@goauthentik/api 2022.12.2-1673623344 → 2022.12.2-1673978239

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -88,6 +88,12 @@ export interface PatchedProxyProviderRequest {
88
88
  * @memberof PatchedProxyProviderRequest
89
89
  */
90
90
  mode?: ProxyMode | null;
91
+ /**
92
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
93
+ * @type {boolean}
94
+ * @memberof PatchedProxyProviderRequest
95
+ */
96
+ interceptHeaderAuth?: boolean;
91
97
  /**
92
98
  *
93
99
  * @type {string}
@@ -33,6 +33,7 @@ export function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminat
33
33
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
34
34
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
35
35
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
36
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
36
37
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
37
38
  'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
38
39
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
@@ -58,6 +59,7 @@ export function PatchedProxyProviderRequestToJSON(value) {
58
59
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
59
60
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
60
61
  'mode': ProxyModeToJSON(value.mode),
62
+ 'intercept_header_auth': value.interceptHeaderAuth,
61
63
  'cookie_domain': value.cookieDomain,
62
64
  'jwks_sources': value.jwksSources,
63
65
  'token_validity': value.tokenValidity,
@@ -119,6 +119,12 @@ export interface ProxyOutpostConfig {
119
119
  * @memberof ProxyOutpostConfig
120
120
  */
121
121
  readonly tokenValidity: number | null;
122
+ /**
123
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
124
+ * @type {boolean}
125
+ * @memberof ProxyOutpostConfig
126
+ */
127
+ interceptHeaderAuth?: boolean;
122
128
  /**
123
129
  *
124
130
  * @type {Array<string>}
@@ -39,6 +39,7 @@ export function ProxyOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
39
39
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
40
40
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
41
41
  'tokenValidity': json['token_validity'],
42
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
42
43
  'scopesToRequest': json['scopes_to_request'],
43
44
  'assignedApplicationSlug': json['assigned_application_slug'],
44
45
  'assignedApplicationName': json['assigned_application_name'],
@@ -67,5 +68,6 @@ export function ProxyOutpostConfigToJSON(value) {
67
68
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
68
69
  'mode': ProxyModeToJSON(value.mode),
69
70
  'cookie_domain': value.cookieDomain,
71
+ 'intercept_header_auth': value.interceptHeaderAuth,
70
72
  };
71
73
  }
@@ -136,6 +136,12 @@ export interface ProxyProvider {
136
136
  * @memberof ProxyProvider
137
137
  */
138
138
  mode?: ProxyMode | null;
139
+ /**
140
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
141
+ * @type {boolean}
142
+ * @memberof ProxyProvider
143
+ */
144
+ interceptHeaderAuth?: boolean;
139
145
  /**
140
146
  *
141
147
  * @type {string}
@@ -41,6 +41,7 @@ export function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
41
41
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
42
42
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
43
43
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
44
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
44
45
  'redirectUris': json['redirect_uris'],
45
46
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
46
47
  'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
@@ -68,6 +69,7 @@ export function ProxyProviderToJSON(value) {
68
69
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
69
70
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
70
71
  'mode': ProxyModeToJSON(value.mode),
72
+ 'intercept_header_auth': value.interceptHeaderAuth,
71
73
  'cookie_domain': value.cookieDomain,
72
74
  'jwks_sources': value.jwksSources,
73
75
  'token_validity': value.tokenValidity,
@@ -88,6 +88,12 @@ export interface ProxyProviderRequest {
88
88
  * @memberof ProxyProviderRequest
89
89
  */
90
90
  mode?: ProxyMode | null;
91
+ /**
92
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
93
+ * @type {boolean}
94
+ * @memberof ProxyProviderRequest
95
+ */
96
+ interceptHeaderAuth?: boolean;
91
97
  /**
92
98
  *
93
99
  * @type {string}
@@ -33,6 +33,7 @@ export function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
33
33
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
34
34
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
35
35
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
36
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
36
37
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
37
38
  'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
38
39
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
@@ -58,6 +59,7 @@ export function ProxyProviderRequestToJSON(value) {
58
59
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
59
60
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
60
61
  'mode': ProxyModeToJSON(value.mode),
62
+ 'intercept_header_auth': value.interceptHeaderAuth,
61
63
  'cookie_domain': value.cookieDomain,
62
64
  'jwks_sources': value.jwksSources,
63
65
  'token_validity': value.tokenValidity,
@@ -88,6 +88,12 @@ export interface PatchedProxyProviderRequest {
88
88
  * @memberof PatchedProxyProviderRequest
89
89
  */
90
90
  mode?: ProxyMode | null;
91
+ /**
92
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
93
+ * @type {boolean}
94
+ * @memberof PatchedProxyProviderRequest
95
+ */
96
+ interceptHeaderAuth?: boolean;
91
97
  /**
92
98
  *
93
99
