@goauthentik/api 2024.6.3-1723497462 → 2024.6.3-1723921843
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +1 -0
- package/dist/apis/OutpostsApi.d.ts +16 -4
- package/dist/apis/OutpostsApi.js +42 -4
- package/dist/apis/ProvidersApi.d.ts +3 -2
- package/dist/apis/ProvidersApi.js +9 -6
- package/dist/esm/apis/OutpostsApi.d.ts +16 -4
- package/dist/esm/apis/OutpostsApi.js +43 -5
- package/dist/esm/apis/ProvidersApi.d.ts +3 -2
- package/dist/esm/apis/ProvidersApi.js +9 -6
- package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
- package/dist/esm/models/LDAPCheckAccess.js +47 -0
- package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
- package/dist/esm/models/LDAPOutpostConfig.js +0 -2
- package/dist/esm/models/LDAPProvider.d.ts +0 -6
- package/dist/esm/models/LDAPProvider.js +0 -2
- package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
- package/dist/esm/models/LDAPProviderRequest.js +0 -2
- package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
- package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
- package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +18 -0
- package/dist/esm/models/PatchedSAMLProviderRequest.js +6 -0
- package/dist/esm/models/SAMLProvider.d.ts +18 -0
- package/dist/esm/models/SAMLProvider.js +6 -0
- package/dist/esm/models/SAMLProviderRequest.d.ts +18 -0
- package/dist/esm/models/SAMLProviderRequest.js +6 -0
- package/dist/esm/models/index.d.ts +1 -0
- package/dist/esm/models/index.js +1 -0
- package/dist/models/LDAPCheckAccess.d.ts +38 -0
- package/dist/models/LDAPCheckAccess.js +54 -0
- package/dist/models/LDAPOutpostConfig.d.ts +0 -6
- package/dist/models/LDAPOutpostConfig.js +0 -2
- package/dist/models/LDAPProvider.d.ts +0 -6
- package/dist/models/LDAPProvider.js +0 -2
- package/dist/models/LDAPProviderRequest.d.ts +0 -6
- package/dist/models/LDAPProviderRequest.js +0 -2
- package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
- package/dist/models/PatchedLDAPProviderRequest.js +0 -2
- package/dist/models/PatchedSAMLProviderRequest.d.ts +18 -0
- package/dist/models/PatchedSAMLProviderRequest.js +6 -0
- package/dist/models/SAMLProvider.d.ts +18 -0
- package/dist/models/SAMLProvider.js +6 -0
- package/dist/models/SAMLProviderRequest.d.ts +18 -0
- package/dist/models/SAMLProviderRequest.js +6 -0
- package/dist/models/index.d.ts +1 -0
- package/dist/models/index.js +1 -0
- package/package.json +1 -1
- package/src/apis/OutpostsApi.ts +55 -5
- package/src/apis/ProvidersApi.ts +15 -10
- package/src/models/LDAPCheckAccess.ts +81 -0
- package/src/models/LDAPOutpostConfig.ts +0 -8
- package/src/models/LDAPProvider.ts +0 -8
- package/src/models/LDAPProviderRequest.ts +0 -8
- package/src/models/PatchedLDAPProviderRequest.ts +0 -8
- package/src/models/PatchedSAMLProviderRequest.ts +24 -0
- package/src/models/SAMLProvider.ts +24 -0
- package/src/models/SAMLProviderRequest.ts +24 -0
- package/src/models/index.ts +1 -0
package/src/apis/ProvidersApi.ts
CHANGED
|
@@ -345,8 +345,6 @@ export interface ProvidersLdapListRequest {
|
|
|
345
345
|
page?: number;
|
|
346
346
|
pageSize?: number;
|
|
347
347
|
search?: string;
|
|
348
|
-
searchGroupGroupUuidIexact?: string;
|
|
349
|
-
searchGroupNameIexact?: string;
|
|
350
348
|
tlsServerNameIexact?: string;
|
|
351
349
|
uidStartNumberIexact?: number;
|
|
352
350
|
}
|
|
@@ -662,6 +660,7 @@ export interface ProvidersSamlListRequest {
|
|
|
662
660
|
backchannelApplication?: string;
|
|
663
661
|
defaultRelayState?: string;
|
|
664
662
|
digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
|
|
663
|
+
encryptionKp?: string;
|
|
665
664
|
isBackchannel?: boolean;
|
|
