From 30b17aea065c2126eee2609c0e2f5babeaf61320 Mon Sep 17 00:00:00 2001 From: Arvind Krishnakumar <61501885+arvindkrishnakumar-okta@users.noreply.github.com> Date: Fri, 20 Oct 2023 03:09:00 +0530 Subject: [PATCH] Upgrade Open API Spec to latest oasv3 repo commit tag `bfbb501` (#955) Upgrade OASv3 to latest commit tag bfbb501 (full SHA - bfbb501e2df11016c670bab7e179d3c21f9b54f7) --- api/pom.xml | 2 +- coverage/pom.xml | 2 +- examples/pom.xml | 2 +- examples/quickstart/pom.xml | 2 +- impl/pom.xml | 2 +- integration-tests/pom.xml | 2 +- pom.xml | 10 +- src/swagger/api.yaml | 283 +++++++++++++++++++++++++++++++++++- 8 files changed, 290 insertions(+), 15 deletions(-) diff --git a/api/pom.xml b/api/pom.xml index 9290bcc985e..1334e1debb2 100644 --- a/api/pom.xml +++ b/api/pom.xml @@ -21,7 +21,7 @@ com.okta.sdk okta-sdk-root - 13.0.3-SNAPSHOT + 14.0.0-SNAPSHOT okta-sdk-api diff --git a/coverage/pom.xml b/coverage/pom.xml index 6ca6544d4bc..2ff4f9a117a 100644 --- a/coverage/pom.xml +++ b/coverage/pom.xml @@ -21,7 +21,7 @@ com.okta.sdk okta-sdk-root - 13.0.3-SNAPSHOT + 14.0.0-SNAPSHOT okta-sdk-coverage diff --git a/examples/pom.xml b/examples/pom.xml index 3b2ff758a49..f732d832a03 100644 --- a/examples/pom.xml +++ b/examples/pom.xml @@ -21,7 +21,7 @@ com.okta.sdk okta-sdk-root - 13.0.3-SNAPSHOT + 14.0.0-SNAPSHOT okta-sdk-examples diff --git a/examples/quickstart/pom.xml b/examples/quickstart/pom.xml index 7dff5282a93..01733e8dd52 100644 --- a/examples/quickstart/pom.xml +++ b/examples/quickstart/pom.xml @@ -20,7 +20,7 @@ com.okta.sdk okta-sdk-examples - 13.0.3-SNAPSHOT + 14.0.0-SNAPSHOT ../pom.xml diff --git a/impl/pom.xml b/impl/pom.xml index f3bdfc9416c..e5d95c9b094 100644 --- a/impl/pom.xml +++ b/impl/pom.xml @@ -21,7 +21,7 @@ com.okta.sdk okta-sdk-root - 13.0.3-SNAPSHOT + 14.0.0-SNAPSHOT okta-sdk-impl diff --git a/integration-tests/pom.xml b/integration-tests/pom.xml index 4c1b0735a32..6e73074d1de 100644 --- a/integration-tests/pom.xml +++ b/integration-tests/pom.xml @@ -20,7 +20,7 @@ com.okta.sdk okta-sdk-root - 13.0.3-SNAPSHOT + 14.0.0-SNAPSHOT ../pom.xml diff --git a/pom.xml b/pom.xml index fdf2547dc96..4767e157f9b 100644 --- a/pom.xml +++ b/pom.xml @@ -25,7 +25,7 @@ com.okta.sdk okta-sdk-root - 13.0.3-SNAPSHOT + 14.0.0-SNAPSHOT pom Okta Java SDK @@ -68,12 +68,12 @@ com.okta.sdk okta-sdk-api - 13.0.3-SNAPSHOT + 14.0.0-SNAPSHOT com.okta.sdk okta-sdk-impl - 13.0.3-SNAPSHOT + 14.0.0-SNAPSHOT @@ -103,14 +103,14 @@ com.okta.sdk okta-sdk-integration-tests - 13.0.3-SNAPSHOT + 14.0.0-SNAPSHOT com.okta.sdk okta-sdk-examples-quickstart - 13.0.3-SNAPSHOT + 14.0.0-SNAPSHOT diff --git a/src/swagger/api.yaml b/src/swagger/api.yaml index fdf12014a3c..63a67caf859 100644 --- a/src/swagger/api.yaml +++ b/src/swagger/api.yaml @@ -12259,6 +12259,49 @@ paths: - okta.policies.manage tags: - Policy + /api/v1/policies/simulate: + parameters: + - $ref: '#/components/parameters/simulateParameter' + post: + summary: Create a Policy Simulation + description: |- + Creates a policy or policy rule simulation. The access simulation evaluates policy and policy rules based on the existing policy rule configuration. + The evaluation result simulates what the real-world authentication flow is and what policy rules have been applied or matched to the authentication flow. + operationId: createPolicySimulation + x-codegen-request-body-name: simulatePolicy + requestBody: + content: + application/json: + schema: + type: array + items: + $ref: '#/components/schemas/SimulatePolicyBody' + examples: + SimulatePolicy: + $ref: '#/components/examples/SimulatePolicyBody' + required: true + responses: + '204': + description: Success + content: + application/json: + schema: + $ref: '#/components/schemas/SimulatePolicyResponse' + examples: + SimulatePolicy: + $ref: '#/components/examples/SimulatePolicyResponse' + '403': + $ref: '#/components/responses/ErrorAccessDenied403' + '404': + $ref: '#/components/responses/ErrorResourceNotFound404' + '429': + $ref: '#/components/responses/ErrorTooManyRequests429' + security: + - apiToken: [] + - oauth2: + - okta.policies.read + tags: + - Policy /api/v1/policies/{policyId}: parameters: - $ref: '#/components/parameters/pathPolicyId' @@ -20643,6 +20686,123 @@ components: _links: next: href: https://{yourOktaDomain}/api/v1/iam/roles?after=cr0Fw7HKcWIroo88m3r1 + SimulatePolicyBody: + summary: Simulate policy request body + description: Simulate policy request body + value: + policyType: + - OKTA_SIGN_ON + - MFA_ENROLL + appInstance: 0oa4eroj3nYCIJIW70g7 + policyContext: + groups: + ids: + - 00g4eralvekR5RLuS0g7 + - 00g4eralvekR5RLuS0g8 + risk: + level: LOW + zones: + ids: + - nzo4eralxcRnbIHYJ0g7 + device: + platform: IOS + registered: true + managed: true + SimulatePolicyResponse: + summary: Simulate policy response body + description: Simulate policy response body + value: + evaluation: + - status: null + policyType: OkTA_SIGN_ON + result: + policies: + - id: 00p4eromwukk6qUku0g7 + - name: test policy + - status: MATCH + - conditions: [] + - rules: + - id: 0pr4erof85nGcyC7Y0g7 + - name: test rule + - status: MATCH + - conditions: + - type: people.groups.include + - status: MATCH + undefined: + policies: null + evaluated: + policies: null + - status: null + policyType: ACCESS_POLICY + result: + policies: + - id: rst4eram06ZKZewEe0g7 + - name: Any two factors + - status: MATCH + - conditions: [] + - rules: + - id: rul4eram07VsWgybo0g7 + - name: Catch-all rule + - status: MATCH + - conditions: [] + undefined: + policies: null + evaluated: + policies: null + - status: null + policyType: PROFILE_ENROLLMENT + result: + policies: + - id: rst4eram08ZSjPTOl0g7 + - name: Default Policy + - status: MATCH + - conditions: [] + - rules: + - id: rul4eram094PrQ2BX0g7 + - name: Catch-all rule + - status: MATCH + - conditions: [] + undefined: + policies: null + evaluated: + policies: null + ThreatInsightResponseExample: + summary: ThreatInsight response + value: + action: none + excludeZones: [] + created: '2020-08-05T22:18:30.629Z' + lastUpdated: '2020-08-05T22:18:30.629Z' + _links: + self: + href: https://{yourOktaDomain}/api/v1/threats/configuration + hints: + allow: + - GET + - POST + ThreatInsightUpdateRequestExample: + summary: ThreatInsight update request + value: + action: audit + excludeZones: + - nzo1q7jEOsoCnoKcj0g4 + - nzouagptWUz5DlLfM0g3 + ThreatInsightUpdateResponseExample: + summary: ThreatInsight update response + value: + action: audit + excludeZones: + - nzo1q7jEOsoCnoKcj0g4 + - nzouagptWUz5DlLfM0g3 + created: '2020-08-05T22:18:30.629Z' + lastUpdated: '2020-10-13T21:23:10.178Z' + _links: + self: + href: https://{yourOktaDomain}/api/v1/threats/configuration + hints: + allow: + - GET + - POST TriggerSessionResponse: value: - id: uij4ri8ZLk0ywyqxB0g4 @@ -23013,8 +23173,6 @@ components: - SAML_2_0 - SECURE_PASSWORD_STORE - WS_FEDERATION - - MOBILE_NO_SIGNON - - RADIUS_FOR_GENERIC_APP ApplicationVisibility: type: object properties: @@ -25898,7 +26056,7 @@ components: _links: type: object additionalProperties: - $ref: '#/components/schemas/HrefObjectAppLink' + $ref: '#/components/schemas/HrefObjectSelfLink' IdentityProviderApplicationUser: type: object properties: @@ -30121,6 +30279,121 @@ components: id: type: string readOnly: false + SimulatePolicyBody: + description: The request body required for a simulate policy operation. + type: object + properties: + appInstance: + type: string + description: The application instance ID for a simulate operation + policyContext: + $ref: '#/components/schemas/PolicyContext' + policyTypes: + type: string + description: Supported policy types for a simulate operation. The default value, `null`, returns all types. + enum: + - OKTA_SIGN_ON + - MFA_ENROLL + - PROFILE_ENROLLMENT + - ACCESS_POLICY + - null + required: + - appInstance + SimulatePolicyEvaluations: + type: object + properties: + evaluated: + type: object + description: A list of evaluated but not matched policies and rules + properties: + policies: + $ref: '#/components/schemas/SimulateResultPolicies' + policyType: + type: string + description: The policy type of the simulate operation + enum: + - OKTA_SIGN_ON + - MFA_ENROLL + - PROFILE_ENROLLMENT + - ACCESS_POLICY + - null + result: + $ref: '#/components/schemas/SimulatePolicyResult' + status: + type: string + description: The result of this entity evaluation + enum: + - MATCH + - NOT_MATCH + - UNDEFINED + undefined: + type: object + description: A list of undefined but not matched policies and rules + properties: + policies: + $ref: '#/components/schemas/SimulateResultPolicies' + SimulatePolicyResponse: + description: The response body returned for a simulate policy operation. An array of `evaluations`. + items: + $ref: '#/components/schemas/SimulatePolicyEvaluations' + type: array + SimulatePolicyResult: + description: The result of the policy evaluation + type: object + properties: + policies: + $ref: '#/components/schemas/SimulateResultPolicies' + SimulateResultConditions: + type: object + properties: + status: + type: string + description: The result of the entity evaluation + enum: + - MATCH + - UNMATCHED + - UNDEFINED + type: + type: string + description: The type of condition + SimulateResultPolicies: + items: + $ref: '#/components/schemas/SimulateResultPoliciesItems' + type: array + SimulateResultPoliciesItems: + type: object + properties: + conditions: + type: array + $ref: '#/components/schemas/SimulateResultConditions' + id: + type: string + name: + type: string + rules: + type: array + $ref: '#/components/schemas/SimulateResultRules' + status: + type: string + SimulateResultRules: + type: object + properties: + conditions: + type: array + $ref: '#/components/schemas/SimulateResultConditions' + id: + type: string + description: The unique ID number of the policy rule + name: + type: string + description: The name of the policy rule + status: + type: string + description: The result of the entity evaluation + enum: + - MATCH + - UNMATCHED + - UNDEFINED SingleLogout: type: object properties: @@ -31438,7 +31711,9 @@ components: properties: {} readOnly: true _links: - $ref: '#/components/schemas/LinksSelf' + type: object + additionalProperties: + $ref: '#/components/schemas/HrefObjectSelfLink' VerifyUserFactorResult: type: string enum: