@goauthentik/api 2024.6.3-1723645891 → 2024.6.3-1723921843
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/apis/ProvidersApi.d.ts +3 -0
- package/dist/apis/ProvidersApi.js +9 -0
- package/dist/esm/apis/ProvidersApi.d.ts +3 -0
- package/dist/esm/apis/ProvidersApi.js +9 -0
- package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +18 -0
- package/dist/esm/models/PatchedSAMLProviderRequest.js +6 -0
- package/dist/esm/models/SAMLProvider.d.ts +18 -0
- package/dist/esm/models/SAMLProvider.js +6 -0
- package/dist/esm/models/SAMLProviderRequest.d.ts +18 -0
- package/dist/esm/models/SAMLProviderRequest.js +6 -0
- package/dist/models/PatchedSAMLProviderRequest.d.ts +18 -0
- package/dist/models/PatchedSAMLProviderRequest.js +6 -0
- package/dist/models/SAMLProvider.d.ts +18 -0
- package/dist/models/SAMLProvider.js +6 -0
- package/dist/models/SAMLProviderRequest.d.ts +18 -0
- package/dist/models/SAMLProviderRequest.js +6 -0
- package/package.json +1 -1
- package/src/apis/ProvidersApi.ts +15 -0
- package/src/models/PatchedSAMLProviderRequest.ts +24 -0
- package/src/models/SAMLProvider.ts +24 -0
- package/src/models/SAMLProviderRequest.ts +24 -0
|
@@ -380,6 +380,7 @@ export interface ProvidersSamlListRequest {
|
|
|
380
380
|
backchannelApplication?: string;
|
|
381
381
|
defaultRelayState?: string;
|
|
382
382
|
digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
|
|
383
|
+
encryptionKp?: string;
|
|
383
384
|
isBackchannel?: boolean;
|
|
384
385
|
issuer?: string;
|
|
385
386
|
name?: string;
|
|
@@ -390,6 +391,8 @@ export interface ProvidersSamlListRequest {
|
|
|
390
391
|
propertyMappings?: Array<string>;
|
|
391
392
|
search?: string;
|
|
392
393
|
sessionValidNotOnOrAfter?: string;
|
|
394
|
+
signAssertion?: boolean;
|
|
395
|
+
signResponse?: boolean;
|
|
393
396
|
signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
|
|
394
397
|
signingKp?: string;
|
|
395
398
|
spBinding?: ProvidersSamlListSpBindingEnum;
|
|
@@ -3293,6 +3293,9 @@ class ProvidersApi extends runtime.BaseAPI {
|
|
|
3293
3293
|
if (requestParameters.digestAlgorithm !== undefined) {
|
|
3294
3294
|
queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
|
|
3295
3295
|
}
|
|
3296
|
+
if (requestParameters.encryptionKp !== undefined) {
|
|
3297
|
+
queryParameters['encryption_kp'] = requestParameters.encryptionKp;
|
|
3298
|
+
}
|
|
3296
3299
|
if (requestParameters.isBackchannel !== undefined) {
|
|
3297
3300
|
queryParameters['is_backchannel'] = requestParameters.isBackchannel;
|
|
3298
3301
|
}
|
|
@@ -3323,6 +3326,12 @@ class ProvidersApi extends runtime.BaseAPI {
|
|
|
3323
3326
|
if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
|
|
3324
3327
|
queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
|
|
3325
3328
|
}
|
|
3329
|
+
if (requestParameters.signAssertion !== undefined) {
|
|
3330
|
+
queryParameters['sign_assertion'] = requestParameters.signAssertion;
|
|
3331
|
+
}
|
|
3332
|
+
if (requestParameters.signResponse !== undefined) {
|
|
3333
|
+
queryParameters['sign_response'] = requestParameters.signResponse;
|
|
3334
|
+
}
|
|
3326
3335
|
if (requestParameters.signatureAlgorithm !== undefined) {
|
|
3327
3336
|
queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
|
|
3328
3337
|
}
|
|
@@ -380,6 +380,7 @@ export interface ProvidersSamlListRequest {
|
|
|
380
380
|
backchannelApplication?: string;
|
|
381
381
|
defaultRelayState?: string;
|
|
382
382
|
digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
|
|
383
|
+
encryptionKp?: string;
|
|
383
384
|
isBackchannel?: boolean;
|
|
384
385
|
issuer?: string;
|
|
385
386
|
name?: string;
|
|
@@ -390,6 +391,8 @@ export interface ProvidersSamlListRequest {
|
|
|
390
391
|
propertyMappings?: Array<string>;
|
|
391
392
|
search?: string;
|
|
392
393
|
sessionValidNotOnOrAfter?: string;
|
|
394
|
+
signAssertion?: boolean;
|
|
395
|
+
signResponse?: boolean;
|
|
393
396
|
signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
|
|
394
397
|
signingKp?: string;
|
|
395
398
|
spBinding?: ProvidersSamlListSpBindingEnum;
|
|
@@ -3290,6 +3290,9 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
3290
3290
|
if (requestParameters.digestAlgorithm !== undefined) {
|
|
3291
3291
|
queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
|
|
3292
3292
|
}
|
|
3293
|
+
if (requestParameters.encryptionKp !== undefined) {
|
|
3294
|
+
queryParameters['encryption_kp'] = requestParameters.encryptionKp;
|
|
3295
|
+
}
|
|
3293
3296
|
if (requestParameters.isBackchannel !== undefined) {
|
|
3294
3297
|
queryParameters['is_backchannel'] = requestParameters.isBackchannel;
|
|
3295
3298
|
}
|
|
@@ -3320,6 +3323,12 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
3320
3323
|
if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
|
|
3321
3324
|
queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
|
|
3322
3325
|
}
|
|
3326
|
+
if (requestParameters.signAssertion !== undefined) {
|
|
3327
|
+
queryParameters['sign_assertion'] = requestParameters.signAssertion;
|
|
3328
|
+
}
|
|
3329
|
+
if (requestParameters.signResponse !== undefined) {
|
|
3330
|
+
queryParameters['sign_response'] = requestParameters.signResponse;
|
|
3331
|
+
}
|
|
3323
3332
|
if (requestParameters.signatureAlgorithm !== undefined) {
|
|
3324
3333
|
queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
|
|
3325
3334
|
}
|
|
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
|
|
|
108
108
|
* @memberof PatchedSAMLProviderRequest
|
|
109
109
|
*/
|
|
110
110
|
verificationKp?: string | null;
|
|
111
|
+
/**
|
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
113
|
+
* @type {string}
|
|
114
|
+
* @memberof PatchedSAMLProviderRequest
|
|
115
|
+
*/
|
|
116
|
+
encryptionKp?: string | null;
|
|
117
|
+
/**
|
|
118
|
+
*
|
|
119
|
+
* @type {boolean}
|
|
120
|
+
* @memberof PatchedSAMLProviderRequest
|
|
121
|
+
*/
|
|
122
|
+
signAssertion?: boolean;
|
|
123
|
+
/**
|
|
124
|
+
*
|
|
125
|
+
* @type {boolean}
|
|
126
|
+
* @memberof PatchedSAMLProviderRequest
|
|
127
|
+
*/
|
|
128
|
+
signResponse?: boolean;
|
|
111
129
|
/**
|
|
112
130
|
*
|
|
113
131
|
* @type {SpBindingEnum}
|
|
@@ -45,6 +45,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminato
|
|
|
45
45
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
46
46
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
47
47
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
48
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
49
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
50
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
48
51
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
49
52
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
50
53
|
};
|
|
@@ -72,6 +75,9 @@ export function PatchedSAMLProviderRequestToJSON(value) {
|
|
|
72
75
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
73
76
|
'signing_kp': value.signingKp,
|
|
74
77
|
'verification_kp': value.verificationKp,
|
|
78
|
+
'encryption_kp': value.encryptionKp,
|
|
79
|
+
'sign_assertion': value.signAssertion,
|
|
80
|
+
'sign_response': value.signResponse,
|
|
75
81
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
76
82
|
'default_relay_state': value.defaultRelayState,
|
|
77
83
|
};
|
|
@@ -162,6 +162,24 @@ export interface SAMLProvider {
|
|
|
162
162
|
* @memberof SAMLProvider
|
|
163
163
|
*/
|
|
164
164
|
verificationKp?: string | null;
|
|
165
|
+
/**
|
|
166
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
167
|
+
* @type {string}
|
|
168
|
+
* @memberof SAMLProvider
|
|
169
|
+
*/
|
|
170
|
+
encryptionKp?: string | null;
|
|
171
|
+
/**
|
|
172
|
+
*
|
|
173
|
+
* @type {boolean}
|
|
174
|
+
* @memberof SAMLProvider
|
|
175
|
+
*/
|
|
176
|
+
signAssertion?: boolean;
|
|
177
|
+
/**
|
|
178
|
+
*
|
|
179
|
+
* @type {boolean}
|
|
180
|
+
* @memberof SAMLProvider
|
|
181
|
+
*/
|
|
182
|
+
signResponse?: boolean;
|
|
165
183
|
/**
|
|
166
184
|
*
|
|
167
185
|
* @type {SpBindingEnum}
|
|
@@ -72,6 +72,9 @@ export function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
72
72
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
73
73
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
74
74
