@goauthentik/api 2023.5.3-1685646044 → 2023.5.3-1686600706
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +1 -0
- package/dist/apis/AdminApi.d.ts +8 -0
- package/dist/apis/AdminApi.js +28 -0
- package/dist/apis/PoliciesApi.d.ts +1 -0
- package/dist/apis/PoliciesApi.js +3 -0
- package/dist/apis/SourcesApi.d.ts +2 -0
- package/dist/apis/SourcesApi.js +6 -0
- package/dist/esm/apis/AdminApi.d.ts +8 -0
- package/dist/esm/apis/AdminApi.js +28 -0
- package/dist/esm/apis/PoliciesApi.d.ts +1 -0
- package/dist/esm/apis/PoliciesApi.js +3 -0
- package/dist/esm/apis/SourcesApi.d.ts +2 -0
- package/dist/esm/apis/SourcesApi.js +6 -0
- package/dist/esm/models/EventMatcherPolicy.d.ts +7 -0
- package/dist/esm/models/EventMatcherPolicy.js +3 -0
- package/dist/esm/models/EventMatcherPolicyRequest.d.ts +7 -0
- package/dist/esm/models/EventMatcherPolicyRequest.js +3 -0
- package/dist/esm/models/LDAPSource.d.ts +12 -0
- package/dist/esm/models/LDAPSource.js +4 -0
- package/dist/esm/models/LDAPSourceRequest.d.ts +12 -0
- package/dist/esm/models/LDAPSourceRequest.js +4 -0
- package/dist/esm/models/ModelEnum.d.ts +161 -0
- package/dist/esm/models/ModelEnum.js +168 -0
- package/dist/esm/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
- package/dist/esm/models/PatchedEventMatcherPolicyRequest.js +3 -0
- package/dist/esm/models/PatchedLDAPSourceRequest.d.ts +12 -0
- package/dist/esm/models/PatchedLDAPSourceRequest.js +4 -0
- package/dist/esm/models/index.d.ts +1 -0
- package/dist/esm/models/index.js +1 -0
- package/dist/models/EventMatcherPolicy.d.ts +7 -0
- package/dist/models/EventMatcherPolicy.js +3 -0
- package/dist/models/EventMatcherPolicyRequest.d.ts +7 -0
- package/dist/models/EventMatcherPolicyRequest.js +3 -0
- package/dist/models/LDAPSource.d.ts +12 -0
- package/dist/models/LDAPSource.js +4 -0
- package/dist/models/LDAPSourceRequest.d.ts +12 -0
- package/dist/models/LDAPSourceRequest.js +4 -0
- package/dist/models/ModelEnum.d.ts +161 -0
- package/dist/models/ModelEnum.js +174 -0
- package/dist/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
- package/dist/models/PatchedEventMatcherPolicyRequest.js +3 -0
- package/dist/models/PatchedLDAPSourceRequest.d.ts +12 -0
- package/dist/models/PatchedLDAPSourceRequest.js +4 -0
- package/dist/models/index.d.ts +1 -0
- package/dist/models/index.js +1 -0
- package/package.json +1 -1
- package/src/apis/AdminApi.ts +30 -0
- package/src/apis/PoliciesApi.ts +5 -0
- package/src/apis/SourcesApi.ts +10 -0
- package/src/models/EventMatcherPolicy.ts +14 -0
- package/src/models/EventMatcherPolicyRequest.ts +14 -0
- package/src/models/LDAPSource.ts +16 -0
- package/src/models/LDAPSourceRequest.ts +16 -0
- package/src/models/ModelEnum.ts +176 -0
- package/src/models/PatchedEventMatcherPolicyRequest.ts +14 -0
- package/src/models/PatchedLDAPSourceRequest.ts +16 -0
- package/src/models/index.ts +1 -0
|
@@ -0,0 +1,168 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* authentik
|
|
5
|
+
* Making authentication simple.
