMLSourceToJSON(value) {
114
115
  'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
115
116
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
116
117
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
118
+ 'encryption_kp': value.encryptionKp,
117
119
  };
118
120
  }
119
121
  exports.SAMLSourceToJSON = SAMLSourceToJSON;
@@ -160,6 +160,12 @@ export interface SAMLSourceRequest {
160
160
  * @memberof SAMLSourceRequest
161
161
  */
162
162
  temporaryUserDeleteAfter?: string;
163
+ /**
164
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
165
+ * @type {string}
166
+ * @memberof SAMLSourceRequest
167
+ */
168
+ encryptionKp?: string | null;
163
169
  }
164
170
  /**
165
171
  * Check if a given object implements the SAMLSourceRequest interface.
@@ -66,6 +66,7 @@ function SAMLSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
66
66
  'digestAlgorithm': !(0, runtime_1.exists)(json, 'digest_algorithm') ? undefined : (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumFromJSON)(json['digest_algorithm']),
67
67
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
68
68
  'temporaryUserDeleteAfter': !(0, runtime_1.exists)(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
69
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
69
70
  };
70
71
  }
71
72
  exports.SAMLSourceRequestFromJSONTyped = SAMLSourceRequestFromJSONTyped;
@@ -100,6 +101,7 @@ function SAMLSourceRequestToJSON(value) {
100
101
  'digest_algorithm': (0, DigestAlgorithmEnum_1.DigestAlgorithmEnumToJSON)(value.digestAlgorithm),
101
102
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
102
103
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
104
+ 'encryption_kp': value.encryptionKp,
103
105
  };
104
106
  }
105
107
  exports.SAMLSourceRequestToJSON = SAMLSourceRequestToJSON;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.6.3-1723050887",
3
+ "version": "2024.6.3-1723053526",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -200,6 +200,12 @@ export interface PatchedSAMLSourceRequest {
200
200
  * @memberof PatchedSAMLSourceRequest
201
201
  */
202
202
  temporaryUserDeleteAfter?: string;
203
+ /**
204
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
205
+ * @type {string}
206
+ * @memberof PatchedSAMLSourceRequest
207
+ */
208
+ encryptionKp?: string | null;
203
209
  }
204
210
 
205
211
  /**
@@ -244,6 +250,7 @@ export function PatchedSAMLSourceRequestFromJSONTyped(json: any, ignoreDiscrimin
244
250
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
245
251
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
246
252
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
253
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
247
254
  };
248
255
  }
249
256
 
@@ -279,6 +286,7 @@ export function PatchedSAMLSourceRequestToJSON(value?: PatchedSAMLSourceRequest
279
286
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
280
287
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
281
288
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
289
+ 'encryption_kp': value.encryptionKp,
282
290
  };
283
291
  }
284
292
 
@@ -242,6 +242,12 @@ export interface SAMLSource {
242
242
  * @memberof SAMLSource
243
243
  */
244
244
  temporaryUserDeleteAfter?: string;
245
+ /**
246
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
247
+ * @type {string}
248
+ * @memberof SAMLSource
249
+ */
250
+ encryptionKp?: string | null;
245
251
  }
246
252
 
247
253
  /**
@@ -304,6 +310,7 @@ export function SAMLSourceFromJSONTyped(json: any, ignoreDiscriminator: boolean)
304
310
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
305
311
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
306
312
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
313
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
307
314
  };
308
315
  }
309
316
 
@@ -339,6 +346,7 @@ export function SAMLSourceToJSON(value?: SAMLSource | null): any {
339
346
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
340
347
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
341
348
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
349
+ 'encryption_kp': value.encryptionKp,
342
350
  };
343
351
  }
344
352
 
@@ -200,6 +200,12 @@ export interface SAMLSourceRequest {
200
200
  * @memberof SAMLSourceRequest
201
201
  */
202
202
  temporaryUserDeleteAfter?: string;
203
+ /**
204
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
205
+ * @type {string}
206
+ * @memberof SAMLSourceRequest
207
+ */
208
+ encryptionKp?: string | null;
203
209
  }
204
210
 
205
211
  /**
@@ -248,6 +254,7 @@ export function SAMLSourceRequestFromJSONTyped(json: any, ignoreDiscriminator: b
248
254
  'digestAlgorithm': !exists(json, 'digest_algorithm') ? undefined : DigestAlgorithmEnumFromJSON(json['digest_algorithm']),
249
255
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
250
256
  'temporaryUserDeleteAfter': !exists(json, 'temporary_user_delete_after') ? undefined : json['temporary_user_delete_after'],
257
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
251
258
  };
252
259
  }
253
260
 
@@ -283,6 +290,7 @@ export function SAMLSourceRequestToJSON(value?: SAMLSourceRequest | null): any {
283
290
  'digest_algorithm': DigestAlgorithmEnumToJSON(value.digestAlgorithm),
284
291
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
285
292
  'temporary_user_delete_after': value.temporaryUserDeleteAfter,
293
+ 'encryption_kp': value.encryptionKp,
286
294
  };
287
295
  }
288
296