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
75
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
76
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
77
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
75
78
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
76
79
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
77
80
|
'urlDownloadMetadata': json['url_download_metadata'],
|
|
@@ -105,6 +108,9 @@ export function SAMLProviderToJSON(value) {
|
|
|
105
108
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
106
109
|
'signing_kp': value.signingKp,
|
|
107
110
|
'verification_kp': value.verificationKp,
|
|
111
|
+
'encryption_kp': value.encryptionKp,
|
|
112
|
+
'sign_assertion': value.signAssertion,
|
|
113
|
+
'sign_response': value.signResponse,
|
|
108
114
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
109
115
|
'default_relay_state': value.defaultRelayState,
|
|
110
116
|
};
|
|
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
|
|
|
108
108
|
* @memberof SAMLProviderRequest
|
|
109
109
|
*/
|
|
110
110
|
verificationKp?: string | null;
|
|
111
|
+
/**
|
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
113
|
+
* @type {string}
|
|
114
|
+
* @memberof SAMLProviderRequest
|
|
115
|
+
*/
|
|
116
|
+
encryptionKp?: string | null;
|
|
117
|
+
/**
|
|
118
|
+
*
|
|
119
|
+
* @type {boolean}
|
|
120
|
+
* @memberof SAMLProviderRequest
|
|
121
|
+
*/
|
|
122
|
+
signAssertion?: boolean;
|
|
123
|
+
/**
|
|
124
|
+
*
|
|
125
|
+
* @type {boolean}
|
|
126
|
+
* @memberof SAMLProviderRequest
|
|
127
|
+
*/
|
|
128
|
+
signResponse?: boolean;
|
|
111
129
|
/**
|
|
112
130
|
*
|
|
113
131
|
* @type {SpBindingEnum}
|
|
@@ -48,6 +48,9 @@ export function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
48
48
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
49
49
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
50
50
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
51
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
52
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
53
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
51
54
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
52
55
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
53
56
|
};
|
|
@@ -75,6 +78,9 @@ export function SAMLProviderRequestToJSON(value) {
|
|
|
75
78
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
76
79
|
'signing_kp': value.signingKp,
|
|
77
80
|
'verification_kp': value.verificationKp,
|
|
81
|
+
'encryption_kp': value.encryptionKp,
|
|
82
|
+
'sign_assertion': value.signAssertion,
|
|
83
|
+
'sign_response': value.signResponse,
|
|
78
84
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
79
85
|
'default_relay_state': value.defaultRelayState,
|
|
80
86
|
};
|
|
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
|
|
|
108
108
|
* @memberof PatchedSAMLProviderRequest
|
|
109
109
|
*/
|
|
110
110
|
verificationKp?: string | null;
|
|
111
|
+
/**
|
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
113
|
+
* @type {string}
|
|
114
|
+
* @memberof PatchedSAMLProviderRequest
|
|
115
|
+
*/
|
|
116
|
+
encryptionKp?: string | null;
|
|
117
|
+
/**
|
|
118
|
+
*
|
|
119
|
+
* @type {boolean}
|
|
120
|
+
* @memberof PatchedSAMLProviderRequest
|
|
121
|
+
*/
|
|
122
|
+
signAssertion?: boolean;
|
|
123
|
+
/**
|
|
124
|
+
*
|
|
125
|
+
* @type {boolean}
|
|
126
|
+
* @memberof PatchedSAMLProviderRequest
|
|
127
|
+
*/
|
|
128
|
+
signResponse?: boolean;
|
|
111
129
|
/**
|
|
112
130
|
*
|
|
113
131
|
* @type {SpBindingEnum}
|
|
@@ -50,6 +50,9 @@ function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
50
50
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
|
51
51
|
'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
52
52
|
'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
53
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
54
|
+
'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
55
|
+
'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
|
|
53
56
|
'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
|
|
54
57
|