  * @type {string}
@@ -37,6 +37,7 @@ function PatchedProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
37
37
  'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
38
38
  'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
39
39
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
40
+ 'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
40
41
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
41
42
  'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
42
43
  'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
@@ -63,6 +64,7 @@ function PatchedProxyProviderRequestToJSON(value) {
63
64
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
64
65
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
65
66
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
67
+ 'intercept_header_auth': value.interceptHeaderAuth,
66
68
  'cookie_domain': value.cookieDomain,
67
69
  'jwks_sources': value.jwksSources,
68
70
  'token_validity': value.tokenValidity,
@@ -119,6 +119,12 @@ export interface ProxyOutpostConfig {
119
119
  * @memberof ProxyOutpostConfig
120
120
  */
121
121
  readonly tokenValidity: number | null;
122
+ /**
123
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
124
+ * @type {boolean}
125
+ * @memberof ProxyOutpostConfig
126
+ */
127
+ interceptHeaderAuth?: boolean;
122
128
  /**
123
129
  *
124
130
  * @type {Array<string>}
@@ -43,6 +43,7 @@ function ProxyOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
43
43
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
44
44
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
45
45
  'tokenValidity': json['token_validity'],
46
+ 'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
46
47
  'scopesToRequest': json['scopes_to_request'],
47
48
  'assignedApplicationSlug': json['assigned_application_slug'],
48
49
  'assignedApplicationName': json['assigned_application_name'],
@@ -72,6 +73,7 @@ function ProxyOutpostConfigToJSON(value) {
72
73
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
73
74
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
74
75
  'cookie_domain': value.cookieDomain,
76
+ 'intercept_header_auth': value.interceptHeaderAuth,
75
77
  };
76
78
  }
77
79
  exports.ProxyOutpostConfigToJSON = ProxyOutpostConfigToJSON;
@@ -136,6 +136,12 @@ export interface ProxyProvider {
136
136
  * @memberof ProxyProvider
137
137
  */
138
138
  mode?: ProxyMode | null;
139
+ /**
140
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
141
+ * @type {boolean}
142
+ * @memberof ProxyProvider
143
+ */
144
+ interceptHeaderAuth?: boolean;
139
145
  /**
140
146
  *
141
147
  * @type {string}
@@ -45,6 +45,7 @@ function ProxyProviderFromJSONTyped(json, ignoreDiscriminator) {
45
45
  'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
46
46
  'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
47
47
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
48
+ 'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
48
49
  'redirectUris': json['redirect_uris'],
49
50
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
50
51
  'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
@@ -73,6 +74,7 @@ function ProxyProviderToJSON(value) {
73
74
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
74
75
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
75
76
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
77
+ 'intercept_header_auth': value.interceptHeaderAuth,
76
78
  'cookie_domain': value.cookieDomain,
77
79
  'jwks_sources': value.jwksSources,
78
80
  'token_validity': value.tokenValidity,
@@ -88,6 +88,12 @@ export interface ProxyProviderRequest {
88
88
  * @memberof ProxyProviderRequest
89
89
  */
90
90
  mode?: ProxyMode | null;
91
+ /**
92
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
93
+ * @type {boolean}
94
+ * @memberof ProxyProviderRequest
95
+ */
96
+ interceptHeaderAuth?: boolean;
91
97
  /**
92
98
  *
93
99
  * @type {string}
@@ -37,6 +37,7 @@ function ProxyProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
37
37
  'basicAuthPasswordAttribute': !(0, runtime_1.exists)(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
38
38
  'basicAuthUserAttribute': !(0, runtime_1.exists)(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
39
39
  'mode': !(0, runtime_1.exists)(json, 'mode') ? undefined : (0, ProxyMode_1.ProxyModeFromJSON)(json['mode']),
40
+ 'interceptHeaderAuth': !(0, runtime_1.exists)(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
40
41
  'cookieDomain': !(0, runtime_1.exists)(json, 'cookie_domain') ? undefined : json['cookie_domain'],
41
42
  'jwksSources': !(0, runtime_1.exists)(json, 'jwks_sources') ? undefined : json['jwks_sources'],
42
43
  'tokenValidity': !(0, runtime_1.exists)(json, 'token_validity') ? undefined : json['token_validity'],
@@ -63,6 +64,7 @@ function ProxyProviderRequestToJSON(value) {
63
64
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
64
65
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
65
66
  'mode': (0, ProxyMode_1.ProxyModeToJSON)(value.mode),
67
+ 'intercept_header_auth': value.interceptHeaderAuth,
66
68
  'cookie_domain': value.cookieDomain,
67
69
  'jwks_sources': value.jwksSources,
68
70
  'token_validity': value.tokenValidity,
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2022.12.2-1673623344",
3
+ "version": "2022.12.2-1673978239",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -98,6 +98,12 @@ export interface PatchedProxyProviderRequest {
98
98
  * @memberof PatchedProxyProviderRequest
99
99
  */
100
100
  mode?: ProxyMode | null;
101
+ /**
102
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
