Skip to content

Commit

Permalink
Merge pull request #498 from okta/fix-policy
Browse files Browse the repository at this point in the history
fix policy embedded unable to marshal
  • Loading branch information
duytiennguyen-okta authored Dec 12, 2024
2 parents 000e63d + c81cde9 commit af4a79e
Show file tree
Hide file tree
Showing 31 changed files with 83 additions and 42 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -42391,9 +42391,7 @@ components:
$ref: '#/components/schemas/PolicyType'
_embedded:
type: object
additionalProperties:
type: object
properties: {}
additionalProperties: true
readOnly: true
_links:
$ref: '#/components/schemas/PolicyLinks'
Expand Down
4 changes: 1 addition & 3 deletions okta/api/openapi.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -64755,9 +64755,7 @@ components:
- PROFILE_ENROLLMENT
- RESOURCE_ACCESS
_embedded:
additionalProperties:
properties: {}
type: object
additionalProperties: true
readOnly: true
type: object
_links:
Expand Down
24 changes: 11 additions & 13 deletions okta/client.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

8 changes: 4 additions & 4 deletions okta/docs/ListPolicies200ResponseInner.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Name | Type | Description | Notes
**Status** | Pointer to **string** | | [optional]
**System** | Pointer to **bool** | Specifies whether Okta created the Policy | [optional]
**Type** | Pointer to **string** | All Okta orgs contain only one IdP Discovery Policy with an immutable default Rule routing to your org's sign-in page. Creating or replacing a policy with `IDP_DISCOVERY` type isn't supported. The following policy types are available with the Okta Identity Engine: `ACCESS_POLICY`, `PROFILE_ENROLLMENT`, `CONTINUOUS_ACCESS`, and `ENTITY_RISK`. The `CONTINUOUS_ACCESS`, and `ENTITY_RISK` policy types are in Early Access (EA). Contact your Okta account team to enable these features. | [optional]
**Embedded** | Pointer to **map[string]map[string]interface{}** | | [optional] [readonly]
**Embedded** | Pointer to **map[string]interface{}** | | [optional] [readonly]
**Links** | Pointer to [**PolicyLinks**](PolicyLinks.md) | | [optional]
**Conditions** | Pointer to **NullableString** | Policy conditions aren't supported for this policy type. | [optional]
**Settings** | Pointer to [**PasswordPolicySettings**](PasswordPolicySettings.md) | | [optional]
Expand Down Expand Up @@ -264,20 +264,20 @@ HasType returns a boolean if a field has been set.

### GetEmbedded

`func (o *ListPolicies200ResponseInner) GetEmbedded() map[string]map[string]interface{}`
`func (o *ListPolicies200ResponseInner) GetEmbedded() map[string]interface{}`

GetEmbedded returns the Embedded field if non-nil, zero value otherwise.

### GetEmbeddedOk

`func (o *ListPolicies200ResponseInner) GetEmbeddedOk() (*map[string]map[string]interface{}, bool)`
`func (o *ListPolicies200ResponseInner) GetEmbeddedOk() (*map[string]interface{}, bool)`

GetEmbeddedOk returns a tuple with the Embedded field if it's non-nil, zero value otherwise
and a boolean to check if the value has been set.

### SetEmbedded

`func (o *ListPolicies200ResponseInner) SetEmbedded(v map[string]map[string]interface{})`
`func (o *ListPolicies200ResponseInner) SetEmbedded(v map[string]interface{})`

SetEmbedded sets Embedded field to given value.

Expand Down
8 changes: 4 additions & 4 deletions okta/docs/Policy.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Name | Type | Description | Notes
**Status** | Pointer to **string** | | [optional]
**System** | Pointer to **bool** | Specifies whether Okta created the Policy | [optional]
**Type** | Pointer to **string** | All Okta orgs contain only one IdP Discovery Policy with an immutable default Rule routing to your org's sign-in page. Creating or replacing a policy with `IDP_DISCOVERY` type isn't supported. The following policy types are available with the Okta Identity Engine: `ACCESS_POLICY`, `PROFILE_ENROLLMENT`, `CONTINUOUS_ACCESS`, and `ENTITY_RISK`. The `CONTINUOUS_ACCESS`, and `ENTITY_RISK` policy types are in Early Access (EA). Contact your Okta account team to enable these features. | [optional]
**Embedded** | Pointer to **map[string]map[string]interface{}** | | [optional] [readonly]
**Embedded** | Pointer to **map[string]interface{}** | | [optional] [readonly]
**Links** | Pointer to [**PolicyLinks**](PolicyLinks.md) | | [optional]

## Methods
Expand Down Expand Up @@ -262,20 +262,20 @@ HasType returns a boolean if a field has been set.

### GetEmbedded

`func (o *Policy) GetEmbedded() map[string]map[string]interface{}`
`func (o *Policy) GetEmbedded() map[string]interface{}`

GetEmbedded returns the Embedded field if non-nil, zero value otherwise.

### GetEmbeddedOk

`func (o *Policy) GetEmbeddedOk() (*map[string]map[string]interface{}, bool)`
`func (o *Policy) GetEmbeddedOk() (*map[string]interface{}, bool)`

GetEmbeddedOk returns a tuple with the Embedded field if it's non-nil, zero value otherwise
and a boolean to check if the value has been set.

### SetEmbedded

`func (o *Policy) SetEmbedded(v map[string]map[string]interface{})`
`func (o *Policy) SetEmbedded(v map[string]interface{})`

SetEmbedded sets Embedded field to given value.

Expand Down
1 change: 0 additions & 1 deletion okta/main_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,6 @@ func sweep() (err error) {
if err != nil {
return
}
fmt.Println("43", apiClient.cfg.Host)
err = sweepGroups()
if err != nil {
return
Expand Down
2 changes: 2 additions & 0 deletions okta/model_app_user_update_request.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 2 additions & 0 deletions okta/model_assign_role_to_client_request.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 2 additions & 0 deletions okta/model_get_factor_transaction_status_200_response.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

6 changes: 4 additions & 2 deletions okta/model_get_ssf_streams_200_response.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 2 additions & 0 deletions okta/model_list_applications_200_response_inner.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 2 additions & 0 deletions okta/model_list_authenticator_methods_200_response_inner.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 2 additions & 0 deletions okta/model_list_authenticators_200_response_inner.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 2 additions & 0 deletions okta/model_list_factors_200_response_inner.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 2 additions & 0 deletions okta/model_list_log_streams_200_response_inner.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 2 additions & 0 deletions okta/model_list_network_zones_200_response_inner.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 2 additions & 0 deletions okta/model_list_policies_200_response_inner.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit af4a79e

Please sign in to comment.