666
665
|
issuer?: string;
|
|
667
666
|
name?: string;
|
|
@@ -672,6 +671,8 @@ export interface ProvidersSamlListRequest {
|
|
|
672
671
|
propertyMappings?: Array<string>;
|
|
673
672
|
search?: string;
|
|
674
673
|
sessionValidNotOnOrAfter?: string;
|
|
674
|
+
signAssertion?: boolean;
|
|
675
|
+
signResponse?: boolean;
|
|
675
676
|
signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
|
|
676
677
|
signingKp?: string;
|
|
677
678
|
spBinding?: ProvidersSamlListSpBindingEnum;
|
|
@@ -1914,14 +1915,6 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
1914
1915
|
queryParameters['search'] = requestParameters.search;
|
|
1915
1916
|
}
|
|
1916
1917
|
|
|
1917
|
-
if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
|
|
1918
|
-
queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
|
|
1919
|
-
}
|
|
1920
|
-
|
|
1921
|
-
if (requestParameters.searchGroupNameIexact !== undefined) {
|
|
1922
|
-
queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
|
|
1923
|
-
}
|
|
1924
|
-
|
|
1925
1918
|
if (requestParameters.tlsServerNameIexact !== undefined) {
|
|
1926
1919
|
queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
|
|
1927
1920
|
}
|
|
@@ -4470,6 +4463,10 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
4470
4463
|
queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
|
|
4471
4464
|
}
|
|
4472
4465
|
|
|
4466
|
+
if (requestParameters.encryptionKp !== undefined) {
|
|
4467
|
+
queryParameters['encryption_kp'] = requestParameters.encryptionKp;
|
|
4468
|
+
}
|
|
4469
|
+
|
|
4473
4470
|
if (requestParameters.isBackchannel !== undefined) {
|
|
4474
4471
|
queryParameters['is_backchannel'] = requestParameters.isBackchannel;
|
|
4475
4472
|
}
|
|
@@ -4510,6 +4507,14 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
4510
4507
|
queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
|
|
4511
4508
|
}
|
|
4512
4509
|
|
|
4510
|
+
if (requestParameters.signAssertion !== undefined) {
|
|
4511
|
+
queryParameters['sign_assertion'] = requestParameters.signAssertion;
|
|
4512
|
+
}
|
|
4513
|
+
|
|
4514
|
+
if (requestParameters.signResponse !== undefined) {
|
|
4515
|
+
queryParameters['sign_response'] = requestParameters.signResponse;
|
|
4516
|
+
}
|
|
4517
|
+
|
|
4513
4518
|
if (requestParameters.signatureAlgorithm !== undefined) {
|
|
4514
4519
|
queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
|
|
4515
4520
|
}
|
|
@@ -0,0 +1,81 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* authentik
|
|
5
|
+
* Making authentication simple.
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 2024.6.3
|
|
8
|
+
* Contact: hello@goauthentik.io
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
|
|
15
|
+
import { exists, mapValues } from '../runtime';
|
|
16
|
+
import type { PolicyTestResult } from './PolicyTestResult';
|
|
17
|
+
import {
|
|
18
|
+
PolicyTestResultFromJSON,
|
|
19
|
+
PolicyTestResultFromJSONTyped,
|
|
20
|
+
PolicyTestResultToJSON,
|
|
21
|
+
} from './PolicyTestResult';
|
|
22
|
+
|
|
23
|
+
/**
|
|
24
|
+
* Base serializer class which doesn't implement create/update methods
|
|
25
|
+
* @export
|
|
26
|
+
* @interface LDAPCheckAccess
|
|
27
|
+
*/
|
|
28
|
+
export interface LDAPCheckAccess {
|
|
29
|
+
/**
|
|
30
|
+
*
|
|
31
|
+
* @type {boolean}
|
|
32
|
+
* @memberof LDAPCheckAccess
|
|
33
|
+
*/
|
|
34
|
+
hasSearchPermission?: boolean;
|
|
35
|
+
/**
|
|
36
|
+
*
|
|
37
|
+
* @type {PolicyTestResult}
|
|
38
|
+
* @memberof LDAPCheckAccess
|
|
39
|
+
*/
|
|
40
|
+
access: PolicyTestResult;
|
|
41
|
+
}
|
|
42
|
+
|
|
43
|
+
/**
|
|
44
|
+
* Check if a given object implements the LDAPCheckAccess interface.
