From 1fe16b4d5adb583d1ba7b56dc7b0961725b154b6 Mon Sep 17 00:00:00 2001 From: Henry Recker Date: Wed, 27 Dec 2023 10:55:37 -0600 Subject: [PATCH] Fix incorrect tfsdk tags --- configurationapi/model_decryption_policy.go | 2 +- configurationapi/model_encryption_policy.go | 2 +- configurationapi/model_sp_ws_trust.go | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/configurationapi/model_decryption_policy.go b/configurationapi/model_decryption_policy.go index 198377f..ab0189a 100644 --- a/configurationapi/model_decryption_policy.go +++ b/configurationapi/model_decryption_policy.go @@ -28,7 +28,7 @@ type DecryptionPolicy struct { // Encrypt the Subject Name ID in SLO messages to the IdP. SloEncryptSubjectNameID *bool `json:"sloEncryptSubjectNameID,omitempty" tfsdk:"slo_encrypt_subject_name_id"` // Allow encrypted Subject Name ID in SLO messages from the IdP. - SloSubjectNameIDEncrypted *bool `json:"sloSubjectNameIDEncrypted,omitempty" tfsdk:"slo_subject_name_ide_ncrypted"` + SloSubjectNameIDEncrypted *bool `json:"sloSubjectNameIDEncrypted,omitempty" tfsdk:"slo_subject_name_id_encrypted"` } // NewDecryptionPolicy instantiates a new DecryptionPolicy object diff --git a/configurationapi/model_encryption_policy.go b/configurationapi/model_encryption_policy.go index ecf0a31..d8f726b 100644 --- a/configurationapi/model_encryption_policy.go +++ b/configurationapi/model_encryption_policy.go @@ -26,7 +26,7 @@ type EncryptionPolicy struct { // Encrypt the name-identifier attribute in outbound SLO messages. This can be set if the name id is encrypted. EncryptSloSubjectNameId *bool `json:"encryptSloSubjectNameId,omitempty" tfsdk:"encrypt_slo_subject_name_id"` // Allow the encryption of the name-identifier attribute for inbound SLO messages. This can be set if SP initiated SLO is enabled. - SloSubjectNameIDEncrypted *bool `json:"sloSubjectNameIDEncrypted,omitempty" tfsdk:"slo_subject_name_ide_ncrypted"` + SloSubjectNameIDEncrypted *bool `json:"sloSubjectNameIDEncrypted,omitempty" tfsdk:"slo_subject_name_id_encrypted"` } // NewEncryptionPolicy instantiates a new EncryptionPolicy object diff --git a/configurationapi/model_sp_ws_trust.go b/configurationapi/model_sp_ws_trust.go index c44d4cc..070d647 100644 --- a/configurationapi/model_sp_ws_trust.go +++ b/configurationapi/model_sp_ws_trust.go @@ -22,7 +22,7 @@ type SpWsTrust struct { // The partner service identifiers. PartnerServiceIds []string `json:"partnerServiceIds" tfsdk:"partner_service_ids"` // When selected, four additional token-type requests become available. - OAuthAssertionProfiles *bool `json:"oAuthAssertionProfiles,omitempty" tfsdk:"o_auth_assertion_profiles"` + OAuthAssertionProfiles *bool `json:"oAuthAssertionProfiles,omitempty" tfsdk:"oauth_assertion_profiles"` // The default token type when a web service client (WSC) does not specify in the token request which token type the STS should issue. Defaults to SAML 2.0. DefaultTokenType *string `json:"defaultTokenType,omitempty" tfsdk:"default_token_type"` // When selected, the STS generates a symmetric key to be used in conjunction with the \"Holder of Key\" (HoK) designation for the assertion's Subject Confirmation Method. This option does not apply to OAuth assertion profiles.