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 2023.5.3
|
|
8
|
+
* Contact: hello@goauthentik.io
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
/**
|
|
15
|
+
* * `authentik_crypto.certificatekeypair` - Certificate-Key Pair
|
|
16
|
+
* * `authentik_events.event` - Event
|
|
17
|
+
* * `authentik_events.notificationtransport` - Notification Transport
|
|
18
|
+
* * `authentik_events.notification` - Notification
|
|
19
|
+
* * `authentik_events.notificationrule` - Notification Rule
|
|
20
|
+
* * `authentik_events.notificationwebhookmapping` - Webhook Mapping
|
|
21
|
+
* * `authentik_flows.flow` - Flow
|
|
22
|
+
* * `authentik_flows.flowstagebinding` - Flow Stage Binding
|
|
23
|
+
* * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection
|
|
24
|
+
* * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection
|
|
25
|
+
* * `authentik_outposts.outpost` - outpost
|
|
26
|
+
* * `authentik_policies_dummy.dummypolicy` - Dummy Policy
|
|
27
|
+
* * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy
|
|
28
|
+
* * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy
|
|
29
|
+
* * `authentik_policies_expression.expressionpolicy` - Expression Policy
|
|
30
|
+
* * `authentik_policies_password.passwordpolicy` - Password Policy
|
|
31
|
+
* * `authentik_policies_reputation.reputationpolicy` - Reputation Policy
|
|
32
|
+
* * `authentik_policies_reputation.reputation` - reputation
|
|
33
|
+
* * `authentik_policies.policybinding` - Policy Binding
|
|
34
|
+
* * `authentik_providers_ldap.ldapprovider` - LDAP Provider
|
|
35
|
+
* * `authentik_providers_oauth2.scopemapping` - Scope Mapping
|
|
36
|
+
* * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
|
|
37
|
+
* * `authentik_providers_oauth2.authorizationcode` - Authorization Code
|
|
38
|
+
* * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
|
|
39
|
+
* * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
|
|
40
|
+
* * `authentik_providers_proxy.proxyprovider` - Proxy Provider
|
|
41
|
+
* * `authentik_providers_radius.radiusprovider` - Radius Provider
|
|
42
|
+
* * `authentik_providers_saml.samlprovider` - SAML Provider
|
|
43
|
+
* * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping
|
|
44
|
+
* * `authentik_providers_scim.scimprovider` - SCIM Provider
|
|
45
|
+
* * `authentik_providers_scim.scimmapping` - SCIM Mapping
|
|
46
|
+
* * `authentik_sources_ldap.ldapsource` - LDAP Source
|
|
47
|
+
* * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping
|
|
48
|
+
* * `authentik_sources_oauth.oauthsource` - OAuth Source
|
|
49
|
+
* * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection
|
|
50
|
+
* * `authentik_sources_plex.plexsource` - Plex Source
|
|
51
|
+
* * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection
|
|
52
|
+
* * `authentik_sources_saml.samlsource` - SAML Source
|
|
53
|
+
* * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
|
|
54
|
+
* * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
|
|
55
|
+
* * `authentik_stages_authenticator_duo.duodevice` - Duo Device
|
|
56
|
+
* * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
|
|
57
|
+
* * `authentik_stages_authenticator_sms.smsdevice` - SMS Device
|
|
58
|
+
* * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
|
|
59
|
+
* * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
|
|
60
|
+
* * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage
|
|
61
|
+
* * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage
|
|
62
|
+
* * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device
|
|
63
|
+
* * `authentik_stages_captcha.captchastage` - Captcha Stage
|
|
64
|
+
* * `authentik_stages_consent.consentstage` - Consent Stage
|
|
65
|
+
* * `authentik_stages_consent.userconsent` - User Consent
|
|
66
|
+
* * `authentik_stages_deny.denystage` - Deny Stage
|
|
67
|
+
* * `authentik_stages_dummy.dummystage` - Dummy Stage
|
|
68
|
+
* * `authentik_stages_email.emailstage` - Email Stage
|
|
69
|
+
* * `authentik_stages_identification.identificationstage` - Identification Stage
|
|
70
|
+
* * `authentik_stages_invitation.invitationstage` - Invitation Stage
|
|
71
|
+
* * `authentik_stages_invitation.invitation` - Invitation
|
|
72
|
+
* * `authentik_stages_password.passwordstage` - Password Stage
|
|
73
|
+
* * `authentik_stages_prompt.prompt` - Prompt
|
|
74
|
+
* * `authentik_stages_prompt.promptstage` - Prompt Stage
|
|
75
|
+
* * `authentik_stages_user_delete.userdeletestage` - User Delete Stage
|
|
76
|
+
* * `authentik_stages_user_login.userloginstage` - User Login Stage
|
|
77
|
+
* * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage
|
|
78
|
+
* * `authentik_stages_user_write.userwritestage` - User Write Stage
|
|
79
|
+
* * `authentik_tenants.tenant` - Tenant
|
|
80
|
+
* * `authentik_blueprints.blueprintinstance` - Blueprint Instance
|
|
81
|
+
* * `authentik_core.group` - group
|
|
82
|
+
* * `authentik_core.user` - User
|
|
83
|
+
* * `authentik_core.application` - Application
|
|
84
|
+
* * `authentik_core.token` - Token
|
|
85
|
+
* @export
|
|
86
|
+
*/
|
|
87
|
+
export const ModelEnum = {
|
|
88
|
+
CryptoCertificatekeypair: 'authentik_crypto.certificatekeypair',
|
|
89
|
+
EventsEvent: 'authentik_events.event',
|
|
90
|
+
EventsNotificationtransport: 'authentik_events.notificationtransport',
|
|
91
|
+
EventsNotification: 'authentik_events.notification',
|
|
92
|
+
EventsNotificationrule: 'authentik_events.notificationrule',
|
|
93
|
+
EventsNotificationwebhookmapping: 'authentik_events.notificationwebhookmapping',
|
|
94
|
+
FlowsFlow: 'authentik_flows.flow',
|
|
95
|
+
FlowsFlowstagebinding: 'authentik_flows.flowstagebinding',
|
|
96
|
+
OutpostsDockerserviceconnection: 'authentik_outposts.dockerserviceconnection',
|
|
97
|
+
OutpostsKubernetesserviceconnection: 'authentik_outposts.kubernetesserviceconnection',
|
|
98
|
+
OutpostsOutpost: 'authentik_outposts.outpost',
|
|
99
|
+
PoliciesDummyDummypolicy: 'authentik_policies_dummy.dummypolicy',
|
|
100
|
+
PoliciesEventMatcherEventmatcherpolicy: 'authentik_policies_event_matcher.eventmatcherpolicy',
|
|
101
|
+
PoliciesExpiryPasswordexpirypolicy: 'authentik_policies_expiry.passwordexpirypolicy',
|
|
102
|
+
PoliciesExpressionExpressionpolicy: 'authentik_policies_expression.expressionpolicy',
|
|
103
|
+
PoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
104
|
+
PoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
105
|
+
PoliciesReputationReputation: 'authentik_policies_reputation.reputation',
|
|
106
|
+
PoliciesPolicybinding: 'authentik_policies.policybinding',
|
|
107
|
+
ProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
|
108
|
+
ProvidersOauth2Scopemapping: 'authentik_providers_oauth2.scopemapping',
|
|
109
|
+
ProvidersOauth2Oauth2provider: 'authentik_providers_oauth2.oauth2provider',
|
|
110
|
+
ProvidersOauth2Authorizationcode: 'authentik_providers_oauth2.authorizationcode',
|
|
111
|
+
ProvidersOauth2Accesstoken: 'authentik_providers_oauth2.accesstoken',
|
|
112
|
+
ProvidersOauth2Refreshtoken: 'authentik_providers_oauth2.refreshtoken',
|
|
113
|
+
ProvidersProxyProxyprovider: 'authentik_providers_proxy.proxyprovider',
|
|
114
|
+
ProvidersRadiusRadiusprovider: 'authentik_providers_radius.radiusprovider',
|
|
115
|
+
ProvidersSamlSamlprovider: 'authentik_providers_saml.samlprovider',
|
|
116
|
+
ProvidersSamlSamlpropertymapping: 'authentik_providers_saml.samlpropertymapping',
|
|
117
|
+
ProvidersScimScimprovider: 'authentik_providers_scim.scimprovider',
|
|
118
|
+
ProvidersScimScimmapping: 'authentik_providers_scim.scimmapping',
|
|
119
|
+
SourcesLdapLdapsource: 'authentik_sources_ldap.ldapsource',
|
|
120
|
+
SourcesLdapLdappropertymapping: 'authentik_sources_ldap.ldappropertymapping',
|
|
121
|
+
SourcesOauthOauthsource: 'authentik_sources_oauth.oauthsource',
|
|
122
|
+
SourcesOauthUseroauthsourceconnection: 'authentik_sources_oauth.useroauthsourceconnection',
|
|
123
|
+
SourcesPlexPlexsource: 'authentik_sources_plex.plexsource',
|
|
124
|
+
SourcesPlexPlexsourceconnection: 'authentik_sources_plex.plexsourceconnection',
|
|
125
|
+
SourcesSamlSamlsource: 'authentik_sources_saml.samlsource',
|
|
126
|
+
SourcesSamlUsersamlsourceconnection: 'authentik_sources_saml.usersamlsourceconnection',
|
|
127
|
+
StagesAuthenticatorDuoAuthenticatorduostage: 'authentik_stages_authenticator_duo.authenticatorduostage',
|
|
128
|
+
StagesAuthenticatorDuoDuodevice: 'authentik_stages_authenticator_duo.duodevice',
|
|
129
|
+
StagesAuthenticatorSmsAuthenticatorsmsstage: 'authentik_stages_authenticator_sms.authenticatorsmsstage',
|
|
130
|
+
StagesAuthenticatorSmsSmsdevice: 'authentik_stages_authenticator_sms.smsdevice',
|
|
131
|
+
StagesAuthenticatorStaticAuthenticatorstaticstage: 'authentik_stages_authenticator_static.authenticatorstaticstage',
|
|
132
|
+
StagesAuthenticatorTotpAuthenticatortotpstage: 'authentik_stages_authenticator_totp.authenticatortotpstage',
|
|
133
|
+
StagesAuthenticatorValidateAuthenticatorvalidatestage: 'authentik_stages_authenticator_validate.authenticatorvalidatestage',
|
|
134
|
+
StagesAuthenticatorWebauthnAuthenticatewebauthnstage: 'authentik_stages_authenticator_webauthn.authenticatewebauthnstage',
|
|
135
|
+
StagesAuthenticatorWebauthnWebauthndevice: 'authentik_stages_authenticator_webauthn.webauthndevice',
|
|
136
|
+
StagesCaptchaCaptchastage: 'authentik_stages_captcha.captchastage',
|
|
137
|
+
StagesConsentConsentstage: 'authentik_stages_consent.consentstage',
|
|
138
|
+
StagesConsentUserconsent: 'authentik_stages_consent.userconsent',
|
|
139
|
+
StagesDenyDenystage: 'authentik_stages_deny.denystage',
|
|
140
|
+
StagesDummyDummystage: 'authentik_stages_dummy.dummystage',
|
|
141
|
+
StagesEmailEmailstage: 'authentik_stages_email.emailstage',
|
|
142
|
+
StagesIdentificationIdentificationstage: 'authentik_stages_identification.identificationstage',
|
|
143
|
+
StagesInvitationInvitationstage: 'authentik_stages_invitation.invitationstage',
|
|
144
|
+
StagesInvitationInvitation: 'authentik_stages_invitation.invitation',
|
|
145
|
+
StagesPasswordPasswordstage: 'authentik_stages_password.passwordstage',
|
|
146
|
+
StagesPromptPrompt: 'authentik_stages_prompt.prompt',
|
|
147
|
+
StagesPromptPromptstage: 'authentik_stages_prompt.promptstage',
|
|
148
|
+
StagesUserDeleteUserdeletestage: 'authentik_stages_user_delete.userdeletestage',
|
|
149
|
+
StagesUserLoginUserloginstage: 'authentik_stages_user_login.userloginstage',
|
|
150
|
+
StagesUserLogoutUserlogoutstage: 'authentik_stages_user_logout.userlogoutstage',
|
|
151
|
+
StagesUserWriteUserwritestage: 'authentik_stages_user_write.userwritestage',
|
|
152
|
+
TenantsTenant: 'authentik_tenants.tenant',
|
|
153
|
+
BlueprintsBlueprintinstance: 'authentik_blueprints.blueprintinstance',
|
|
154
|
+
CoreGroup: 'authentik_core.group',
|
|
155
|
+
CoreUser: 'authentik_core.user',
|
|
156
|
+
CoreApplication: 'authentik_core.application',
|
|
157
|
+
CoreToken: 'authentik_core.token',
|
|
158
|
+
UnknownDefaultOpenApi: '11184809'
|
|
159
|
+
};
|
|
160
|
+
export function ModelEnumFromJSON(json) {
|
|
161
|
+
return ModelEnumFromJSONTyped(json, false);
|
|
162
|
+
}
|
|
163
|
+
export function ModelEnumFromJSONTyped(json, ignoreDiscriminator) {
|
|
164
|
+
return json;
|
|
165
|
+
}
|
|
166
|
+
export function ModelEnumToJSON(value) {
|
|
167
|
+
return value;
|
|
168
|
+
}
|
|
@@ -11,6 +11,7 @@
|
|
|
11
11
|
*/
|
|
12
12
|
import type { AppEnum } from './AppEnum';
|
|
13
13
|
import type { EventActions } from './EventActions';
|
|
14
|
+
import type { ModelEnum } from './ModelEnum';
|
|
14
15
|
/**
|
|
15
16
|
* Event Matcher Policy Serializer
|
|
16
17
|
* @export
|
|
@@ -47,6 +48,12 @@ export interface PatchedEventMatcherPolicyRequest {
|
|
|
47
48
|
* @memberof PatchedEventMatcherPolicyRequest
|
|
48
49
|
*/
|
|
49
50
|
app?: AppEnum;
|
|
51
|
+
/**
|
|
52
|
+
*
|
|
53
|
+
* @type {ModelEnum}
|
|
54
|
+
* @memberof PatchedEventMatcherPolicyRequest
|
|
55
|
+
*/
|
|
56
|
+
model?: ModelEnum;
|
|
50
57
|
}
|
|
51
58
|
/**
|
|
52
59
|
* Check if a given object implements the PatchedEventMatcherPolicyRequest interface.
|
|
@@ -14,6 +14,7 @@
|
|
|
14
14
|
import { exists } from '../runtime';
|
|
15
15
|
import { AppEnumFromJSON, AppEnumToJSON, } from './AppEnum';
|
|
16
16
|
import { EventActionsFromJSON, EventActionsToJSON, } from './EventActions';
|
|
17
|
+
import { ModelEnumFromJSON, ModelEnumToJSON, } from './ModelEnum';
|
|
17
18
|
/**
|
|
18
19
|
* Check if a given object implements the PatchedEventMatcherPolicyRequest interface.
|
|
19
20
|
*/
|
|
@@ -34,6 +35,7 @@ export function PatchedEventMatcherPolicyRequestFromJSONTyped(json, ignoreDiscri
|
|
|
34
35
|
'action': !exists(json, 'action') ? undefined : EventActionsFromJSON(json['action']),
|
|
35
36
|
'clientIp': !exists(json, 'client_ip') ? undefined : json['client_ip'],
|
|
36
37
|
'app': !exists(json, 'app') ? undefined : AppEnumFromJSON(json['app']),
|
|
38
|
+
'model': !exists(json, 'model') ? undefined : ModelEnumFromJSON(json['model']),
|
|
37
39
|
};
|
|
38
40
|
}
|
|
39
41
|
export function PatchedEventMatcherPolicyRequestToJSON(value) {
|
|
@@ -49,5 +51,6 @@ export function PatchedEventMatcherPolicyRequestToJSON(value) {
|
|
|
49
51
|
'action': EventActionsToJSON(value.action),
|
|
50
52
|
'client_ip': value.clientIp,
|
|
51
53
|
'app': AppEnumToJSON(value.app),
|
|
54
|
+
'model': ModelEnumToJSON(value.model),
|
|
52
55
|
};
|
|
53
56
|
}
|
|
@@ -77,6 +77,12 @@ export interface PatchedLDAPSourceRequest {
|
|
|
77
77
|
* @memberof PatchedLDAPSourceRequest
|
|
78
78
|
*/
|
|
79
79
|
peerCertificate?: string | null;
|
|
80
|
+
/**
|
|
81
|
+
* Client certificate to authenticate against the LDAP Server's Certificate.
|
|
82
|
+
* @type {string}
|
|
83
|
+
* @memberof PatchedLDAPSourceRequest
|
|
84
|
+
*/
|
|
85
|
+
clientCertificate?: string | null;
|
|
80
86
|
/**
|
|
81
87
|
*
|
|
82
88
|
* @type {string}
|
|
@@ -95,6 +101,12 @@ export interface PatchedLDAPSourceRequest {
|
|
|
95
101
|
* @memberof PatchedLDAPSourceRequest
|
|
96
102
|
*/
|
|
97
103
|
startTls?: boolean;
|
|
104
|
+
/**
|
|
105
|
+
*
|
|
106
|
+
* @type {boolean}
|
|
107
|
+
* @memberof PatchedLDAPSourceRequest
|
|
108
|
+
*/
|
|
109
|
+
sni?: boolean;
|
|
98
110
|
/**
|
|
99
111
|
*
|
|
100
112
|
* @type {string}
|
|
@@ -39,9 +39,11 @@ export function PatchedLDAPSourceRequestFromJSONTyped(json, ignoreDiscriminator)
|
|
|
39
39
|
'userPathTemplate': !exists(json, 'user_path_template') ? undefined : json['user_path_template'],
|
|
40
40
|
'serverUri': !exists(json, 'server_uri') ? undefined : json['server_uri'],
|
|
41
41
|
'peerCertificate': !exists(json, 'peer_certificate') ? undefined : json['peer_certificate'],
|
|
42
|
+
'clientCertificate': !exists(json, 'client_certificate') ? undefined : json['client_certificate'],
|
|
42
43
|
'bindCn': !exists(json, 'bind_cn') ? undefined : json['bind_cn'],
|
|
43
44
|
'bindPassword': !exists(json, 'bind_password') ? undefined : json['bind_password'],
|
|
44
45
|
'startTls': !exists(json, 'start_tls') ? undefined : json['start_tls'],
|
|
46
|
+
'sni': !exists(json, 'sni') ? undefined : json['sni'],
|
|
45
47
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
46
48
|
'additionalUserDn': !exists(json, 'additional_user_dn') ? undefined : json['additional_user_dn'],
|
|
47
49
|
'additionalGroupDn': !exists(json, 'additional_group_dn') ? undefined : json['additional_group_dn'],
|
|
@@ -75,9 +77,11 @@ export function PatchedLDAPSourceRequestToJSON(value) {
|
|
|
75
77
|
'user_path_template': value.userPathTemplate,
|
|
76
78
|
'server_uri': value.serverUri,
|
|
77
79
|
'peer_certificate': value.peerCertificate,
|
|
80
|
+
'client_certificate': value.clientCertificate,
|
|
78
81
|
'bind_cn': value.bindCn,
|
|
79
82
|
'bind_password': value.bindPassword,
|
|
80
83
|
'start_tls': value.startTls,
|
|
84
|
+
'sni': value.sni,
|
|
81
85
|
'base_dn': value.baseDn,
|
|
82
86
|
'additional_user_dn': value.additionalUserDn,
|
|
83
87
|
'additional_group_dn': value.additionalGroupDn,
|
|
@@ -154,6 +154,7 @@ export * from './LoginChallengeTypes';
|
|
|
154
154
|
export * from './LoginMetrics';
|
|
155
155
|
export * from './LoginSource';
|
|
156
156
|
export * from './Metadata';
|
|
157
|
+
export * from './ModelEnum';
|
|
157
158
|
export * from './NameIdPolicyEnum';
|
|
158
159
|
export * from './NotConfiguredActionEnum';
|
|
159
160
|
export * from './Notification';
|
package/dist/esm/models/index.js
CHANGED
|
@@ -156,6 +156,7 @@ export * from './LoginChallengeTypes';
|
|
|
156
156
|
export * from './LoginMetrics';
|
|
157
157
|
export * from './LoginSource';
|
|
158
158
|
export * from './Metadata';
|
|
159
|
+
export * from './ModelEnum';
|
|
159
160
|
export * from './NameIdPolicyEnum';
|
|
160
161
|
export * from './NotConfiguredActionEnum';
|
|
161
162
|
export * from './Notification';
|
|
@@ -11,6 +11,7 @@
|
|
|
11
11
|
*/
|
|
12
12
|
import type { AppEnum } from './AppEnum';
|
|
13
13
|
import type { EventActions } from './EventActions';
|
|
14
|
+
import type { ModelEnum } from './ModelEnum';
|
|
14
15
|
/**
|
|
15
16
|
* Event Matcher Policy Serializer
|
|
16
17
|
* @export
|
|
@@ -83,6 +84,12 @@ export interface EventMatcherPolicy {
|
|
|
83
84
|
* @memberof EventMatcherPolicy
|
|
84
85
|
*/
|
|
85
86
|
app?: AppEnum;
|
|
87
|
+
/**
|
|
88
|
+
*
|
|
89
|
+
* @type {ModelEnum}
|
|
90
|
+
* @memberof EventMatcherPolicy
|
|
91
|
+
*/
|
|
92
|
+
model?: ModelEnum;
|
|
86
93
|
}
|
|
87
94
|
/**
|
|
88
95
|
* Check if a given object implements the EventMatcherPolicy interface.
|
|
@@ -17,6 +17,7 @@ exports.EventMatcherPolicyToJSON = exports.EventMatcherPolicyFromJSONTyped = exp
|
|
|
17
17
|
const runtime_1 = require("../runtime");
|
|
18
18
|
const AppEnum_1 = require("./AppEnum");
|
|
19
19
|
const EventActions_1 = require("./EventActions");
|
|
20
|
+
const ModelEnum_1 = require("./ModelEnum");
|
|
20
21
|
/**
|
|
21
22
|
* Check if a given object implements the EventMatcherPolicy interface.
|
|
22
23
|
*/
|
|
@@ -52,6 +53,7 @@ function EventMatcherPolicyFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
52
53
|
'action': !(0, runtime_1.exists)(json, 'action') ? undefined : (0, EventActions_1.EventActionsFromJSON)(json['action']),
|
|
53
54
|
'clientIp': !(0, runtime_1.exists)(json, 'client_ip') ? undefined : json['client_ip'],
|
|
54
55
|
'app': !(0, runtime_1.exists)(json, 'app') ? undefined : (0, AppEnum_1.AppEnumFromJSON)(json['app']),
|
|
56
|
+
'model': !(0, runtime_1.exists)(json, 'model') ? undefined : (0, ModelEnum_1.ModelEnumFromJSON)(json['model']),
|
|
55
57
|
};
|
|
56
58
|
}
|
|
57
59
|
exports.EventMatcherPolicyFromJSONTyped = EventMatcherPolicyFromJSONTyped;
|
|
@@ -68,6 +70,7 @@ function EventMatcherPolicyToJSON(value) {
|
|
|
68
70
|
'action': (0, EventActions_1.EventActionsToJSON)(value.action),
|
|
69
71
|
'client_ip': value.clientIp,
|
|
70
72
|
'app': (0, AppEnum_1.AppEnumToJSON)(value.app),
|
|
73
|
+
'model': (0, ModelEnum_1.ModelEnumToJSON)(value.model),
|
|
71
74
|
};
|
|
72
75
|
}
|
|
73
76
|
exports.EventMatcherPolicyToJSON = EventMatcherPolicyToJSON;
|
|
@@ -11,6 +11,7 @@
|
|
|
11
11
|
*/
|
|
12
12
|
import type { AppEnum } from './AppEnum';
|
|
13
13
|
import type { EventActions } from './EventActions';
|
|
14
|
+
import type { ModelEnum } from './ModelEnum';
|
|
14
15
|
/**
|
|
15
16
|
* Event Matcher Policy Serializer
|
|
16
17
|
* @export
|
|
@@ -47,6 +48,12 @@ export interface EventMatcherPolicyRequest {
|
|
|
47
48
|
* @memberof EventMatcherPolicyRequest
|
|
48
49
|
*/
|
|
49
50
|
app?: AppEnum;
|
|
51
|
+
/**
|
|
52
|
+
*
|
|
53
|
+
* @type {ModelEnum}
|
|
54
|
+
* @memberof EventMatcherPolicyRequest
|
|
55
|
+
*/
|
|
56
|
+
model?: ModelEnum;
|
|
50
57
|
}
|
|
51
58
|
/**
|
|
52
59
|
* Check if a given object implements the EventMatcherPolicyRequest interface.
|
|
@@ -17,6 +17,7 @@ exports.EventMatcherPolicyRequestToJSON = exports.EventMatcherPolicyRequestFromJ
|
|
|
17
17
|
const runtime_1 = require("../runtime");
|
|
18
18
|
const AppEnum_1 = require("./AppEnum");
|
|
19
19
|
const EventActions_1 = require("./EventActions");
|
|
20
|
+
const ModelEnum_1 = require("./ModelEnum");
|
|
20
21
|
/**
|
|
21
22
|
* Check if a given object implements the EventMatcherPolicyRequest interface.
|
|
22
23
|
*/
|
|
@@ -40,6 +41,7 @@ function EventMatcherPolicyRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
40
41
|
'action': !(0, runtime_1.exists)(json, 'action') ? undefined : (0, EventActions_1.EventActionsFromJSON)(json['action']),
|
|
41
42
|
'clientIp': !(0, runtime_1.exists)(json, 'client_ip') ? undefined : json['client_ip'],
|
|
42
43
|
'app': !(0, runtime_1.exists)(json, 'app') ? undefined : (0, AppEnum_1.AppEnumFromJSON)(json['app']),
|
|
44
|
+
'model': !(0, runtime_1.exists)(json, 'model') ? undefined : (0, ModelEnum_1.ModelEnumFromJSON)(json['model']),
|
|
43
45
|
};
|
|
44
46
|
}
|
|
45
47
|
exports.EventMatcherPolicyRequestFromJSONTyped = EventMatcherPolicyRequestFromJSONTyped;
|
|
@@ -56,6 +58,7 @@ function EventMatcherPolicyRequestToJSON(value) {
|
|
|
56
58
|
'action': (0, EventActions_1.EventActionsToJSON)(value.action),
|
|
57
59
|
'client_ip': value.clientIp,
|
|
58
60
|
'app': (0, AppEnum_1.AppEnumToJSON)(value.app),
|
|
61
|
+
'model': (0, ModelEnum_1.ModelEnumToJSON)(value.model),
|
|
59
62
|
};
|
|
60
63
|
}
|
|
61
64
|
exports.EventMatcherPolicyRequestToJSON = EventMatcherPolicyRequestToJSON;
|
|
@@ -120,6 +120,12 @@ export interface LDAPSource {
|
|
|
120
120
|
* @memberof LDAPSource
|
|
121
121
|
*/
|
|
122
122
|
peerCertificate?: string | null;
|
|
123
|
+
/**
|
|
124
|
+
* Client certificate to authenticate against the LDAP Server's Certificate.