|
|
45
|
+
*/
|
|
46
|
+
export function instanceOfLDAPCheckAccess(value: object): boolean {
|
|
47
|
+
let isInstance = true;
|
|
48
|
+
isInstance = isInstance && "access" in value;
|
|
49
|
+
|
|
50
|
+
return isInstance;
|
|
51
|
+
}
|
|
52
|
+
|
|
53
|
+
export function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess {
|
|
54
|
+
return LDAPCheckAccessFromJSONTyped(json, false);
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
export function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess {
|
|
58
|
+
if ((json === undefined) || (json === null)) {
|
|
59
|
+
return json;
|
|
60
|
+
}
|
|
61
|
+
return {
|
|
62
|
+
|
|
63
|
+
'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
|
|
64
|
+
'access': PolicyTestResultFromJSON(json['access']),
|
|
65
|
+
};
|
|
66
|
+
}
|
|
67
|
+
|
|
68
|
+
export function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any {
|
|
69
|
+
if (value === undefined) {
|
|
70
|
+
return undefined;
|
|
71
|
+
}
|
|
72
|
+
if (value === null) {
|
|
73
|
+
return null;
|
|
74
|
+
}
|
|
75
|
+
return {
|
|
76
|
+
|
|
77
|
+
'has_search_permission': value.hasSearchPermission,
|
|
78
|
+
'access': PolicyTestResultToJSON(value.access),
|
|
79
|
+
};
|
|
80
|
+
}
|
|
81
|
+
|
|
@@ -56,12 +56,6 @@ export interface LDAPOutpostConfig {
|
|
|
56
56
|
* @memberof LDAPOutpostConfig
|
|
57
57
|
*/
|
|
58
58
|
readonly applicationSlug: string;
|
|
59
|
-
/**
|
|
60
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
61
|
-
* @type {string}
|
|
62
|
-
* @memberof LDAPOutpostConfig
|
|
63
|
-
*/
|
|
64
|
-
searchGroup?: string | null;
|
|
65
59
|
/**
|
|
66
60
|
*
|
|
67
61
|
* @type {string}
|
|
@@ -134,7 +128,6 @@ export function LDAPOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator: b
|
|
|
134
128
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
135
129
|
'bindFlowSlug': json['bind_flow_slug'],
|
|
136
130
|
'applicationSlug': json['application_slug'],
|
|
137
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
138
131
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
139
132
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
140
133
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -157,7 +150,6 @@ export function LDAPOutpostConfigToJSON(value?: LDAPOutpostConfig | null): any {
|
|
|
157
150
|
'name': value.name,
|
|
158
151
|
'base_dn': value.baseDn,
|
|
159
152
|
'bind_flow_slug': value.bindFlowSlug,
|
|
160
|
-
'search_group': value.searchGroup,
|
|
161
153
|
'certificate': value.certificate,
|
|
162
154
|
'tls_server_name': value.tlsServerName,
|
|
163
155
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -110,12 +110,6 @@ export interface LDAPProvider {
|
|
|
110
110
|
* @memberof LDAPProvider
|
|
111
111
|
*/
|
|
112
112
|
baseDn?: string;
|
|
113
|
-
/**
|
|
114
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
115
|
-
* @type {string}
|
|
116
|
-
* @memberof LDAPProvider
|
|
117
|
-
*/
|
|
118
|
-
searchGroup?: string | null;
|
|
119
113
|
/**
|
|
120
114
|
*
|
|
121
115
|
* @type {string}
|
|
@@ -211,7 +205,6 @@ export function LDAPProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
|
|
|
211
205
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
212
206
|
'metaModelName': json['meta_model_name'],
|
|
213
207
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
214
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
215
208
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
216
209
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
217
210
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -237,7 +230,6 @@ export function LDAPProviderToJSON(value?: LDAPProvider | null): any {
|
|
|
237
230
|
'authorization_flow': value.authorizationFlow,
|
|
238
231
|
'property_mappings': value.propertyMappings,
|
|
239
232
|
'base_dn': value.baseDn,
|
|
240
|
-
'search_group': value.searchGroup,
|
|
241
233
|
'certificate': value.certificate,
|
|
242
234
|
'tls_server_name': value.tlsServerName,
|
|
243
235
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -56,12 +56,6 @@ export interface LDAPProviderRequest {
|
|
|
56
56
|
* @memberof LDAPProviderRequest
|
|
57
57
|
*/
|
|
58
58
|
baseDn?: string;
|
|
59
|
-
/**
|
|
60
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
61
|
-
* @type {string}
|
|
62
|
-
* @memberof LDAPProviderRequest
|
|
63
|
-
*/
|
|
64
|
-
searchGroup?: string | null;
|
|
65
59
|
