Skip to content

Commit

Permalink
v0.4.19
Browse files Browse the repository at this point in the history
  • Loading branch information
tmunzer committed Dec 12, 2024
1 parent d31337f commit aff330f
Show file tree
Hide file tree
Showing 5 changed files with 6 additions and 6 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@

## Introduction

> Version: **2412.1.2**
> Version: **2412.1.3**
>
> Date: **December 12, 2024**
Expand Down
2 changes: 1 addition & 1 deletion doc/controllers/orgs-sec-policies.md
Original file line number Diff line number Diff line change
Expand Up @@ -277,7 +277,7 @@ body := models.Secpolicy{
CrossSite: models.ToPointer(false),
EmailEnabled: models.ToPointer(true),
Enabled: models.ToPointer(false),
Expire: models.ToPointer(float64(1440)),
Expire: models.ToPointer(1440),
ExternalPortalUrl: models.ToPointer("string"),
FacebookClientId: models.NewOptional(models.ToPointer("string")),
FacebookClientSecret: models.NewOptional(models.ToPointer("string")),
Expand Down
2 changes: 1 addition & 1 deletion doc/models/wlan-portal.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ portal wlan settings
| `CrossSite` | `*bool` | Optional | whether to allow guest to roam between WLANs (with same `WLAN.ssid`, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)<br>**Default**: `false` |
| `EmailEnabled` | `*bool` | Optional | whether email (access code verification) is enabled as a login method<br>**Default**: `false` |
| `Enabled` | `*bool` | Optional | whether guest portal is enabled<br>**Default**: `false` |
| `Expire` | `*float64` | Optional | how long to remain authorized, in minutes<br>**Default**: `1440` |
| `Expire` | `*int` | Optional | how long to remain authorized, in minutes<br>**Default**: `1440` |
| `ExternalPortalUrl` | `*string` | Optional | external portal URL (e.g. https://host/url) where we can append our query parameters to |
| `FacebookClientId` | `models.Optional[string]` | Optional | Required if `facebook_enabled`==`true`.<br>Facebook OAuth2 app id. This is optional. If not provided, it will use a default one. |
| `FacebookClientSecret` | `models.Optional[string]` | Optional | Required if `facebook_enabled`==`true`.<br>Facebook OAuth2 app secret. If facebook_client_id was provided, provide a correspoinding value. Else leave blank. |
Expand Down
2 changes: 1 addition & 1 deletion mistapi/client.go
Original file line number Diff line number Diff line change
Expand Up @@ -412,7 +412,7 @@ func NewClient(configuration Configuration) ClientInterface {
configuration: configuration,
}

client.userAgent = utilities.UpdateUserAgent("SDK 2412.1.2")
client.userAgent = utilities.UpdateUserAgent("SDK 2412.1.3")
client.callBuilderFactory = callBuilderHandler(
func(server string) string {
if server == "" {
Expand Down
4 changes: 2 additions & 2 deletions mistapi/models/wlan_portal.go
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ type WlanPortal struct {
// whether guest portal is enabled
Enabled *bool `json:"enabled,omitempty"`
// how long to remain authorized, in minutes
Expire *float64 `json:"expire,omitempty"`
Expire *int `json:"expire,omitempty"`
// external portal URL (e.g. https://host/url) where we can append our query parameters to
ExternalPortalUrl *string `json:"external_portal_url,omitempty"`
// Required if `facebook_enabled`==`true`.
Expand Down Expand Up @@ -613,7 +613,7 @@ type tempWlanPortal struct {
CrossSite *bool `json:"cross_site,omitempty"`
EmailEnabled *bool `json:"email_enabled,omitempty"`
Enabled *bool `json:"enabled,omitempty"`
Expire *float64 `json:"expire,omitempty"`
Expire *int `json:"expire,omitempty"`
ExternalPortalUrl *string `json:"external_portal_url,omitempty"`
FacebookClientId Optional[string] `json:"facebook_client_id"`
FacebookClientSecret Optional[string] `json:"facebook_client_secret"`
Expand Down

0 comments on commit aff330f

Please sign in to comment.