Skip to content
This repository has been archived by the owner on Apr 17, 2024. It is now read-only.

Commit

Permalink
Update API Client
Browse files Browse the repository at this point in the history
#### What's Changed
---

##### `GET` /providers/saml/{id}/

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Added property `default_relay_state` (string)
        > Default relay_state value for IDP-initiated logins

##### `PUT` /providers/saml/{id}/

###### Request:

Changed content type : `application/json`

* Added property `default_relay_state` (string)
    > Default relay_state value for IDP-initiated logins

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Added property `default_relay_state` (string)
        > Default relay_state value for IDP-initiated logins

##### `PATCH` /providers/saml/{id}/

###### Request:

Changed content type : `application/json`

* Added property `default_relay_state` (string)
    > Default relay_state value for IDP-initiated logins

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Added property `default_relay_state` (string)
        > Default relay_state value for IDP-initiated logins

##### `POST` /providers/saml/

###### Request:

Changed content type : `application/json`

* Added property `default_relay_state` (string)
    > Default relay_state value for IDP-initiated logins

###### Return Type:

Changed response : **201 Created**

* Changed content type : `application/json`

    * Added property `default_relay_state` (string)
        > Default relay_state value for IDP-initiated logins

##### `GET` /providers/saml/

###### Parameters:

Added: `default_relay_state` in `query`

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Changed property `results` (array)

        Changed items (object):
            > SAMLProvider Serializer

        * Added property `default_relay_state` (string)
            > Default relay_state value for IDP-initiated logins

##### `PUT` /core/transactional/applications/

###### Request:

Changed content type : `application/json`

* Changed property `provider` (object)

    Updated `authentik_providers_saml.samlprovider` provider_model:
    * Added property `default_relay_state` (string)
        > Default relay_state value for IDP-initiated logins
  • Loading branch information
authentik-automation[bot] committed Oct 8, 2023
1 parent e154ce7 commit ca1092c
Show file tree
Hide file tree
Showing 11 changed files with 54 additions and 10 deletions.
1 change: 1 addition & 0 deletions docs/ModelRequest.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,7 @@ Name | Type | Description | Notes
**signingKp** | [**java.util.UUID**](java.util.UUID.md) | Keypair used to sign outgoing Responses going to the Service Provider. | [optional]
**verificationKp** | [**java.util.UUID**](java.util.UUID.md) | When selected, incoming assertion's Signatures will be validated against this certificate. To allow unsigned Requests, leave on default. | [optional]
**spBinding** | [**SpBindingEnum**](SpBindingEnum.md) | This determines how authentik sends the response back to the Service Provider. * `redirect` - Redirect * `post` - Post | [optional]
**defaultRelayState** | **kotlin.String** | Default relay_state value for IDP-initiated logins | [optional]
**propertyMappingsGroup** | [**kotlin.collections.List<java.util.UUID>**](java.util.UUID.md) | Property mappings used for group creation/updating. | [optional]
**excludeUsersServiceAccount** | **kotlin.Boolean** | | [optional]
**filterGroup** | [**java.util.UUID**](java.util.UUID.md) | | [optional]
Expand Down
1 change: 1 addition & 0 deletions docs/PatchedSAMLProviderRequest.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ Name | Type | Description | Notes
**signingKp** | [**java.util.UUID**](java.util.UUID.md) | Keypair used to sign outgoing Responses going to the Service Provider. | [optional]
**verificationKp** | [**java.util.UUID**](java.util.UUID.md) | When selected, incoming assertion's Signatures will be validated against this certificate. To allow unsigned Requests, leave on default. | [optional]
**spBinding** | [**SpBindingEnum**](SpBindingEnum.md) | This determines how authentik sends the response back to the Service Provider. * `redirect` - Redirect * `post` - Post | [optional]
**defaultRelayState** | **kotlin.String** | Default relay_state value for IDP-initiated logins | [optional]



6 changes: 4 additions & 2 deletions docs/ProvidersApi.md
Original file line number Diff line number Diff line change
Expand Up @@ -2094,7 +2094,7 @@ Configure authentik:

<a name="providersSamlList"></a>
# **providersSamlList**
> PaginatedSAMLProviderList providersSamlList(acsUrl, assertionValidNotBefore, assertionValidNotOnOrAfter, audience, authenticationFlow, authorizationFlow, backchannelApplication, digestAlgorithm, isBackchannel, issuer, name, nameIdMapping, ordering, page, pageSize, propertyMappings, search, sessionValidNotOnOrAfter, signatureAlgorithm, signingKp, spBinding, verificationKp)
> PaginatedSAMLProviderList providersSamlList(acsUrl, assertionValidNotBefore, assertionValidNotOnOrAfter, audience, authenticationFlow, authorizationFlow, backchannelApplication, defaultRelayState, digestAlgorithm, isBackchannel, issuer, name, nameIdMapping, ordering, page, pageSize, propertyMappings, search, sessionValidNotOnOrAfter, signatureAlgorithm, signingKp, spBinding, verificationKp)