/**
|
|
66
60
|
*
|
|
67
61
|
* @type {string}
|
|
@@ -132,7 +126,6 @@ export function LDAPProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
|
|
|
132
126
|
'authorizationFlow': json['authorization_flow'],
|
|
133
127
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
134
128
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
135
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
136
129
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
137
130
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
138
131
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -157,7 +150,6 @@ export function LDAPProviderRequestToJSON(value?: LDAPProviderRequest | null): a
|
|
|
157
150
|
'authorization_flow': value.authorizationFlow,
|
|
158
151
|
'property_mappings': value.propertyMappings,
|
|
159
152
|
'base_dn': value.baseDn,
|
|
160
|
-
'search_group': value.searchGroup,
|
|
161
153
|
'certificate': value.certificate,
|
|
162
154
|
'tls_server_name': value.tlsServerName,
|
|
163
155
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -56,12 +56,6 @@ export interface PatchedLDAPProviderRequest {
|
|
|
56
56
|
* @memberof PatchedLDAPProviderRequest
|
|
57
57
|
*/
|
|
58
58
|
baseDn?: string;
|
|
59
|
-
/**
|
|
60
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
61
|
-
* @type {string}
|
|
62
|
-
* @memberof PatchedLDAPProviderRequest
|
|
63
|
-
*/
|
|
64
|
-
searchGroup?: string | null;
|
|
65
59
|
/**
|
|
66
60
|
*
|
|
67
61
|
* @type {string}
|
|
@@ -130,7 +124,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json: any, ignoreDiscrim
|
|
|
130
124
|
'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
|
|
131
125
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
132
126
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
133
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
134
127
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
135
128
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
136
129
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -155,7 +148,6 @@ export function PatchedLDAPProviderRequestToJSON(value?: PatchedLDAPProviderRequ
|
|
|
155
148
|
'authorization_flow': value.authorizationFlow,
|
|
156
149
|
'property_mappings': value.propertyMappings,
|
|
157
150
|
'base_dn': value.baseDn,
|
|
158
|
-
'search_group': value.searchGroup,
|
|
159
151
|
'certificate': value.certificate,
|
|
160
152
|
'tls_server_name': value.tlsServerName,
|
|
161
153
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -128,6 +128,24 @@ export interface PatchedSAMLProviderRequest {
|
|
|
128
128
|
* @memberof PatchedSAMLProviderRequest
|
|
129
129
|
*/
|
|
130
130
|
verificationKp?: string | null;
|
|
131
|
+
/**
|
|
132
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
133
|
+
* @type {string}
|
|
134
|
+
* @memberof PatchedSAMLProviderRequest
|
|
135
|
+
*/
|
|
136
|
+
encryptionKp?: string | null;
|
|
137
|
+
/**
|
|
138
|
+
*
|
|
139
|
+
* @type {boolean}
|
|
140
|
+
* @memberof PatchedSAMLProviderRequest
|
|
141
|
+
*/
|
|
142
|
+
signAssertion?: boolean;
|
|
143
|
+
/**
|
|
144
|
+
*
|
|
145
|
+
* @type {boolean}
|
|
146
|
+
* @memberof PatchedSAMLProviderRequest
|
|
147
|
+
*/
|
|
148
|
+
signResponse?: boolean;
|
|
131
149
|
/**
|
|
132
150
|
*
|
|
133
151
|
* @type {SpBindingEnum}
|
|
@@ -176,6 +194,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json: any, ignoreDiscrim
|
|
|
176
194
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
177
195
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
178
196
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
197
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
198
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
199
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
179
200
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
180
201
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
181
202
|
};
|
|
@@ -205,6 +226,9 @@ export function PatchedSAMLProviderRequestToJSON(value?: PatchedSAMLProviderRequ
|
|
|
205
226
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
206
227
|
'signing_kp': value.signingKp,
|
|
207
228
|
'verification_kp': value.verificationKp,
|
|
229
|
+
'encryption_kp': value.encryptionKp,
|
|
230
|
+
'sign_assertion': value.signAssertion,
|
|
231
|
+
'sign_response': value.signResponse,
|
|
208
232
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
209
233
|
