Running changelog of releases since 2.0.0-rc.4
- Revert integer values representation as integer pointers
- Original change was too agreesive for a minor release
- All integer fields have a parallel pointer field that can be used as an alternative to deal with 0 values during JSON marshaling
- Example
PasswordPolicymodel has fields int64Priorityand *int64PriorityPtr - This change will not break code from release v2.15.0 and earlier
- Example
- New models
MultifactorEnrollmentPolicyMultifactorEnrollmentPolicyAuthenticatorSettingsMultifactorEnrollmentPolicyAuthenticatorStatusMultifactorEnrollmentPolicyAuthenticatorTypeMultifactorEnrollmentPolicySettingsMultifactorEnrollmentPolicySettingsType
- New methods / endpoints
ApplicationhasPreviewSAMLAppMetadatamethod forGET /api/v1/apps/{applicationId}/sso/saml/metadataendpoint.
- Added parameters
Defaultbool onAuthorizationServermodel
- All API integers, which previously had been typed as
int64, are now typed*int64so that serialization of actual0values are not ignored when omitempty tags are present for serialization.
- Added
POST /api/v1/authenticatorsforCreateAuthenticatormethod toAuthenticatorResourcemodel by @monde in okta/okta-management-openapi-spec#154 - Added
/api/v1/apps/${applicationId}/credentials/secretsendpoints andClientSecretmodel by @monde in okta/okta-management-openapi-spec#146 - Added property
pkce_requiredto theApplicationCredentialsOAuthClientmodel by @monde in okta/okta-management-openapi-spec#145 - Added
uiSchemaIdproperty to theProfileEnrollmentPolicyRuleActionmodel by @emanor-okta in okta/okta-management-openapi-spec#144
- Corrected parameters order
/api/v1/authorizationServers/{authServerId}/policies/{policyId}/rules/api/v1/authorizationServers/{authServerId}/policies/{policyId}/rules/{ruleId}- By @monde okta/okta-management-openapi-spec#131
- Added property
inactivityPeriodtoVerificationMethodmodel openapi-2.14.0 - OAuth tokens are cached regardless of what request cache manager is utilized on the client.
Okta SDK Golang release in conjunction with v2.13.0 of the Okta OpenAPI Specification (Management APIs)
- Added properties
host,integrationKey, andsecretKeytoAuthenticatorProviderConfigurationmodel to support Duo Authenticator openapi-2.13.0 - Renamed query parameter
searchtofilteronGET /api/v1/groupsendpoint openapi-2.13.0 - New feature, SDK client can authenticate with Bearer token orienting the SDK client to the security scope of a specific application #310
- Added ability to specify JWT kid header #308
- Schema API calls with one of / enum values will have correct type when calling API #312
- Corrected out of order method and API parameters
AuthorizationServerResourceListAuthorizationServerPolicyRules(ctx context.Context, authServerId string, policyId string)CreateAuthorizationServerPolicyRule(ctx context.Context, authServerId string, policyId string, body AuthorizationServerPolicyRule)
- Corrected
ListPoliciesgeneration for newPoliciesinterface.
- Update code generation to v2.12.0 of Okta's openapi spec
- Update to use trusted origins IFRAME_EMBED - IframeEmbedScopeAllowedApps in Scope
- Completed missing code generation of Policy related models
- Policy related models implement a
Policiesinterface - Correctly handle pass by reference in
CreatePolicy,UpdatePolicy
- Policy related models implement a
- Corrected env var typo on
OKTA_CLIENT_REQUEST_TIMEOUTin README - Corrected code generation pass by referrence of a Factor instance in
EnrollFactor,ActivateFactor, andVerifyFactor - Provider query parameter can be boolean or string
- Corrected out of order method and API parameters
AuthorizationServerResourceDeleteAuthorizationServerPolicyRule(ctx context.Context, authServerId string, policyId string, ruleId string)GetAuthorizationServerPolicyRule(ctx context.Context, authServerId string, policyId string, ruleId string)UpdateAuthorizationServerPolicyRule(ctx context.Context, authServerId string, policyId string, ruleId string, body AuthorizationServerPolicyRule)
AuthorizationServerPolicyRuleResourceUpdateAuthorizationServerPolicyRule(ctx context.Context, authServerId string, policyId string, ruleId string, body AuthorizationServerPolicyRule)DeleteAuthorizationServerPolicyRule(ctx context.Context, authServerId string, policyId string, ruleId string)
- Added missing
_linksproperty toResponseLinksmodel
- Changes
sendTestEmailresponse to a204 no contentinstead of200 success - Adds
privateKeyandteamIdproperties toIdentityProviderCredentialsSigningto support Apple devices - Adds to
APPLEto the enums inFactorProvider' andLogCredentialProvider
- New models
EmailTemplateEmailTemplateContentEmailTemplateCustomizationEmailTemplateCustomizationRequestEmailTemplateResourceEmailTemplateTestRequestEmailTemplateTouchPointVariantIdpPolicyRuleActionIdpPolicyRuleActionProvider
- Policy is first class parent with child policy types.