|
|
125
|
+
* @type {string}
|
|
126
|
+
* @memberof LDAPSource
|
|
127
|
+
*/
|
|
128
|
+
clientCertificate?: string | null;
|
|
123
129
|
/**
|
|
124
130
|
*
|
|
125
131
|
* @type {string}
|
|
@@ -132,6 +138,12 @@ export interface LDAPSource {
|
|
|
132
138
|
* @memberof LDAPSource
|
|
133
139
|
*/
|
|
134
140
|
startTls?: boolean;
|
|
141
|
+
/**
|
|
142
|
+
*
|
|
143
|
+
* @type {boolean}
|
|
144
|
+
* @memberof LDAPSource
|
|
145
|
+
*/
|
|
146
|
+
sni?: boolean;
|
|
135
147
|
/**
|
|
136
148
|
*
|
|
137
149
|
* @type {string}
|
|
@@ -62,8 +62,10 @@ function LDAPSourceFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
62
62
|
'icon': json['icon'],
|
|
63
63
|
'serverUri': json['server_uri'],
|
|
64
64
|
'peerCertificate': !(0, runtime_1.exists)(json, 'peer_certificate') ? undefined : json['peer_certificate'],
|
|
65
|
+
'clientCertificate': !(0, runtime_1.exists)(json, 'client_certificate') ? undefined : json['client_certificate'],
|
|
65
66
|
'bindCn': !(0, runtime_1.exists)(json, 'bind_cn') ? undefined : json['bind_cn'],
|
|
66
67
|
'startTls': !(0, runtime_1.exists)(json, 'start_tls') ? undefined : json['start_tls'],
|
|
68
|
+
'sni': !(0, runtime_1.exists)(json, 'sni') ? undefined : json['sni'],
|
|
67
69
|
'baseDn': json['base_dn'],
|
|
68
70
|
'additionalUserDn': !(0, runtime_1.exists)(json, 'additional_user_dn') ? undefined : json['additional_user_dn'],
|
|
69
71
|
'additionalGroupDn': !(0, runtime_1.exists)(json, 'additional_group_dn') ? undefined : json['additional_group_dn'],
|
|
@@ -98,8 +100,10 @@ function LDAPSourceToJSON(value) {
|
|
|
98
100
|
'user_path_template': value.userPathTemplate,
|
|
99
101
|
'server_uri': value.serverUri,
|
|
100
102
|
'peer_certificate': value.peerCertificate,
|
|
103
|
+
'client_certificate': value.clientCertificate,
|
|
101
104
|
'bind_cn': value.bindCn,
|
|
102
105
|
'start_tls': value.startTls,
|
|
106
|
+
'sni': value.sni,
|
|
103
107
|
'base_dn': value.baseDn,
|
|
104
108
|
'additional_user_dn': value.additionalUserDn,
|
|
105
109
|
'additional_group_dn': value.additionalGroupDn,
|
|
@@ -77,6 +77,12 @@ export interface LDAPSourceRequest {
|
|
|
77
77
|
* @memberof LDAPSourceRequest
|
|
78
78
|
*/
|
|
79
79
|
peerCertificate?: string | null;
|
|
80
|
+
/**
|
|
81
|
+
* Client certificate to authenticate against the LDAP Server's Certificate.
|
|
82
|
+
* @type {string}
|
|
83
|
+
* @memberof LDAPSourceRequest
|
|
84
|
+
*/
|
|
85
|
+
clientCertificate?: string | null;
|
|
80
86
|
/**
|
|
81
87
|
*
|
|
82
88
|
* @type {string}
|
|
@@ -95,6 +101,12 @@ export interface LDAPSourceRequest {
|
|
|
95
101
|
* @memberof LDAPSourceRequest
|
|
96
102
|
*/
|
|
97
103
|
startTls?: boolean;
|
|
104
|
+
/**
|
|
105
|
+
*
|
|
106
|
+
* @type {boolean}
|
|
107
|
+
* @memberof LDAPSourceRequest
|
|
108
|
+
*/
|
|
109
|
+
sni?: boolean;
|
|
98
110
|
/**
|
|
99
111
|
*
|
|
100
112
|
* @type {string}
|
|
@@ -48,9 +48,11 @@ function LDAPSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
48
48
|
'userPathTemplate': !(0, runtime_1.exists)(json, 'user_path_template') ? undefined : json['user_path_template'],
|
|
49
49
|
'serverUri': json['server_uri'],
|
|
50
50
|
'peerCertificate': !(0, runtime_1.exists)(json, 'peer_certificate') ? undefined : json['peer_certificate'],
|
|
51
|
+
'clientCertificate': !(0, runtime_1.exists)(json, 'client_certificate') ? undefined : json['client_certificate'],
|
|
51
52
|
'bindCn': !(0, runtime_1.exists)(json, 'bind_cn') ? undefined : json['bind_cn'],
|
|
52
53
|
'bindPassword': !(0, runtime_1.exists)(json, 'bind_password') ? undefined : json['bind_password'],
|
|
53
54
|
'startTls': !(0, runtime_1.exists)(json, 'start_tls') ? undefined : json['start_tls'],
|
|
55
|
+
'sni': !(0, runtime_1.exists)(json, 'sni') ? undefined : json['sni'],
|
|
54
56
|
'baseDn': json['base_dn'],
|
|
55
57
|
'additionalUserDn': !(0, runtime_1.exists)(json, 'additional_user_dn') ? undefined : json['additional_user_dn'],
|
|
56
58
|
'additionalGroupDn': !(0, runtime_1.exists)(json, 'additional_group_dn') ? undefined : json['additional_group_dn'],
|
|
@@ -85,9 +87,11 @@ function LDAPSourceRequestToJSON(value) {
|
|
|
85
87
|
'user_path_template': value.userPathTemplate,
|
|
86
88
|
'server_uri': value.serverUri,
|
|
87
89
|
'peer_certificate': value.peerCertificate,
|
|
90
|
+
'client_certificate': value.clientCertificate,
|
|
88
91
|
'bind_cn': value.bindCn,
|
|
89
92
|
'bind_password': value.bindPassword,
|
|
90
93
|
'start_tls': value.startTls,
|
|
94
|
+
'sni': value.sni,
|
|
91
95
|
'base_dn': value.baseDn,
|
|
92
96
|
'additional_user_dn': value.additionalUserDn,
|
|
93
97
|
'additional_group_dn': value.additionalGroupDn,
|
|
@@ -0,0 +1,161 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2023.5.3
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
* * `authentik_crypto.certificatekeypair` - Certificate-Key Pair
|
|
14
|
+
* * `authentik_events.event` - Event
|
|
15
|
+
* * `authentik_events.notificationtransport` - Notification Transport
|
|
16
|
+