'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
55
58
|
};
|
|
@@ -78,6 +81,9 @@ function PatchedSAMLProviderRequestToJSON(value) {
|
|
|
78
81
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
|
79
82
|
'signing_kp': value.signingKp,
|
|
80
83
|
'verification_kp': value.verificationKp,
|
|
84
|
+
'encryption_kp': value.encryptionKp,
|
|
85
|
+
'sign_assertion': value.signAssertion,
|
|
86
|
+
'sign_response': value.signResponse,
|
|
81
87
|
'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
|
|
82
88
|
'default_relay_state': value.defaultRelayState,
|
|
83
89
|
};
|
|
@@ -162,6 +162,24 @@ export interface SAMLProvider {
|
|
|
162
162
|
* @memberof SAMLProvider
|
|
163
163
|
*/
|
|
164
164
|
verificationKp?: string | null;
|
|
165
|
+
/**
|
|
166
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
167
|
+
* @type {string}
|
|
168
|
+
* @memberof SAMLProvider
|
|
169
|
+
*/
|
|
170
|
+
encryptionKp?: string | null;
|
|
171
|
+
/**
|
|
172
|
+
*
|
|
173
|
+
* @type {boolean}
|
|
174
|
+
* @memberof SAMLProvider
|
|
175
|
+
*/
|
|
176
|
+
signAssertion?: boolean;
|
|
177
|
+
/**
|
|
178
|
+
*
|
|
179
|
+
* @type {boolean}
|
|
180
|
+
* @memberof SAMLProvider
|
|
181
|
+
*/
|
|
182
|
+
signResponse?: boolean;
|
|
165
183
|
/**
|
|
166
184
|
*
|
|
167
185
|
* @type {SpBindingEnum}
|
|
@@ -77,6 +77,9 @@ function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
77
77
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
|
78
78
|
'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
79
79
|
'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
80
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
81
|
+
'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
82
|
+
'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
|
|
80
83
|
'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
|
|
81
84
|
'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
82
85
|
'urlDownloadMetadata': json['url_download_metadata'],
|
|
@@ -111,6 +114,9 @@ function SAMLProviderToJSON(value) {
|
|
|
111
114
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
|
112
115
|
'signing_kp': value.signingKp,
|
|
113
116
|
'verification_kp': value.verificationKp,
|
|
117
|
+
'encryption_kp': value.encryptionKp,
|
|
118
|
+
'sign_assertion': value.signAssertion,
|
|
119
|
+
'sign_response': value.signResponse,
|
|
114
120
|
'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
|
|
115
121
|
'default_relay_state': value.defaultRelayState,
|
|
116
122
|
};
|
|
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
|
|
|
108
108
|
* @memberof SAMLProviderRequest
|
|
109
109
|
*/
|
|
110
110
|
verificationKp?: string | null;
|
|
111
|
+
/**
|
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
113
|
+
* @type {string}
|
|
114
|
+
* @memberof SAMLProviderRequest
|
|
115
|
+
*/
|
|
116
|
+
encryptionKp?: string | null;
|
|
117
|
+
/**
|
|
118
|
+
*
|
|
119
|
+
* @type {boolean}
|
|
120
|
+
* @memberof SAMLProviderRequest
|
|
121
|
+
*/
|
|
122
|
+
signAssertion?: boolean;
|
|
123
|
+
/**
|
|
124
|
+
*
|
|
125
|
+
* @type {boolean}
|
|
126
|
+
* @memberof SAMLProviderRequest
|
|
127
|
+
*/
|
|
128
|
+
signResponse?: boolean;
|
|
111
129
|
/**
|
|
112
130
|
*
|
|
113
131
|
* @type {SpBindingEnum}
|
|
@@ -53,6 +53,9 @@ function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
53
53
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
|
54
54
|
'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
55
55
|
'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
56
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
57
|
+
'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
58
|
+
'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
|
|
56
59
|
'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
|
|
57
60
|
'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
58
61
|
};
|
|
@@ -81,6 +84,9 @@ function SAMLProviderRequestToJSON(value) {
|
|
|
81
84
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
|
82
85
|
'signing_kp': value.signingKp,
|
|
83
86
|
'verification_kp': value.verificationKp,
|
|
87
|
+
'encryption_kp': value.encryptionKp,
|
|
88
|
+
'sign_assertion': value.signAssertion,
|
|
89
|
+
'sign_response': value.signResponse,
|
|
84
90
|
'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
|
|
85
91
|
'default_relay_state': value.defaultRelayState,
|
|
86
92
|
};
|
package/package.json
CHANGED
package/src/apis/ProvidersApi.ts
CHANGED
|
@@ -660,6 +660,7 @@ export interface ProvidersSamlListRequest {
|
|
|
660
660
|
backchannelApplication?: string;
|
|
661
661
|
defaultRelayState?: string;
|
|
662
662
|
digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
|
|
663
|
+
encryptionKp?: string;
|
|
663
664
|
isBackchannel?: boolean;
|
|
664
665
|
issuer?: string;
|
|
665
666
|
name?: string;
|
|
@@ -670,6 +671,8 @@ export interface ProvidersSamlListRequest {
|
|
|
670
671
|
propertyMappings?: Array<string>;
|
|
671
672
|
search?: string;
|
|
672
673
|
sessionValidNotOnOrAfter?: string;
|
|
674
|
+
signAssertion?: boolean;
|
|
675
|
+
signResponse?: boolean;
|
|
673
676
|
signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
|
|
674
677
|
signingKp?: string;
|
|
675
678
|
spBinding?: ProvidersSamlListSpBindingEnum;
|
|
@@ -4460,6 +4463,10 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
4460
4463
|
queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
|
|
4461
4464
|
}
|
|
4462
4465
|
|
|
4466
|
+
if (requestParameters.encryptionKp !== undefined) {
|
|
4467
|
+
queryParameters['encryption_kp'] = requestParameters.encryptionKp;
|
|
4468
|
+
}
|
|
4469
|
+
|
|
4463
4470
|
if (requestParameters.isBackchannel !== undefined) {
|
|
4464
4471
|
queryParameters['is_backchannel'] = requestParameters.isBackchannel;
|
|
4465
4472
|
}
|
|
@@ -4500,6 +4507,14 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
4500
4507
|
queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
|
|
4501
4508
|
}
|
|
4502
4509
|
|
|
4510
|
+
if (requestParameters.signAssertion !== undefined) {
|
|
4511
|
+
queryParameters['sign_assertion'] = requestParameters.signAssertion;
|
|
4512
|
+
}
|
|
4513
|
+
|
|
4514
|
+
if (requestParameters.signResponse !== undefined) {
|
|
4515
|
+
queryParameters['sign_response'] = requestParameters.signResponse;
|
|
4516
|
+
}
|
|
4517
|
+
|
|
4503
4518
|
if (requestParameters.signatureAlgorithm !== undefined) {
|
|
4504
4519
|
queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
|
|
4505
4520
|
}
|
|
@@ -128,6 +128,24 @@ export interface PatchedSAMLProviderRequest {
|
|
|
128
128
|
* @memberof PatchedSAMLProviderRequest
|
|
129
129
|
*/
|
|
130
130
|
verificationKp?: string | null;
|
|
131
|
+
/**
|
|
132
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
133
|
+
* @type {string}
|
|
134
|
+
* @memberof PatchedSAMLProviderRequest
|
|
135
|
+
*/
|
|
136
|
+
encryptionKp?: string | null;
|
|
137
|
+
/**
|
|
138
|
+
*
|
|
139
|
+
* @type {boolean}
|
|
140
|
+
* @memberof PatchedSAMLProviderRequest
|
|
141
|
+
*/
|
|
142
|
+
signAssertion?: boolean;
|
|
143
|
+
/**
|
|
144
|
+
*
|
|
145
|
+
* @type {boolean}
|
|
146
|
+
* @memberof PatchedSAMLProviderRequest
|
|
147
|
+
*/
|
|
148
|
+
signResponse?: boolean;
|
|
131
149
|
/**
|
|
132
150
|
*
|
|
133
151
|
* @type {SpBindingEnum}
|
|
@@ -176,6 +194,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json: any, ignoreDiscrim
|
|
|
176
194
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
177
195
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
178
196
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
197
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
198
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
199
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
179
200
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
180
201
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
181
202
|
};
|
|
@@ -205,6 +226,9 @@ export function PatchedSAMLProviderRequestToJSON(value?: PatchedSAMLProviderRequ
|
|
|
205
226
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
206
227
|
'signing_kp': value.signingKp,
|
|
207
228
|
'verification_kp': value.verificationKp,
|
|
229
|
+
'encryption_kp': value.encryptionKp,
|
|
230
|
+
