@goauthentik/api 2023.5.3-1685646044 → 2023.5.3-1686600706
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +1 -0
- package/dist/apis/AdminApi.d.ts +8 -0
- package/dist/apis/AdminApi.js +28 -0
- package/dist/apis/PoliciesApi.d.ts +1 -0
- package/dist/apis/PoliciesApi.js +3 -0
- package/dist/apis/SourcesApi.d.ts +2 -0
- package/dist/apis/SourcesApi.js +6 -0
- package/dist/esm/apis/AdminApi.d.ts +8 -0
- package/dist/esm/apis/AdminApi.js +28 -0
- package/dist/esm/apis/PoliciesApi.d.ts +1 -0
- package/dist/esm/apis/PoliciesApi.js +3 -0
- package/dist/esm/apis/SourcesApi.d.ts +2 -0
- package/dist/esm/apis/SourcesApi.js +6 -0
- package/dist/esm/models/EventMatcherPolicy.d.ts +7 -0
- package/dist/esm/models/EventMatcherPolicy.js +3 -0
- package/dist/esm/models/EventMatcherPolicyRequest.d.ts +7 -0
- package/dist/esm/models/EventMatcherPolicyRequest.js +3 -0
- package/dist/esm/models/LDAPSource.d.ts +12 -0
- package/dist/esm/models/LDAPSource.js +4 -0
- package/dist/esm/models/LDAPSourceRequest.d.ts +12 -0
- package/dist/esm/models/LDAPSourceRequest.js +4 -0
- package/dist/esm/models/ModelEnum.d.ts +161 -0
- package/dist/esm/models/ModelEnum.js +168 -0
- package/dist/esm/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
- package/dist/esm/models/PatchedEventMatcherPolicyRequest.js +3 -0
- package/dist/esm/models/PatchedLDAPSourceRequest.d.ts +12 -0
- package/dist/esm/models/PatchedLDAPSourceRequest.js +4 -0
- package/dist/esm/models/index.d.ts +1 -0
- package/dist/esm/models/index.js +1 -0
- package/dist/models/EventMatcherPolicy.d.ts +7 -0
- package/dist/models/EventMatcherPolicy.js +3 -0
- package/dist/models/EventMatcherPolicyRequest.d.ts +7 -0
- package/dist/models/EventMatcherPolicyRequest.js +3 -0
- package/dist/models/LDAPSource.d.ts +12 -0
- package/dist/models/LDAPSource.js +4 -0
- package/dist/models/LDAPSourceRequest.d.ts +12 -0
- package/dist/models/LDAPSourceRequest.js +4 -0
- package/dist/models/ModelEnum.d.ts +161 -0
- package/dist/models/ModelEnum.js +174 -0
- package/dist/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
- package/dist/models/PatchedEventMatcherPolicyRequest.js +3 -0
- package/dist/models/PatchedLDAPSourceRequest.d.ts +12 -0
- package/dist/models/PatchedLDAPSourceRequest.js +4 -0
- package/dist/models/index.d.ts +1 -0
- package/dist/models/index.js +1 -0
- package/package.json +1 -1
- package/src/apis/AdminApi.ts +30 -0
- package/src/apis/PoliciesApi.ts +5 -0
- package/src/apis/SourcesApi.ts +10 -0
- package/src/models/EventMatcherPolicy.ts +14 -0
- package/src/models/EventMatcherPolicyRequest.ts +14 -0
- package/src/models/LDAPSource.ts +16 -0
- package/src/models/LDAPSourceRequest.ts +16 -0
- package/src/models/ModelEnum.ts +176 -0
- package/src/models/PatchedEventMatcherPolicyRequest.ts +14 -0
- package/src/models/PatchedLDAPSourceRequest.ts +16 -0
- package/src/models/index.ts +1 -0
package/.openapi-generator/FILES
CHANGED
|
@@ -177,6 +177,7 @@ src/models/LoginChallengeTypes.ts
|
|
|
177
177
|
src/models/LoginMetrics.ts
|
|
178
178
|
src/models/LoginSource.ts
|
|
179
179
|
src/models/Metadata.ts
|
|
180
|
+
src/models/ModelEnum.ts
|
|
180
181
|
src/models/NameIdPolicyEnum.ts
|
|
181
182
|
src/models/NotConfiguredActionEnum.ts
|
|
182
183
|
src/models/Notification.ts
|
package/dist/apis/AdminApi.d.ts
CHANGED
|
@@ -37,6 +37,14 @@ export declare class AdminApi extends runtime.BaseAPI {
|
|
|
37
37
|
* Login Metrics per 1h
|
|
38
38
|
*/
|
|
39
39
|
adminMetricsRetrieve(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LoginMetrics>;
|
|
40
|
+
/**
|
|
41
|
+
* Read-only view list all installed models
|
|
42
|
+
*/
|
|
43
|
+
adminModelsListRaw(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<App>>>;
|
|
44
|
+
/**
|
|
45
|
+
* Read-only view list all installed models
|
|
46
|
+
*/
|
|
47
|
+
adminModelsList(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<App>>;
|
|
40
48
|
/**
|
|
41
49
|
* Get system information.
