Skip to content

Commit af4a79e

Browse files
Merge pull request #498 from okta/fix-policy
fix policy embedded unable to marshal
2 parents 000e63d + c81cde9 commit af4a79e

31 files changed

+83
-42
lines changed

.generator/okta-management-APIs-oasv3-noEnums-inheritance.yaml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42391,9 +42391,7 @@ components:
4239142391
$ref: '#/components/schemas/PolicyType'
4239242392
_embedded:
4239342393
type: object
42394-
additionalProperties:
42395-
type: object
42396-
properties: {}
42394+
additionalProperties: true
4239742395
readOnly: true
4239842396
_links:
4239942397
$ref: '#/components/schemas/PolicyLinks'

okta/api/openapi.yaml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -64755,9 +64755,7 @@ components:
6475564755
- PROFILE_ENROLLMENT
6475664756
- RESOURCE_ACCESS
6475764757
_embedded:
64758-
additionalProperties:
64759-
properties: {}
64760-
type: object
64758+
additionalProperties: true
6476164759
readOnly: true
6476264760
type: object
6476364761
_links:

okta/client.go

Lines changed: 11 additions & 13 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

okta/docs/ListPolicies200ResponseInner.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Name | Type | Description | Notes
1313
**Status** | Pointer to **string** | | [optional]
1414
**System** | Pointer to **bool** | Specifies whether Okta created the Policy | [optional]
1515
**Type** | Pointer to **string** | All Okta orgs contain only one IdP Discovery Policy with an immutable default Rule routing to your org's sign-in page. Creating or replacing a policy with `IDP_DISCOVERY` type isn't supported. The following policy types are available with the Okta Identity Engine: `ACCESS_POLICY`, `PROFILE_ENROLLMENT`, `CONTINUOUS_ACCESS`, and `ENTITY_RISK`. The `CONTINUOUS_ACCESS`, and `ENTITY_RISK` policy types are in Early Access (EA). Contact your Okta account team to enable these features. | [optional]
16-
**Embedded** | Pointer to **map[string]map[string]interface{}** | | [optional] [readonly]
16+
**Embedded** | Pointer to **map[string]interface{}** | | [optional] [readonly]
1717
**Links** | Pointer to [**PolicyLinks**](PolicyLinks.md) | | [optional]
1818
**Conditions** | Pointer to **NullableString** | Policy conditions aren't supported for this policy type. | [optional]
1919
**Settings** | Pointer to [**PasswordPolicySettings**](PasswordPolicySettings.md) | | [optional]
@@ -264,20 +264,20 @@ HasType returns a boolean if a field has been set.
264264

265265
### GetEmbedded
266266

267-
`func (o *ListPolicies200ResponseInner) GetEmbedded() map[string]map[string]interface{}`
267+
`func (o *ListPolicies200ResponseInner) GetEmbedded() map[string]interface{}`
268268

269269
GetEmbedded returns the Embedded field if non-nil, zero value otherwise.
270270

271271
### GetEmbeddedOk
272272

273-
`func (o *ListPolicies200ResponseInner) GetEmbeddedOk() (*map[string]map[string]interface{}, bool)`
273+
`func (o *ListPolicies200ResponseInner) GetEmbeddedOk() (*map[string]interface{}, bool)`
274274

275275
GetEmbeddedOk returns a tuple with the Embedded field if it's non-nil, zero value otherwise
276276
and a boolean to check if the value has been set.
277277

278278
### SetEmbedded
279279

280-
`func (o *ListPolicies200ResponseInner) SetEmbedded(v map[string]map[string]interface{})`
280+
`func (o *ListPolicies200ResponseInner) SetEmbedded(v map[string]interface{})`
281281

282282
SetEmbedded sets Embedded field to given value.
283283

okta/docs/Policy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Name | Type | Description | Notes
1313
**Status** | Pointer to **string** | | [optional]
1414
**System** | Pointer to **bool** | Specifies whether Okta created the Policy | [optional]
1515
**Type** | Pointer to **string** | All Okta orgs contain only one IdP Discovery Policy with an immutable default Rule routing to your org's sign-in page. Creating or replacing a policy with `IDP_DISCOVERY` type isn't supported. The following policy types are available with the Okta Identity Engine: `ACCESS_POLICY`, `PROFILE_ENROLLMENT`, `CONTINUOUS_ACCESS`, and `ENTITY_RISK`. The `CONTINUOUS_ACCESS`, and `ENTITY_RISK` policy types are in Early Access (EA). Contact your Okta account team to enable these features. | [optional]
16-
**Embedded** | Pointer to **map[string]map[string]interface{}** | | [optional] [readonly]
16+
**Embedded** | Pointer to **map[string]interface{}** | | [optional] [readonly]
1717
**Links** | Pointer to [**PolicyLinks**](PolicyLinks.md) | | [optional]
1818

1919
## Methods
@@ -262,20 +262,20 @@ HasType returns a boolean if a field has been set.
262262

263263
### GetEmbedded
264264

265-
`func (o *Policy) GetEmbedded() map[string]map[string]interface{}`
265+
`func (o *Policy) GetEmbedded() map[string]interface{}`
266266

267267
GetEmbedded returns the Embedded field if non-nil, zero value otherwise.
268268

269269
### GetEmbeddedOk
270270

271-
`func (o *Policy) GetEmbeddedOk() (*map[string]map[string]interface{}, bool)`
271+
`func (o *Policy) GetEmbeddedOk() (*map[string]interface{}, bool)`
272272

273273
GetEmbeddedOk returns a tuple with the Embedded field if it's non-nil, zero value otherwise
274274
and a boolean to check if the value has been set.
275275

276276
### SetEmbedded
277277

278-
`func (o *Policy) SetEmbedded(v map[string]map[string]interface{})`
278+
`func (o *Policy) SetEmbedded(v map[string]interface{})`
279279

280280
SetEmbedded sets Embedded field to given value.
281281

okta/main_test.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,6 @@ func sweep() (err error) {
4040
if err != nil {
4141
return
4242
}
43-
fmt.Println("43", apiClient.cfg.Host)
4443
err = sweepGroups()
4544
if err != nil {
4645
return

okta/model_app_user_update_request.go

Lines changed: 2 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

okta/model_assign_role_to_client_request.go

Lines changed: 2 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

okta/model_get_factor_transaction_status_200_response.go

Lines changed: 2 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

okta/model_get_ssf_streams_200_response.go

Lines changed: 4 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)