'default_relay_state': value.defaultRelayState,
|
|
210
234
|
};
|
|
@@ -182,6 +182,24 @@ export interface SAMLProvider {
|
|
|
182
182
|
* @memberof SAMLProvider
|
|
183
183
|
*/
|
|
184
184
|
verificationKp?: string | null;
|
|
185
|
+
/**
|
|
186
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
187
|
+
* @type {string}
|
|
188
|
+
* @memberof SAMLProvider
|
|
189
|
+
*/
|
|
190
|
+
encryptionKp?: string | null;
|
|
191
|
+
/**
|
|
192
|
+
*
|
|
193
|
+
* @type {boolean}
|
|
194
|
+
* @memberof SAMLProvider
|
|
195
|
+
*/
|
|
196
|
+
signAssertion?: boolean;
|
|
197
|
+
/**
|
|
198
|
+
*
|
|
199
|
+
* @type {boolean}
|
|
200
|
+
* @memberof SAMLProvider
|
|
201
|
+
*/
|
|
202
|
+
signResponse?: boolean;
|
|
185
203
|
/**
|
|
186
204
|
*
|
|
187
205
|
* @type {SpBindingEnum}
|
|
@@ -293,6 +311,9 @@ export function SAMLProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
|
|
|
293
311
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
294
312
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
295
313
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
314
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
315
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
316
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
296
317
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
297
318
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
298
319
|
'urlDownloadMetadata': json['url_download_metadata'],
|
|
@@ -328,6 +349,9 @@ export function SAMLProviderToJSON(value?: SAMLProvider | null): any {
|
|
|
328
349
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
329
350
|
'signing_kp': value.signingKp,
|
|
330
351
|
'verification_kp': value.verificationKp,
|
|
352
|
+
'encryption_kp': value.encryptionKp,
|
|
353
|
+
'sign_assertion': value.signAssertion,
|
|
354
|
+
'sign_response': value.signResponse,
|
|
331
355
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
332
356
|
'default_relay_state': value.defaultRelayState,
|
|
333
357
|
};
|
|
@@ -128,6 +128,24 @@ export interface SAMLProviderRequest {
|
|
|
128
128
|
* @memberof SAMLProviderRequest
|
|
129
129
|
*/
|
|
130
130
|
verificationKp?: string | null;
|
|
131
|
+
/**
|
|
132
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
133
|
+
* @type {string}
|
|
134
|
+
* @memberof SAMLProviderRequest
|
|
135
|
+
*/
|
|
136
|
+
encryptionKp?: string | null;
|
|
137
|
+
/**
|
|
138
|
+
*
|
|
139
|
+
* @type {boolean}
|
|
140
|
+
* @memberof SAMLProviderRequest
|
|
141
|
+
*/
|
|
142
|
+
signAssertion?: boolean;
|
|
143
|
+
/**
|
|
144
|
+
*
|
|
145
|
+
* @type {boolean}
|
|
146
|
+
* @memberof SAMLProviderRequest
|
|
147
|
+
*/
|
|
148
|
+
signResponse?: boolean;
|
|
131
149
|
/**
|
|
132
150
|
*
|
|
133
151
|
* @type {SpBindingEnum}
|
|
@@ -179,6 +197,9 @@ export function SAMLProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
|
|
|
179
197
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
180
198
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
181
199
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
200
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
201
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
202
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
182
203
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
183
204
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
184
205
|
};
|
|
@@ -208,6 +229,9 @@ export function SAMLProviderRequestToJSON(value?: SAMLProviderRequest | null): a
|
|
|
208
229
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
209
230
|
'signing_kp': value.signingKp,
|
|
210
231
|
'verification_kp': value.verificationKp,
|
|
232
|
+
'encryption_kp': value.encryptionKp,
|
|
233
|
+
'sign_assertion': value.signAssertion,
|
|
234
|
+
'sign_response': value.signResponse,
|
|
211
235
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
212
236
|
'default_relay_state': value.defaultRelayState,
|
|
213
237
|
};
|
package/src/models/index.ts
CHANGED
|
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
|
|
|
179
179
|
export * from './KubernetesServiceConnection';
|
|
180
180
|
export * from './KubernetesServiceConnectionRequest';
|
|
181
181
|
export * from './LDAPAPIAccessMode';
|
|
182
|
+
export * from './LDAPCheckAccess';
|
|
182
183
|
export * from './LDAPDebug';
|
|
183
184
|
export * from './LDAPOutpostConfig';
|
|
184
185
|
export * from './LDAPProvider';
|