|
|
42
50
|
*/
|
package/dist/apis/AdminApi.js
CHANGED
|
@@ -85,6 +85,34 @@ class AdminApi extends runtime.BaseAPI {
|
|
|
85
85
|
return yield response.value();
|
|
86
86
|
});
|
|
87
87
|
}
|
|
88
|
+
/**
|
|
89
|
+
* Read-only view list all installed models
|
|
90
|
+
*/
|
|
91
|
+
adminModelsListRaw(initOverrides) {
|
|
92
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
93
|
+
const queryParameters = {};
|
|
94
|
+
const headerParameters = {};
|
|
95
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
96
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
97
|
+
}
|
|
98
|
+
const response = yield this.request({
|
|
99
|
+
path: `/admin/models/`,
|
|
100
|
+
method: 'GET',
|
|
101
|
+
headers: headerParameters,
|
|
102
|
+
query: queryParameters,
|
|
103
|
+
}, initOverrides);
|
|
104
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(models_1.AppFromJSON));
|
|
105
|
+
});
|
|
106
|
+
}
|
|
107
|
+
/**
|
|
108
|
+
* Read-only view list all installed models
|
|
109
|
+
*/
|
|
110
|
+
adminModelsList(initOverrides) {
|
|
111
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
112
|
+
const response = yield this.adminModelsListRaw(initOverrides);
|
|
113
|
+
return yield response.value();
|
|
114
|
+
});
|
|
115
|
+
}
|
|
88
116
|
/**
|
|
89
117
|
* Get system information.
|
|
90
118
|
*/
|
package/dist/apis/PoliciesApi.js
CHANGED
|
@@ -886,6 +886,9 @@ class PoliciesApi extends runtime.BaseAPI {
|
|
|
886
886
|
if (requestParameters.lastUpdated !== undefined) {
|
|
887
887
|
queryParameters['last_updated'] = requestParameters.lastUpdated.toISOString();
|
|
888
888
|
}
|
|
889
|
+
if (requestParameters.model !== undefined) {
|
|
890
|
+
queryParameters['model'] = requestParameters.model;
|
|
891
|
+
}
|
|
889
892
|
if (requestParameters.name !== undefined) {
|
|
890
893
|
queryParameters['name'] = requestParameters.name;
|
|
891
894
|
}
|
|
@@ -52,6 +52,7 @@ export interface SourcesLdapListRequest {
|
|
|
52
52
|
additionalUserDn?: string;
|
|
53
53
|
baseDn?: string;
|
|
54
54
|
bindCn?: string;
|
|
55
|
+
clientCertificate?: string;
|
|
55
56
|
enabled?: boolean;
|
|
56
57
|
groupMembershipField?: string;
|
|
57
58
|
groupObjectFilter?: string;
|
|
@@ -66,6 +67,7 @@ export interface SourcesLdapListRequest {
|
|
|
66
67
|
search?: string;
|
|
67
68
|
serverUri?: string;
|
|
68
69
|
slug?: string;
|
|
70
|
+
sni?: boolean;
|
|
69
71
|
startTls?: boolean;
|
|
70
72
|
syncGroups?: boolean;
|
|
71
73
|
syncParentGroup?: string;
|
package/dist/apis/SourcesApi.js
CHANGED
|
@@ -425,6 +425,9 @@ class SourcesApi extends runtime.BaseAPI {
|
|
|
425
425
|
if (requestParameters.bindCn !== undefined) {
|
|
426
426
|
queryParameters['bind_cn'] = requestParameters.bindCn;
|
|
427
427
|
}
|
|
428
|
+
if (requestParameters.clientCertificate !== undefined) {
|
|
429
|
+
queryParameters['client_certificate'] = requestParameters.clientCertificate;
|
|
430
|
+
}
|
|
428
431
|
if (requestParameters.enabled !== undefined) {
|
|
429
432
|
queryParameters['enabled'] = requestParameters.enabled;
|
|
430
433
|
}
|
|
@@ -467,6 +470,9 @@ class SourcesApi extends runtime.BaseAPI {
|
|
|
467
470
|
if (requestParameters.slug !== undefined) {
|
|
468
471
|
queryParameters['slug'] = requestParameters.slug;
|
|
469
472
|
}
|
|
473
|
+
if (requestParameters.sni !== undefined) {
|
|
474
|
+
queryParameters['sni'] = requestParameters.sni;
|
|
475
|
+
}
|
|
470
476
|
if (requestParameters.startTls !== undefined) {
|
|
471
477
|
queryParameters['start_tls'] = requestParameters.startTls;
|
|
472
478
|
}
|
|
@@ -37,6 +37,14 @@ export declare class AdminApi extends runtime.BaseAPI {
|
|
|
37
37
|
* Login Metrics per 1h
|
|
38
38
|
*/
|
|
39
39
|
adminMetricsRetrieve(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LoginMetrics>;
|
|
40
|
+
/**
|
|
41
|
+
* Read-only view list all installed models
|
|
42
|
+
*/
|
|
43
|
+
adminModelsListRaw(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<App>>>;
|
|
44
|
+
/**
|
|
45
|
+
* Read-only view list all installed models
|
|
46
|
+
*/
|
|
47
|
+
adminModelsList(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<App>>;
|
|
40
48
|
/**
|
|
41
49
|
* Get system information.