103
+ * @type {boolean}
104
+ * @memberof PatchedProxyProviderRequest
105
+ */
106
+ interceptHeaderAuth?: boolean;
101
107
  /**
102
108
  *
103
109
  * @type {string}
@@ -140,6 +146,7 @@ export function PatchedProxyProviderRequestFromJSONTyped(json: any, ignoreDiscri
140
146
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
141
147
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
142
148
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
149
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
143
150
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
144
151
  'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
145
152
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
@@ -167,6 +174,7 @@ export function PatchedProxyProviderRequestToJSON(value?: PatchedProxyProviderRe
167
174
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
168
175
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
169
176
  'mode': ProxyModeToJSON(value.mode),
177
+ 'intercept_header_auth': value.interceptHeaderAuth,
170
178
  'cookie_domain': value.cookieDomain,
171
179
  'jwks_sources': value.jwksSources,
172
180
  'token_validity': value.tokenValidity,
@@ -134,6 +134,12 @@ export interface ProxyOutpostConfig {
134
134
  * @memberof ProxyOutpostConfig
135
135
  */
136
136
  readonly tokenValidity: number | null;
137
+ /**
138
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
139
+ * @type {boolean}
140
+ * @memberof ProxyOutpostConfig
141
+ */
142
+ interceptHeaderAuth?: boolean;
137
143
  /**
138
144
  *
139
145
  * @type {Array<string>}
@@ -181,6 +187,7 @@ export function ProxyOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator:
181
187
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
182
188
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
183
189
  'tokenValidity': json['token_validity'],
190
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
184
191
  'scopesToRequest': json['scopes_to_request'],
185
192
  'assignedApplicationSlug': json['assigned_application_slug'],
186
193
  'assignedApplicationName': json['assigned_application_name'],
@@ -211,6 +218,7 @@ export function ProxyOutpostConfigToJSON(value?: ProxyOutpostConfig | null): any
211
218
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
212
219
  'mode': ProxyModeToJSON(value.mode),
213
220
  'cookie_domain': value.cookieDomain,
221
+ 'intercept_header_auth': value.interceptHeaderAuth,
214
222
  };
215
223
  }
216
224
 
@@ -146,6 +146,12 @@ export interface ProxyProvider {
146
146
  * @memberof ProxyProvider
147
147
  */
148
148
  mode?: ProxyMode | null;
149
+ /**
150
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
151
+ * @type {boolean}
152
+ * @memberof ProxyProvider
153
+ */
154
+ interceptHeaderAuth?: boolean;
149
155
  /**
150
156
  *
151
157
  * @type {string}
@@ -208,6 +214,7 @@ export function ProxyProviderFromJSONTyped(json: any, ignoreDiscriminator: boole
208
214
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
209
215
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
210
216
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
217
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
211
218
  'redirectUris': json['redirect_uris'],
212
219
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
213
220
  'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
@@ -237,6 +244,7 @@ export function ProxyProviderToJSON(value?: ProxyProvider | null): any {
237
244
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
238
245
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
239
246
  'mode': ProxyModeToJSON(value.mode),
247
+ 'intercept_header_auth': value.interceptHeaderAuth,
240
248
  'cookie_domain': value.cookieDomain,
241
249
  'jwks_sources': value.jwksSources,
242
250
  'token_validity': value.tokenValidity,
@@ -98,6 +98,12 @@ export interface ProxyProviderRequest {
98
98
  * @memberof ProxyProviderRequest
99
99
  */
100
100
  mode?: ProxyMode | null;
101
+ /**
102
+ * When enabled, this provider will intercept the authorization header and authenticate requests based on its value.
103
+ * @type {boolean}
104
+ * @memberof ProxyProviderRequest
105
+ */
106
+ interceptHeaderAuth?: boolean;
101
107
  /**
102
108
  *
103
109
  * @type {string}
@@ -140,6 +146,7 @@ export function ProxyProviderRequestFromJSONTyped(json: any, ignoreDiscriminator
140
146
  'basicAuthPasswordAttribute': !exists(json, 'basic_auth_password_attribute') ? undefined : json['basic_auth_password_attribute'],
141
147
  'basicAuthUserAttribute': !exists(json, 'basic_auth_user_attribute') ? undefined : json['basic_auth_user_attribute'],
142
148
  'mode': !exists(json, 'mode') ? undefined : ProxyModeFromJSON(json['mode']),
149
+ 'interceptHeaderAuth': !exists(json, 'intercept_header_auth') ? undefined : json['intercept_header_auth'],
143
150
  'cookieDomain': !exists(json, 'cookie_domain') ? undefined : json['cookie_domain'],
144
151
  'jwksSources': !exists(json, 'jwks_sources') ? undefined : json['jwks_sources'],
145
152
  'tokenValidity': !exists(json, 'token_validity') ? undefined : json['token_validity'],
@@ -167,6 +174,7 @@ export function ProxyProviderRequestToJSON(value?: ProxyProviderRequest | null):
167
174
  'basic_auth_password_attribute': value.basicAuthPasswordAttribute,
168
175
  'basic_auth_user_attribute': value.basicAuthUserAttribute,
169
176
  'mode': ProxyModeToJSON(value.mode),
177
+ 'intercept_header_auth': value.interceptHeaderAuth,
170
178
  'cookie_domain': value.cookieDomain,
171
179
  'jwks_sources': value.jwksSources,
172
180
  'token_validity': value.tokenValidity,