- Special case unmarshal for SocialAuthToken nullable expiresAt being blank from Okta API
Release of openapispec 2.10.0
- /api/v1/apps/{appId}/connections/default
- /api/v1/apps/{appId}/connections/default/lifecycle/activate
- /api/v1/apps/{appId}/connections/default/lifecycle/deactivate
- /api/v1/apps/{appId}/features
- /api/v1/apps/{appId}/features/{name}
- /api/v1/apps/{appId}/logo
- /api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/activate
- /api/v1/policies/{policyId}/rules/{ruleId}/lifecycle/deactivate
- /api/v1/roles/{roleTypeOrRoleId}/subscriptions
- /api/v1/roles/{roleTypeOrRoleId}/subscriptions/{notificationType}
- /api/v1/roles/{roleTypeOrRoleId}/subscriptions/{notificationType}/subscribe
- /api/v1/roles/{roleTypeOrRoleId}/subscriptions/{notificationType}/unsubscribe
- /api/v1/users/{userId}/subscriptions
- /api/v1/users/{userId}/subscriptions/{notificationType}
- /api/v1/users/{userId}/subscriptions/{notificationType}/subscribe
- /api/v1/users/{userId}/subscriptions/{notificationType}/unsubscribe
- ActivateDefaultProvisioningConnectionForApplication
- DeactivateDefaultProvisioningConnectionForApplication
- GetDefaultProvisioningConnectionForApplication
- GetFeatureForApplication
- ListFeaturesForApplication
- SetDefaultProvisioningConnectionForApplication
- UpdateFeatureForApplication
- UploadApplicationLogo
- UploadBrandThemeBackgroundImage
- UploadBrandThemeFavicon
- UploadBrandThemeLogo
- UpdateOrgLogo
- GetRoleSubscriptionByNotificationType(ctx context.Context, roleTypeOrRoleId string, notificationType string) (*Subscription, *Response, error) {
- ListRoleSubscriptions
- SubscribeRoleSubscriptionByNotificationType
- SubscribeUserSubscriptionByNotificationType
- UnsubscribeRoleSubscriptionByNotificationType
- UnsubscribeUserSubscriptionByNotificationType
- GetUserSubscriptionByNotificationType
- ListUserSubscriptions
- NewApplicationFeature
- NewCapabilitiesCreateObject
- NewCapabilitiesObject
- NewCapabilitiesUpdateObject
- NewLifecycleCreateSettingObject
- NewLifecycleDeactivateSettingObject
- NewOrg2OrgApplication
- NewOrg2OrgApplicationSettings
- NewOrg2OrgApplicationSettingsApp
- NewPasswordSettingObject
- NewProfileSettingObject
- NewProvisioningConnection
- NewProvisioningConnectionProfile
- NewProvisioningConnectionRequest
- ApplicationFeature
- CapabilitiesCreateObject
- CapabilitiesObject
- CapabilitiesUpdateObject
- ChangeEnum
- LifecycleCreateSettingObject
- LifecycleDeactivateSettingObject
- NotificationType
- Org2OrgApplication
- Org2OrgApplicationSettings
- Org2OrgApplicationSettingsApp
- PasswordSettingObject
- ProfileSettingObject
- ProvisioningConnection
- ProvisioningConnectionAuthScheme
- ProvisioningConnectionProfile
- ProvisioningConnectionRequest
- ProvisioningConnectionStatus
- SeedEnum
- Subscription
- SubscriptionStatus
- Adjustments were made the attributes on the
DeviceAccessPolicyRuleConditiontype. - Adding
GroupProfileMapattribute toGroupProfilestruct to support additional properties. See #268
AccessPolicyAccessPolicyConstraintAccessPolicyConstraintsAccessPolicyRuleAccessPolicyRuleActionsAccessPolicyRuleApplicationSignOnAccessPolicyRuleConditionsAccessPolicyRuleCustomConditionAuthenticatorProviderAuthenticatorProviderConfigurationAuthenticatorProviderConfigurationUserNamePlateBrandResourceBrandChannelBindingComplianceDeviceAccessPolicyRuleConditionEmailTemplateTouchPointVariantEndUserDashboardTouchPointVariantErrorPageTouchPointVariantFipsEnumImageUploadResponseKnowledgeConstraintPossessionConstraintPreRegistrationInlineHookProfileEnrollmentPolicyProfileEnrollmentPolicyRuleProfileEnrollmentPolicyRuleActionProfileEnrollmentPolicyRuleActionsProfileEnrollmentPolicyRuleActivationRequirementProfileEnrollmentPolicyRuleProfileAttributeRequiredEnumSignInPageTouchPointVariantThemeResourceThemeThemeResponseUserTypeConditionUserVerificationEnumVerificationMethod