|
|
42
50
|
*/
|
|
@@ -82,6 +82,34 @@ export class AdminApi extends runtime.BaseAPI {
|
|
|
82
82
|
return yield response.value();
|
|
83
83
|
});
|
|
84
84
|
}
|
|
85
|
+
/**
|
|
86
|
+
* Read-only view list all installed models
|
|
87
|
+
*/
|
|
88
|
+
adminModelsListRaw(initOverrides) {
|
|
89
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
90
|
+
const queryParameters = {};
|
|
91
|
+
const headerParameters = {};
|
|
92
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
93
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
94
|
+
}
|
|
95
|
+
const response = yield this.request({
|
|
96
|
+
path: `/admin/models/`,
|
|
97
|
+
method: 'GET',
|
|
98
|
+
headers: headerParameters,
|
|
99
|
+
query: queryParameters,
|
|
100
|
+
}, initOverrides);
|
|
101
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(AppFromJSON));
|
|
102
|
+
});
|
|
103
|
+
}
|
|
104
|
+
/**
|
|
105
|
+
* Read-only view list all installed models
|
|
106
|
+
*/
|
|
107
|
+
adminModelsList(initOverrides) {
|
|
108
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
109
|
+
const response = yield this.adminModelsListRaw(initOverrides);
|
|
110
|
+
return yield response.value();
|
|
111
|
+
});
|
|
112
|
+
}
|
|
85
113
|
/**
|
|
86
114
|
* Get system information.
|
|
87
115
|
*/
|
|
@@ -883,6 +883,9 @@ export class PoliciesApi extends runtime.BaseAPI {
|
|
|
883
883
|
if (requestParameters.lastUpdated !== undefined) {
|
|
884
884
|
queryParameters['last_updated'] = requestParameters.lastUpdated.toISOString();
|
|
885
885
|
}
|
|
886
|
+
if (requestParameters.model !== undefined) {
|
|
887
|
+
queryParameters['model'] = requestParameters.model;
|
|
888
|
+
}
|
|
886
889
|
if (requestParameters.name !== undefined) {
|
|
887
890
|
queryParameters['name'] = requestParameters.name;
|
|
888
891
|
}
|
|
@@ -52,6 +52,7 @@ export interface SourcesLdapListRequest {
|
|
|
52
52
|
additionalUserDn?: string;
|
|
53
53
|
baseDn?: string;
|
|
54
54
|
bindCn?: string;
|
|
55
|
+
clientCertificate?: string;
|
|
55
56
|
enabled?: boolean;
|
|
56
57
|
groupMembershipField?: string;
|
|
57
58
|
groupObjectFilter?: string;
|
|
@@ -66,6 +67,7 @@ export interface SourcesLdapListRequest {
|
|
|
66
67
|
search?: string;
|
|
67
68
|
serverUri?: string;
|
|
68
69
|
slug?: string;
|
|
70
|
+
sni?: boolean;
|
|
69
71
|
startTls?: boolean;
|
|
70
72
|
syncGroups?: boolean;
|
|
71
73
|
syncParentGroup?: string;
|
|
@@ -422,6 +422,9 @@ export class SourcesApi extends runtime.BaseAPI {
|
|
|
422
422
|
if (requestParameters.bindCn !== undefined) {
|
|
423
423
|
queryParameters['bind_cn'] = requestParameters.bindCn;
|
|
424
424
|
}
|
|
425
|
+
if (requestParameters.clientCertificate !== undefined) {
|
|
426
|
+
queryParameters['client_certificate'] = requestParameters.clientCertificate;
|
|
427
|
+
}
|
|
425
428
|
if (requestParameters.enabled !== undefined) {
|
|
426
429
|
queryParameters['enabled'] = requestParameters.enabled;
|
|
427
430
|
}
|
|
@@ -464,6 +467,9 @@ export class SourcesApi extends runtime.BaseAPI {
|
|
|
464
467
|
if (requestParameters.slug !== undefined) {
|
|
465
468
|
queryParameters['slug'] = requestParameters.slug;
|
|
466
469
|
}
|
|
470
|
+
if (requestParameters.sni !== undefined) {
|
|
471
|
+
queryParameters['sni'] = requestParameters.sni;
|
|
472
|
+
}
|
|
467
473
|
if (requestParameters.startTls !== undefined) {
|
|
468
474
|
queryParameters['start_tls'] = requestParameters.startTls;
|
|
469
475
|
}
|
|
@@ -11,6 +11,7 @@
|
|
|
11
11
|
*/
|
|
12
12
|
import type { AppEnum } from './AppEnum';
|
|
13
13
|
import type { EventActions } from './EventActions';
|
|
14
|
+
import type { ModelEnum } from './ModelEnum';
|
|
14
15
|
/**
|
|
15
16
|
* Event Matcher Policy Serializer
|
|
16
17
|
* @export
|
|
@@ -83,6 +84,12 @@ export interface EventMatcherPolicy {
|
|
|
83
84
|
* @memberof EventMatcherPolicy
|
|
84
85
|
*/
|
|
85
86
|
app?: AppEnum;
|
|
87
|
+
/**
|
|
88
|
+
*
|
|
89
|
+
* @type {ModelEnum}
|
|
90
|
+
* @memberof EventMatcherPolicy
|
|
91
|
+
*/
|
|
92
|
+
model?: ModelEnum;
|
|
86
93
|
}
|
|
87
94
|
/**
|
|
88
95
|
* Check if a given object implements the EventMatcherPolicy interface.