'sign_assertion': value.signAssertion,
|
|
231
|
+
'sign_response': value.signResponse,
|
|
208
232
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
209
233
|
'default_relay_state': value.defaultRelayState,
|
|
210
234
|
};
|
|
@@ -182,6 +182,24 @@ export interface SAMLProvider {
|
|
|
182
182
|
* @memberof SAMLProvider
|
|
183
183
|
*/
|
|
184
184
|
verificationKp?: string | null;
|
|
185
|
+
/**
|
|
186
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
187
|
+
* @type {string}
|
|
188
|
+
* @memberof SAMLProvider
|
|
189
|
+
*/
|
|
190
|
+
encryptionKp?: string | null;
|
|
191
|
+
/**
|
|
192
|
+
*
|
|
193
|
+
* @type {boolean}
|
|
194
|
+
* @memberof SAMLProvider
|
|
195
|
+
*/
|
|
196
|
+
signAssertion?: boolean;
|
|
197
|
+
/**
|
|
198
|
+
*
|
|
199
|
+
* @type {boolean}
|
|
200
|
+
* @memberof SAMLProvider
|
|
201
|
+
*/
|
|
202
|
+
signResponse?: boolean;
|
|
185
203
|
/**
|
|
186
204
|
*
|
|
187
205
|
* @type {SpBindingEnum}
|
|
@@ -293,6 +311,9 @@ export function SAMLProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
|
|
|
293
311
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
294
312
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
295
313
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
314
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
315
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
316
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
296
317
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
297
318
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
298
319
|
'urlDownloadMetadata': json['url_download_metadata'],
|
|
@@ -328,6 +349,9 @@ export function SAMLProviderToJSON(value?: SAMLProvider | null): any {
|
|
|
328
349
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
329
350
|
'signing_kp': value.signingKp,
|
|
330
351
|
'verification_kp': value.verificationKp,
|
|
352
|
+
'encryption_kp': value.encryptionKp,
|
|
353
|
+
'sign_assertion': value.signAssertion,
|
|
354
|
+
'sign_response': value.signResponse,
|
|
331
355
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
332
356
|
'default_relay_state': value.defaultRelayState,
|
|
333
357
|
};
|
|
@@ -128,6 +128,24 @@ export interface SAMLProviderRequest {
|
|
|
128
128
|
* @memberof SAMLProviderRequest
|
|
129
129
|
*/
|
|
130
130
|
verificationKp?: string | null;
|
|
131
|
+
/**
|
|
132
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
133
|
+
* @type {string}
|
|
134
|
+
* @memberof SAMLProviderRequest
|
|
135
|
+
*/
|
|
136
|
+
encryptionKp?: string | null;
|
|
137
|
+
/**
|
|
138
|
+
*
|
|
139
|
+
* @type {boolean}
|
|
140
|
+
* @memberof SAMLProviderRequest
|
|
141
|
+
*/
|
|
142
|
+
signAssertion?: boolean;
|
|
143
|
+
/**
|
|
144
|
+
*
|
|
145
|
+
* @type {boolean}
|
|
146
|
+
* @memberof SAMLProviderRequest
|
|
147
|
+
*/
|
|
148
|
+
signResponse?: boolean;
|
|
131
149
|
/**
|
|
132
150
|
*
|
|
133
151
|
* @type {SpBindingEnum}
|
|
@@ -179,6 +197,9 @@ export function SAMLProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
|
|
|
179
197
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
180
198
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
181
199
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
200
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
201
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
202
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
182
203
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
183
204
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
184
205
|
};
|
|
@@ -208,6 +229,9 @@ export function SAMLProviderRequestToJSON(value?: SAMLProviderRequest | null): a
|
|
|
208
229
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
209
230
|
'signing_kp': value.signingKp,
|
|
210
231
|
'verification_kp': value.verificationKp,
|
|
232
|
+
'encryption_kp': value.encryptionKp,
|
|
233
|
+
'sign_assertion': value.signAssertion,
|
|
234
|
+
'sign_response': value.signResponse,
|
|
211
235
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
212
236
|
'default_relay_state': value.defaultRelayState,
|
|
213
237
|
};
|