AuthenticatorResourceGetAuthenticatorUpdateAuthenticatorListAuthenticators
BrandResourceGetBrandUpdateBrandListBrandsListBrandThemesGetBrandThemeUpdateBrandThemeDeleteBrandThemeBackgroundImageUploadBrandThemeBackgroundImageDeleteBrandThemeFaviconUploadBrandThemeFaviconDeleteBrandThemeLogoUploadBrandThemeLogo
OrgSettingResourceUpdateOrgLogoGetOrgPreferencesHideOktaUIFooterShowOktaUIFooterOptInUsersToOktaCommunicationEmailsOptOutUsersFromOktaCommunicationEmailsGetOrgOktaSupportSettingsExtendOktaSupportGrantOktaSupportRevokeOktaSupport
ThemeResourceGetBrandThemeUpdateBrandTheme
- Updated Authenticators integration tests
- Integration tests on
IdentityProviderResource
- methods on client's Authenticator resource for
/api/v1/authenticatorsendpoints and their integration tests - methods on client's OrgSetting resource for
/api/v1/orgendpoints and their integration tests - edge case type fixes in golang code generator
make pull-specpulls from https://github.com/okta/okta-management-openapi-spec master or branch set byOPENAPI_SPEC_BRANCHenv variable- golang generator sets api version from spec.json or by env variable override
OKTA_SDK_GOLANG_VERISON - integration test improvements
- Okta API Group Schema support #256 thanks @bogdanprodan-okta
- Fix race condition #257 thanks @bogdanprodan-okta, @maxkondr
- Pass previous query parameters to the NextPage URL #252 @bogdanprodan-okta
- Corrected UserSchemaBase properties field as UserSchemaAttribute #248 @bogdanprodan-okta
- Added ApplicationSettingsNotes to all apps
- Added more fields to the error struct for different error response patterns from API #246 @bogdanprodan-okta
- Fixed error handling for 400/401/403 errors
- Hardcode to version 2.5.1 off of main branch of Okta's openapi spec https://github.com/okta/okta-management-openapi-spec
- Fixed code generation inconsistencies from Okta's open API spec #243 @bogdanprodan-okta
- Fixed/improved app instances interface implementations, removed 'omitemty' tags #241 @bogdanprodan-okta
- Fixed failed access token requests are not retried. #194 @adw1n
- Fixed
client.User.CreateUserexample in README. #231 @Sanil2108
- Update generated code to version 2.5.0 of Okta's openapi spec https://github.com/okta/okta-management-openapi-spec
- Refine Makefile's flexibility
- Support opaque private keys (#225) @aborrello
- Improve OAuth 2.0 servapp doc (#221) @juanmatias
- Removed omitempty from ApplicationGroupAssignment priority field (#218) @bogdanprodan-okta
- Added
WithHttpClientPtr,WithHttpClientPtr(#214) @bogdanprodan-okta - Remove omitempty of 'default_scope' field (#212) @bogdanprodan-okta
- Add exported OKTA_ACCESS_TOKEN constant (#213) @bretterer
- Adds Stalebot workflow (#210) @bretterer
- Fixed typo in error message of "too many requests" #230 @halmai
- AuthorizationServerPolicy
- AuthorizationServerPolicyRule
- Fixed response body parsing
- Fix error handling for 401 error
- Retry on EOF errors from HTTP client
- Update
SamlApplicationSettingsSignOnproperties to includeSingleLogoutandSpCertificate - Update
InlineHookChannelConfigproperties to includeMethod - Update
OpenIdConnectApplicationSettingsClientproperties to includeIdpInitiatedLogin