|
|
@@ -14,6 +14,7 @@
|
|
|
14
14
|
import { exists } from '../runtime';
|
|
15
15
|
import { AppEnumFromJSON, AppEnumToJSON, } from './AppEnum';
|
|
16
16
|
import { EventActionsFromJSON, EventActionsToJSON, } from './EventActions';
|
|
17
|
+
import { ModelEnumFromJSON, ModelEnumToJSON, } from './ModelEnum';
|
|
17
18
|
/**
|
|
18
19
|
* Check if a given object implements the EventMatcherPolicy interface.
|
|
19
20
|
*/
|
|
@@ -47,6 +48,7 @@ export function EventMatcherPolicyFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
47
48
|
'action': !exists(json, 'action') ? undefined : EventActionsFromJSON(json['action']),
|
|
48
49
|
'clientIp': !exists(json, 'client_ip') ? undefined : json['client_ip'],
|
|
49
50
|
'app': !exists(json, 'app') ? undefined : AppEnumFromJSON(json['app']),
|
|
51
|
+
'model': !exists(json, 'model') ? undefined : ModelEnumFromJSON(json['model']),
|
|
50
52
|
};
|
|
51
53
|
}
|
|
52
54
|
export function EventMatcherPolicyToJSON(value) {
|
|
@@ -62,5 +64,6 @@ export function EventMatcherPolicyToJSON(value) {
|
|
|
62
64
|
'action': EventActionsToJSON(value.action),
|
|
63
65
|
'client_ip': value.clientIp,
|
|
64
66
|
'app': AppEnumToJSON(value.app),
|
|
67
|
+
'model': ModelEnumToJSON(value.model),
|
|
65
68
|
};
|
|
66
69
|
}
|
|
@@ -11,6 +11,7 @@
|
|
|
11
11
|
*/
|
|
12
12
|
import type { AppEnum } from './AppEnum';
|
|
13
13
|
import type { EventActions } from './EventActions';
|
|
14
|
+
import type { ModelEnum } from './ModelEnum';
|
|
14
15
|
/**
|
|
15
16
|
* Event Matcher Policy Serializer
|
|
16
17
|
* @export
|
|
@@ -47,6 +48,12 @@ export interface EventMatcherPolicyRequest {
|
|
|
47
48
|
* @memberof EventMatcherPolicyRequest
|
|
48
49
|
*/
|
|
49
50
|
app?: AppEnum;
|
|
51
|
+
/**
|
|
52
|
+
*
|
|
53
|
+
* @type {ModelEnum}
|
|
54
|
+
* @memberof EventMatcherPolicyRequest
|
|
55
|
+
*/
|
|
56
|
+
model?: ModelEnum;
|
|
50
57
|
}
|
|
51
58
|
/**
|
|
52
59
|
* Check if a given object implements the EventMatcherPolicyRequest interface.
|
|
@@ -14,6 +14,7 @@
|
|
|
14
14
|
import { exists } from '../runtime';
|
|
15
15
|
import { AppEnumFromJSON, AppEnumToJSON, } from './AppEnum';
|
|
16
16
|
import { EventActionsFromJSON, EventActionsToJSON, } from './EventActions';
|
|
17
|
+
import { ModelEnumFromJSON, ModelEnumToJSON, } from './ModelEnum';
|
|
17
18
|
/**
|
|
18
19
|
* Check if a given object implements the EventMatcherPolicyRequest interface.
|
|
19
20
|
*/
|
|
@@ -35,6 +36,7 @@ export function EventMatcherPolicyRequestFromJSONTyped(json, ignoreDiscriminator
|
|
|
35
36
|
'action': !exists(json, 'action') ? undefined : EventActionsFromJSON(json['action']),
|
|
36
37
|
'clientIp': !exists(json, 'client_ip') ? undefined : json['client_ip'],
|
|
37
38
|
'app': !exists(json, 'app') ? undefined : AppEnumFromJSON(json['app']),
|
|
39
|
+
'model': !exists(json, 'model') ? undefined : ModelEnumFromJSON(json['model']),
|
|
38
40
|
};
|
|
39
41
|
}
|
|
40
42
|
export function EventMatcherPolicyRequestToJSON(value) {
|
|
@@ -50,5 +52,6 @@ export function EventMatcherPolicyRequestToJSON(value) {
|
|
|
50
52
|
'action': EventActionsToJSON(value.action),
|
|
51
53
|
'client_ip': value.clientIp,
|
|
52
54
|
'app': AppEnumToJSON(value.app),
|
|
55
|
+
'model': ModelEnumToJSON(value.model),
|
|
53
56
|
};
|
|
54
57
|
}
|
|
@@ -120,6 +120,12 @@ export interface LDAPSource {
|
|
|
120
120
|
* @memberof LDAPSource
|
|
121
121
|
*/
|
|
122
122
|
peerCertificate?: string | null;
|
|
123
|
+
/**
|
|
124
|
+
* Client certificate to authenticate against the LDAP Server's Certificate.