Expand All @@ -2114,6 +2114,7 @@ val audience : kotlin.String = audience_example // kotlin.String |
val authenticationFlow : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID |
val authorizationFlow : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID |
val backchannelApplication : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID |
val defaultRelayState : kotlin.String = defaultRelayState_example // kotlin.String |
val digestAlgorithm : kotlin.String = digestAlgorithm_example // kotlin.String | * `http://www.w3.org/2000/09/xmldsig#sha1` - SHA1 * `http://www.w3.org/2001/04/xmlenc#sha256` - SHA256 * `http://www.w3.org/2001/04/xmldsig-more#sha384` - SHA384 * `http://www.w3.org/2001/04/xmlenc#sha512` - SHA512
val isBackchannel : kotlin.Boolean = true // kotlin.Boolean |
val issuer : kotlin.String = issuer_example // kotlin.String |
Expand All @@ -2130,7 +2131,7 @@ val signingKp : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.ut
val spBinding : kotlin.String = spBinding_example // kotlin.String | This determines how authentik sends the response back to the Service Provider. * `redirect` - Redirect * `post` - Post
val verificationKp : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID |
try {
val result : PaginatedSAMLProviderList = apiInstance.providersSamlList(acsUrl, assertionValidNotBefore, assertionValidNotOnOrAfter, audience, authenticationFlow, authorizationFlow, backchannelApplication, digestAlgorithm, isBackchannel, issuer, name, nameIdMapping, ordering, page, pageSize, propertyMappings, search, sessionValidNotOnOrAfter, signatureAlgorithm, signingKp, spBinding, verificationKp)
val result : PaginatedSAMLProviderList = apiInstance.providersSamlList(acsUrl, assertionValidNotBefore, assertionValidNotOnOrAfter, audience, authenticationFlow, authorizationFlow, backchannelApplication, defaultRelayState, digestAlgorithm, isBackchannel, issuer, name, nameIdMapping, ordering, page, pageSize, propertyMappings, search, sessionValidNotOnOrAfter, signatureAlgorithm, signingKp, spBinding, verificationKp)
println(result)
} catch (e: ClientException) {
println("4xx response calling ProvidersApi#providersSamlList")
Expand All @@ -2152,6 +2153,7 @@ Name | Type | Description | Notes
**authenticationFlow** | **java.util.UUID**| | [optional]
**authorizationFlow** | **java.util.UUID**| | [optional]
**backchannelApplication** | **java.util.UUID**| | [optional]
**defaultRelayState** | **kotlin.String**| | [optional]
**digestAlgorithm** | **kotlin.String**| * &#x60;http://www.w3.org/2000/09/xmldsig#sha1&#x60; - SHA1 * &#x60;http://www.w3.org/2001/04/xmlenc#sha256&#x60; - SHA256 * &#x60;http://www.w3.org/2001/04/xmldsig-more#sha384&#x60; - SHA384 * &#x60;http://www.w3.org/2001/04/xmlenc#sha512&#x60; - SHA512 | [optional] [enum: http://www.w3.org/2000/09/xmldsig#sha1, http://www.w3.org/2001/04/xmldsig-more#sha384, http://www.w3.org/2001/04/xmlenc#sha256, http://www.w3.org/2001/04/xmlenc#sha512]
**isBackchannel** | **kotlin.Boolean**| | [optional]
**issuer** | **kotlin.String**| | [optional]
Expand Down
1 change: 1 addition & 0 deletions docs/SAMLProvider.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,7 @@ Name | Type | Description | Notes
**signingKp** | [**java.util.UUID**](java.util.UUID.md) | Keypair used to sign outgoing Responses going to the Service Provider. | [optional]
**verificationKp** | [**java.util.UUID**](java.util.UUID.md) | When selected, incoming assertion&#39;s Signatures will be validated against this certificate. To allow unsigned Requests, leave on default. | [optional]
**spBinding** | [**SpBindingEnum**](SpBindingEnum.md) | This determines how authentik sends the response back to the Service Provider. * &#x60;redirect&#x60; - Redirect * &#x60;post&#x60; - Post | [optional]
**defaultRelayState** | **kotlin.String** | Default relay_state value for IDP-initiated logins | [optional]



1 change: 1 addition & 0 deletions docs/SAMLProviderRequest.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ Name | Type | Description | Notes
**signingKp** | [**java.util.UUID**](java.util.UUID.md) | Keypair used to sign outgoing Responses going to the Service Provider. | [optional]
**verificationKp** | [**java.util.UUID**](java.util.UUID.md) | When selected, incoming assertion&#39;s Signatures will be validated against this certificate. To allow unsigned Requests, leave on default. | [optional]
**spBinding** | [**SpBindingEnum**](SpBindingEnum.md) | This determines how authentik sends the response back to the Service Provider. * &#x60;redirect&#x60; - Redirect * &#x60;post&#x60; - Post | [optional]
**defaultRelayState** | **kotlin.String** | Default relay_state value for IDP-initiated logins | [optional]



13 changes: 13 additions & 0 deletions schema.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16292,6 +16292,10 @@ paths:
schema:
type: string
format: uuid
- in: query
name: default_relay_state
schema:
type: string
- in: query
name: digest_algorithm
schema:
Expand Down Expand Up @@ -36303,6 +36307,9 @@ components:

* `redirect` - Redirect
* `post` - Post
default_relay_state:
type: string
description: Default relay_state value for IDP-initiated logins
PatchedSAMLSourceRequest:
type: object
description: SAMLSource Serializer
Expand Down Expand Up @@ -38480,6 +38487,9 @@ components:

* `redirect` - Redirect
* `post` - Post
default_relay_state:
type: string
description: Default relay_state value for IDP-initiated logins
url_download_metadata:
type: string
description: Get metadata download URL
Expand Down Expand Up @@ -38624,6 +38634,9 @@ components:

* `redirect` - Redirect
* `post` - Post
default_relay_state:
type: string
description: Default relay_state value for IDP-initiated logins
required:
- acs_url
- authorization_flow
Expand Down
Loading

0 comments on commit ca1092c

Please sign in to comment.