- Update default connection Timeout to
60seconds (#185) - Http Client now uses
Timeoutsetting for connection timeout (#185) - SDK no longer cancels context (#185)
OpenIdConnectApplicationSettingsClientKeysOpenIdConnectApplicationSettingsRefreshTokenOpenIdConnectRefreshTokenRotationType
- Updates
okta/OpenIdConnectApplicationSettingsClientproperties to includejwks []JsonWebKey(Resolves #176) NewCustomHotpUserFactorsets factor type totoken:htop
- Removes vendor directory
- Updates
OpenIdConnectApplicationSettingsClientproperties to includeRefreshToken *OpenIdConnectApplicationSettingsRefreshToken
AcsEndpointCatalogApplicationCatalogApplicationStatusCustomHotpUserFactorCustomHotpUserFactorProfileInlineHookStatusInlineHookTypeWebAuthnUserFactorWebAuthnUserFactorProfile
- Updates
okta/config.goto usegithub.com/okta/okta-sdk-golang/v2/okta/cache(#167, Resolves #149) - Updates
okta/config.goto useint64forConnectionTimeoutandRequestTimeout(#166) ListApplicationTargetsForApplicationAdministratorRoleForGroupnow returns correct[]CatalogApplicationListApplicationTargetsForApplicationAdministratorRoleForUsernow returns correct[]CatalogApplicationJsonWebKey.ExpiresAtchanged to correctly use*time.TimeverifyUserFactorResponse.ExpiresAtchanged to correctly use*time.Time- Correctly reads
.okta.yamlfrom project root directory - Updated typo in
PasswordCredentialHashstruct and changedWorkerFactorto the correctWorkFactor
- Updates to @okta/openapi 2.1.1 (And associated Generator Updates)
- Added
UserIdtoOAuth2ScopeConsentGrantstruct - Now Returns error instead of panic from config in
okta.go(Resolves #122) RequestExecutorreturns error ifprivPemis null when using PrivateKey authentication- Added
AcsEndpointsandAllowMultipleAcsEndpointsproperties toSamlApplicationSettingsSignOn - Added
FilterTypeandFilterValuetoSamlAttributeStatement(Resolves #76) - Generated file header in line with Go standard (Resolves #118)
- Official Release of v2 Okta Golang SDK (June 4, 2020)
CSRModel has been renamed toCsrCSRMetadataModel has been renamed toCsrMetadataCSRMetadataSubjectModel has been renamed toCsrMetadataSubjectCSRMetadataSubjectAltNamesModel has been renamed toCsrMetadataSubjectAltNamesGenerateCsrForIdentityProvidernow sets accept header correctly toapplication/json
- Remove
PreviewSamlMetadataForApplicationmethod fromApplicationResource KidQuery Param removedKeepCurrentQuery Param removedActivateFactorRequeststruct added- New Method
GenerateApplicationKeyadded toApplicationResource FactorResultTypestruct addedOpenIdConnectApplicationIssuerModestruct addedInitiateLoginUriproperty (type string) added toOpenIdConnectApplicationSettingsClientstructIssuerModeproperty (type string) added toOpenIdConnectApplicationSettingsClientstructFormatproperty (type []string) added toPolicySubjectstructExpiresAtproperty (type *time.Time) added toPushUserFactorstructFactorResultproperty (type string) added toPushUserFactorstruct- Remove
ClearCurrentUserSessionfromUserResource UserFactorResourcemethodActivateFactornow takesActivateFactorRequestas thebodyparam instead ofVerifyFactorRequestNextPassCodeproperty (type string) added toVerifyFactorRequeststruct- Update Readme to show how to access
RequestExecutor(Fixes #83) - Fixes Cache EOF (Fixes #103 and Fixes #36)
- Update all enum objects to
type string(Fixes #95) - Implement Pagination
- Updated Resource Executor to handle nil pointer dereference (#125, fix suggested by @johanbrandhorst)
- Updates JWT Signer Package issues (#121, fix suggested by @Jmainguy)