|
|
125
|
+
* @type {string}
|
|
126
|
+
* @memberof LDAPSource
|
|
127
|
+
*/
|
|
128
|
+
clientCertificate?: string | null;
|
|
123
129
|
/**
|
|
124
130
|
*
|
|
125
131
|
* @type {string}
|
|
@@ -132,6 +138,12 @@ export interface LDAPSource {
|
|
|
132
138
|
* @memberof LDAPSource
|
|
133
139
|
*/
|
|
134
140
|
startTls?: boolean;
|
|
141
|
+
/**
|
|
142
|
+
*
|
|
143
|
+
* @type {boolean}
|
|
144
|
+
* @memberof LDAPSource
|
|
145
|
+
*/
|
|
146
|
+
sni?: boolean;
|
|
135
147
|
/**
|
|
136
148
|
*
|
|
137
149
|
* @type {string}
|
|
@@ -57,8 +57,10 @@ export function LDAPSourceFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
57
57
|
'icon': json['icon'],
|
|
58
58
|
'serverUri': json['server_uri'],
|
|
59
59
|
'peerCertificate': !exists(json, 'peer_certificate') ? undefined : json['peer_certificate'],
|
|
60
|
+
'clientCertificate': !exists(json, 'client_certificate') ? undefined : json['client_certificate'],
|
|
60
61
|
'bindCn': !exists(json, 'bind_cn') ? undefined : json['bind_cn'],
|
|
61
62
|
'startTls': !exists(json, 'start_tls') ? undefined : json['start_tls'],
|
|
63
|
+
'sni': !exists(json, 'sni') ? undefined : json['sni'],
|
|
62
64
|
'baseDn': json['base_dn'],
|
|
63
65
|
'additionalUserDn': !exists(json, 'additional_user_dn') ? undefined : json['additional_user_dn'],
|
|
64
66
|
'additionalGroupDn': !exists(json, 'additional_group_dn') ? undefined : json['additional_group_dn'],
|
|
@@ -92,8 +94,10 @@ export function LDAPSourceToJSON(value) {
|
|
|
92
94
|
'user_path_template': value.userPathTemplate,
|
|
93
95
|
'server_uri': value.serverUri,
|
|
94
96
|
'peer_certificate': value.peerCertificate,
|
|
97
|
+
'client_certificate': value.clientCertificate,
|
|
95
98
|
'bind_cn': value.bindCn,
|
|
96
99
|
'start_tls': value.startTls,
|
|
100
|
+
'sni': value.sni,
|
|
97
101
|
'base_dn': value.baseDn,
|
|
98
102
|
'additional_user_dn': value.additionalUserDn,
|
|
99
103
|
'additional_group_dn': value.additionalGroupDn,
|
|
@@ -77,6 +77,12 @@ export interface LDAPSourceRequest {
|
|
|
77
77
|
* @memberof LDAPSourceRequest
|
|
78
78
|
*/
|
|
79
79
|
peerCertificate?: string | null;
|
|
80
|
+
/**
|
|
81
|
+
* Client certificate to authenticate against the LDAP Server's Certificate.
|
|
82
|
+
* @type {string}
|
|
83
|
+
* @memberof LDAPSourceRequest
|
|
84
|
+
*/
|
|
85
|
+
clientCertificate?: string | null;
|
|
80
86
|
/**
|
|
81
87
|
*
|
|
82
88
|
* @type {string}
|
|
@@ -95,6 +101,12 @@ export interface LDAPSourceRequest {
|
|
|
95
101
|
* @memberof LDAPSourceRequest
|
|
96
102
|
*/
|
|
97
103
|
startTls?: boolean;
|
|
104
|
+
/**
|
|
105
|
+
*
|
|
106
|
+
* @type {boolean}
|
|
107
|
+
* @memberof LDAPSourceRequest
|
|
108
|
+
*/
|
|
109
|
+
sni?: boolean;
|
|
98
110
|
/**
|
|
99
111
|
*
|
|
100
112
|
* @type {string}
|
|
@@ -43,9 +43,11 @@ export function LDAPSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
43
43
|
'userPathTemplate': !exists(json, 'user_path_template') ? undefined : json['user_path_template'],
|
|
44
44
|
'serverUri': json['server_uri'],
|
|
45
45
|
'peerCertificate': !exists(json, 'peer_certificate') ? undefined : json['peer_certificate'],
|
|
46
|
+
'clientCertificate': !exists(json, 'client_certificate') ? undefined : json['client_certificate'],
|
|
46
47
|
'bindCn': !exists(json, 'bind_cn') ? undefined : json['bind_cn'],
|
|
47
48
|
'bindPassword': !exists(json, 'bind_password') ? undefined : json['bind_password'],
|
|
48
49
|
'startTls': !exists(json, 'start_tls') ? undefined : json['start_tls'],
|
|
50
|
+
'sni': !exists(json, 'sni') ? undefined : json['sni'],
|
|
49
51
|
'baseDn': json['base_dn'],
|
|
50
52
|
'additionalUserDn': !exists(json, 'additional_user_dn') ? undefined : json['additional_user_dn'],
|
|
51
53
|
'additionalGroupDn': !exists(json, 'additional_group_dn') ? undefined : json['additional_group_dn'],
|
|
@@ -79,9 +81,11 @@ export function LDAPSourceRequestToJSON(value) {
|
|
|
79
81
|
'user_path_template': value.userPathTemplate,
|
|
80
82
|
'server_uri': value.serverUri,
|
|
81
83
|
'peer_certificate': value.peerCertificate,
|
|
84
|
+
'client_certificate': value.clientCertificate,
|
|
82
85
|
'bind_cn': value.bindCn,
|
|
83
86
|
'bind_password': value.bindPassword,
|
|
84
87
|
'start_tls': value.startTls,
|
|
88
|
+
'sni': value.sni,
|
|
85
89
|
'base_dn': value.baseDn,
|
|
86
90
|
'additional_user_dn': value.additionalUserDn,
|
|
87
91
|
'additional_group_dn': value.additionalGroupDn,
|
|
@@ -0,0 +1,161 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2023.5.3
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
* * `authentik_crypto.certificatekeypair` - Certificate-Key Pair
|
|
14
|
+
* * `authentik_events.event` - Event
|
|
15
|
+
* * `authentik_events.notificationtransport` - Notification Transport
|
|
16
|
+
* * `authentik_events.notification` - Notification
|
|
17
|
+
* * `authentik_events.notificationrule` - Notification Rule
|
|
18
|
+
* * `authentik_events.notificationwebhookmapping` - Webhook Mapping
|
|
19
|
+
* * `authentik_flows.flow` - Flow
|
|
20
|
+
* * `authentik_flows.flowstagebinding` - Flow Stage Binding
|
|
21
|
+
* * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection
|
|
22
|
+
* * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection
|
|
23
|
+
* * `authentik_outposts.outpost` - outpost
|
|
24
|
+
* * `authentik_policies_dummy.dummypolicy` - Dummy Policy
|
|
25
|
+
* * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy
|
|
26
|
+
* * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy
|
|
27
|
+
* * `authentik_policies_expression.expressionpolicy` - Expression Policy
|
|
28
|
+
* * `authentik_policies_password.passwordpolicy` - Password Policy
|
|
29
|
+
* * `authentik_policies_reputation.reputationpolicy` - Reputation Policy
|
|
30
|
+
* * `authentik_policies_reputation.reputation` - reputation
|
|
31
|
+
* * `authentik_policies.policybinding` - Policy Binding
|
|
32
|
+
* * `authentik_providers_ldap.ldapprovider` - LDAP Provider
|
|
33
|
+
* * `authentik_providers_oauth2.scopemapping` - Scope Mapping
|
|
34
|
+
* * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
|
|
35
|
+
* * `authentik_providers_oauth2.authorizationcode` - Authorization Code
|
|
36
|
+
* * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
|
|
37
|
+
* * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
|
|
38
|
+
* * `authentik_providers_proxy.proxyprovider` - Proxy Provider
|
|
39
|
+
* * `authentik_providers_radius.radiusprovider` - Radius Provider
|
|
40
|
+
* * `authentik_providers_saml.samlprovider` - SAML Provider
|
|
41
|
+
* * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping
|
|
42
|
+
* * `authentik_providers_scim.scimprovider` - SCIM Provider
|
|
43
|
+
* * `authentik_providers_scim.scimmapping` - SCIM Mapping
|
|
44
|
+
* * `authentik_sources_ldap.ldapsource` - LDAP Source
|
|
45
|
+
* * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping
|
|
46
|
+
* * `authentik_sources_oauth.oauthsource` - OAuth Source
|
|
47
|
+
* * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection
|
|
48
|
+
* * `authentik_sources_plex.plexsource` - Plex Source
|
|
49
|
+
* * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection
|
|
50
|
+
* * `authentik_sources_saml.samlsource` - SAML Source
|
|
51
|
+
* * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
|
|
52
|
+
* * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
|
|
53
|
+
* * `authentik_stages_authenticator_duo.duodevice` - Duo Device
|
|
54
|
+
* * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
|
|
55
|
+
* * `authentik_stages_authenticator_sms.smsdevice` - SMS Device
|
|
56
|
+
* * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
|
|
57
|
+
* * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
|
|
58
|
+
* * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage
|
|
59
|
+
* * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage
|
|
60
|
+
* * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device
|
|
61
|
+
* * `authentik_stages_captcha.captchastage` - Captcha Stage
|
|
62
|
+
* * `authentik_stages_consent.consentstage` - Consent Stage
|
|
63
|
+
* * `authentik_stages_consent.userconsent` - User Consent
|
|
64
|
+
* * `authentik_stages_deny.denystage` - Deny Stage
|
|
65
|
+
* * `authentik_stages_dummy.dummystage` - Dummy Stage
|
|
66
|
+
* * `authentik_stages_email.emailstage` - Email Stage
|
|
67
|
+
* * `authentik_stages_identification.identificationstage` - Identification Stage
|
|
68
|
+
* * `authentik_stages_invitation.invitationstage` - Invitation Stage
|
|
69
|
+
* * `authentik_stages_invitation.invitation` - Invitation
|
|
70
|
+
* * `authentik_stages_password.passwordstage` - Password Stage
|
|
71
|
+
* * `authentik_stages_prompt.prompt` - Prompt
|
|
72
|
+
* * `authentik_stages_prompt.promptstage` - Prompt Stage
|
|
73
|
+
* * `authentik_stages_user_delete.userdeletestage` - User Delete Stage
|
|
74
|
+
* * `authentik_stages_user_login.userloginstage` - User Login Stage
|
|
75
|
+
* * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage
|
|
76
|
+
* * `authentik_stages_user_write.userwritestage` - User Write Stage
|
|
77
|
+
* * `authentik_tenants.tenant` - Tenant
|
|
78
|
+
* * `authentik_blueprints.blueprintinstance` - Blueprint Instance
|
|
79
|
+
* * `authentik_core.group` - group
|
|
80
|
+
* * `authentik_core.user` - User
|
|
81
|
+
* * `authentik_core.application` - Application
|
|
82
|
+
* * `authentik_core.token` - Token
|
|
83
|
+
* @export
|
|
84
|
+
*/
|
|
85
|
+
export declare const ModelEnum: {
|
|
86
|
+
readonly CryptoCertificatekeypair: "authentik_crypto.certificatekeypair";
|
|
87
|
+
readonly EventsEvent: "authentik_events.event";
|
|
88
|
+
readonly EventsNotificationtransport: "authentik_events.notificationtransport";
|
|
89
|
+
readonly EventsNotification: "authentik_events.notification";
|
|
90
|
+
readonly EventsNotificationrule: "authentik_events.notificationrule";
|
|
91
|
+
readonly EventsNotificationwebhookmapping: "authentik_events.notificationwebhookmapping";
|
|
92
|
+
readonly FlowsFlow: "authentik_flows.flow";
|
|
93
|
+
readonly FlowsFlowstagebinding: "authentik_flows.flowstagebinding";
|
|
94
|
+
readonly OutpostsDockerserviceconnection: "authentik_outposts.dockerserviceconnection";
|
|
95
|
+
readonly OutpostsKubernetesserviceconnection: "authentik_outposts.kubernetesserviceconnection";
|
|
96
|
+
readonly OutpostsOutpost: "authentik_outposts.outpost";
|
|
97
|
+
readonly PoliciesDummyDummypolicy: "authentik_policies_dummy.dummypolicy";
|
|
98
|
+
readonly PoliciesEventMatcherEventmatcherpolicy: "authentik_policies_event_matcher.eventmatcherpolicy";
|
|
99
|
+
readonly PoliciesExpiryPasswordexpirypolicy: "authentik_policies_expiry.passwordexpirypolicy";
|
|
100
|
+
readonly PoliciesExpressionExpressionpolicy: "authentik_policies_expression.expressionpolicy";
|
|
101
|
+
readonly PoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
|
|
102
|
+
readonly PoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
|
|
103
|
+
readonly PoliciesReputationReputation: "authentik_policies_reputation.reputation";
|
|
104
|
+
readonly PoliciesPolicybinding: "authentik_policies.policybinding";
|
|
105
|
+
readonly ProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
|
|
106
|
+
readonly ProvidersOauth2Scopemapping: "authentik_providers_oauth2.scopemapping";
|
|
107
|
+
readonly ProvidersOauth2Oauth2provider: "authentik_providers_oauth2.oauth2provider";
|
|
108
|
+
readonly ProvidersOauth2Authorizationcode: "authentik_providers_oauth2.authorizationcode";
|
|
109
|
+
readonly ProvidersOauth2Accesstoken: "authentik_providers_oauth2.accesstoken";
|
|
110
|
+
readonly ProvidersOauth2Refreshtoken: "authentik_providers_oauth2.refreshtoken";
|
|
111
|
+
readonly ProvidersProxyProxyprovider: "authentik_providers_proxy.proxyprovider";
|
|
112
|
+
readonly ProvidersRadiusRadiusprovider: "authentik_providers_radius.radiusprovider";
|
|
113
|
+
readonly ProvidersSamlSamlprovider: "authentik_providers_saml.samlprovider";
|
|
114
|
+
readonly ProvidersSamlSamlpropertymapping: "authentik_providers_saml.samlpropertymapping";
|
|
115
|
+
readonly ProvidersScimScimprovider: "authentik_providers_scim.scimprovider";
|
|
116
|
+
readonly ProvidersScimScimmapping: "authentik_providers_scim.scimmapping";
|
|
117
|
+
readonly SourcesLdapLdapsource: "authentik_sources_ldap.ldapsource";
|
|
118
|
+
readonly SourcesLdapLdappropertymapping: "authentik_sources_ldap.ldappropertymapping";
|
|
119
|
+
readonly SourcesOauthOauthsource: "authentik_sources_oauth.oauthsource";
|
|
120
|
+
readonly SourcesOauthUseroauthsourceconnection: "authentik_sources_oauth.useroauthsourceconnection";
|
|
121
|
+
readonly SourcesPlexPlexsource: "authentik_sources_plex.plexsource";
|
|
122
|
+
readonly SourcesPlexPlexsourceconnection: "authentik_sources_plex.plexsourceconnection";
|
|
123
|
+
readonly SourcesSamlSamlsource: "authentik_sources_saml.samlsource";
|
|
124
|
+
readonly SourcesSamlUsersamlsourceconnection: "authentik_sources_saml.usersamlsourceconnection";
|
|
125
|
+
readonly StagesAuthenticatorDuoAuthenticatorduostage: "authentik_stages_authenticator_duo.authenticatorduostage";
|
|
126
|
+
readonly StagesAuthenticatorDuoDuodevice: "authentik_stages_authenticator_duo.duodevice";
|
|
127
|
+
readonly StagesAuthenticatorSmsAuthenticatorsmsstage: "authentik_stages_authenticator_sms.authenticatorsmsstage";
|
|
128
|
+
readonly StagesAuthenticatorSmsSmsdevice: "authentik_stages_authenticator_sms.smsdevice";
|
|
129
|
+
readonly StagesAuthenticatorStaticAuthenticatorstaticstage: "authentik_stages_authenticator_static.authenticatorstaticstage";
|
|
130
|
+
readonly StagesAuthenticatorTotpAuthenticatortotpstage: "authentik_stages_authenticator_totp.authenticatortotpstage";
|
|
131
|
+
readonly StagesAuthenticatorValidateAuthenticatorvalidatestage: "authentik_stages_authenticator_validate.authenticatorvalidatestage";
|
|
132
|
+
readonly StagesAuthenticatorWebauthnAuthenticatewebauthnstage: "authentik_stages_authenticator_webauthn.authenticatewebauthnstage";
|
|
133
|
+
readonly StagesAuthenticatorWebauthnWebauthndevice: "authentik_stages_authenticator_webauthn.webauthndevice";
|
|
134
|
+
readonly StagesCaptchaCaptchastage: "authentik_stages_captcha.captchastage";
|
|
135
|
+
readonly StagesConsentConsentstage: "authentik_stages_consent.consentstage";
|
|
136
|
+
readonly StagesConsentUserconsent: "authentik_stages_consent.userconsent";
|
|
137
|
+
readonly StagesDenyDenystage: "authentik_stages_deny.denystage";
|
|
138
|
+
readonly StagesDummyDummystage: "authentik_stages_dummy.dummystage";
|
|
139
|
+
readonly StagesEmailEmailstage: "authentik_stages_email.emailstage";
|
|
140
|
+
readonly StagesIdentificationIdentificationstage: "authentik_stages_identification.identificationstage";
|
|
141
|
+
readonly StagesInvitationInvitationstage: "authentik_stages_invitation.invitationstage";
|
|
142
|
+
readonly StagesInvitationInvitation: "authentik_stages_invitation.invitation";
|
|
143
|
+
readonly StagesPasswordPasswordstage: "authentik_stages_password.passwordstage";
|
|
144
|
+
readonly StagesPromptPrompt: "authentik_stages_prompt.prompt";
|
|
145
|
+
readonly StagesPromptPromptstage: "authentik_stages_prompt.promptstage";
|
|
146
|
+
readonly StagesUserDeleteUserdeletestage: "authentik_stages_user_delete.userdeletestage";
|
|
147
|
+
readonly StagesUserLoginUserloginstage: "authentik_stages_user_login.userloginstage";
|
|
148
|
+
readonly StagesUserLogoutUserlogoutstage: "authentik_stages_user_logout.userlogoutstage";
|
|
149
|
+
readonly StagesUserWriteUserwritestage: "authentik_stages_user_write.userwritestage";
|
|
150
|
+
readonly TenantsTenant: "authentik_tenants.tenant";
|
|
151
|
+
readonly BlueprintsBlueprintinstance: "authentik_blueprints.blueprintinstance";
|
|
152
|
+
readonly CoreGroup: "authentik_core.group";
|
|
153
|
+
readonly CoreUser: "authentik_core.user";
|
|
154
|
+
readonly CoreApplication: "authentik_core.application";
|
|
155
|
+
readonly CoreToken: "authentik_core.token";
|
|
156
|
+
readonly UnknownDefaultOpenApi: "11184809";
|
|
157
|
+
};
|
|
158
|
+
export type ModelEnum = typeof ModelEnum[keyof typeof ModelEnum];
|
|
159
|
+
export declare function ModelEnumFromJSON(json: any): ModelEnum;
|
|
160
|
+
export declare function ModelEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): ModelEnum;
|
|
161
|
+
export declare function ModelEnumToJSON(value?: ModelEnum | null): any;
|