* * `authentik_events.notification` - Notification
|
|
17
|
+
* * `authentik_events.notificationrule` - Notification Rule
|
|
18
|
+
* * `authentik_events.notificationwebhookmapping` - Webhook Mapping
|
|
19
|
+
* * `authentik_flows.flow` - Flow
|
|
20
|
+
* * `authentik_flows.flowstagebinding` - Flow Stage Binding
|
|
21
|
+
* * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection
|
|
22
|
+
* * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection
|
|
23
|
+
* * `authentik_outposts.outpost` - outpost
|
|
24
|
+
* * `authentik_policies_dummy.dummypolicy` - Dummy Policy
|
|
25
|
+
* * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy
|
|
26
|
+
* * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy
|
|
27
|
+
* * `authentik_policies_expression.expressionpolicy` - Expression Policy
|
|
28
|
+
* * `authentik_policies_password.passwordpolicy` - Password Policy
|
|
29
|
+
* * `authentik_policies_reputation.reputationpolicy` - Reputation Policy
|
|
30
|
+
* * `authentik_policies_reputation.reputation` - reputation
|
|
31
|
+
* * `authentik_policies.policybinding` - Policy Binding
|
|
32
|
+
* * `authentik_providers_ldap.ldapprovider` - LDAP Provider
|
|
33
|
+
* * `authentik_providers_oauth2.scopemapping` - Scope Mapping
|
|
34
|
+
* * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
|
|
35
|
+
* * `authentik_providers_oauth2.authorizationcode` - Authorization Code
|
|
36
|
+
* * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
|
|
37
|
+
* * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
|
|
38
|
+
* * `authentik_providers_proxy.proxyprovider` - Proxy Provider
|
|
39
|
+
* * `authentik_providers_radius.radiusprovider` - Radius Provider
|
|
40
|
+
* * `authentik_providers_saml.samlprovider` - SAML Provider
|
|
41
|
+
* * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping
|
|
42
|
+
* * `authentik_providers_scim.scimprovider` - SCIM Provider
|
|
43
|
+
* * `authentik_providers_scim.scimmapping` - SCIM Mapping
|
|
44
|
+
* * `authentik_sources_ldap.ldapsource` - LDAP Source
|
|
45
|
+
* * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping
|
|
46
|
+
* * `authentik_sources_oauth.oauthsource` - OAuth Source
|
|
47
|
+
* * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection
|
|
48
|
+
* * `authentik_sources_plex.plexsource` - Plex Source
|
|
49
|
+
* * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection
|
|
50
|
+
* * `authentik_sources_saml.samlsource` - SAML Source
|
|
51
|
+
* * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
|
|
52
|
+
* * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
|
|
53
|
+
* * `authentik_stages_authenticator_duo.duodevice` - Duo Device
|
|
54
|
+
* * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
|
|
55
|
+
* * `authentik_stages_authenticator_sms.smsdevice` - SMS Device
|
|
56
|
+
* * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
|
|
57
|
+
* * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
|
|
58
|
+
* * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage
|
|
59
|
+
* * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage
|
|
60
|
+
* * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device
|
|
61
|
+
* * `authentik_stages_captcha.captchastage` - Captcha Stage
|
|
62
|
+
* * `authentik_stages_consent.consentstage` - Consent Stage
|
|
63
|
+
* * `authentik_stages_consent.userconsent` - User Consent
|
|
64
|
+
* * `authentik_stages_deny.denystage` - Deny Stage
|
|
65
|
+
* * `authentik_stages_dummy.dummystage` - Dummy Stage
|
|
66
|
+
* * `authentik_stages_email.emailstage` - Email Stage
|
|
67
|
+
* * `authentik_stages_identification.identificationstage` - Identification Stage
|
|
68
|
+
* * `authentik_stages_invitation.invitationstage` - Invitation Stage
|
|
69
|
+
* * `authentik_stages_invitation.invitation` - Invitation
|
|
70
|
+
* * `authentik_stages_password.passwordstage` - Password Stage
|
|
71
|
+
* * `authentik_stages_prompt.prompt` - Prompt
|
|
72
|
+
* * `authentik_stages_prompt.promptstage` - Prompt Stage
|
|
73
|
+
* * `authentik_stages_user_delete.userdeletestage` - User Delete Stage
|
|
74
|
+
* * `authentik_stages_user_login.userloginstage` - User Login Stage
|
|
75
|
+
* * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage
|
|
76
|
+
* * `authentik_stages_user_write.userwritestage` - User Write Stage
|
|
77
|
+
* * `authentik_tenants.tenant` - Tenant
|
|
78
|
+
* * `authentik_blueprints.blueprintinstance` - Blueprint Instance
|
|
79
|
+
* * `authentik_core.group` - group
|
|
80
|
+
* * `authentik_core.user` - User
|
|
81
|
+
* * `authentik_core.application` - Application
|
|
82
|
+
* * `authentik_core.token` - Token
|
|
83
|
+
* @export
|
|
84
|
+
*/
|
|
85
|
+
export declare const ModelEnum: {
|
|
86
|
+
readonly CryptoCertificatekeypair: "authentik_crypto.certificatekeypair";
|
|
87
|
+
readonly EventsEvent: "authentik_events.event";
|
|
88
|
+
readonly EventsNotificationtransport: "authentik_events.notificationtransport";
|
|
89
|
+
readonly EventsNotification: "authentik_events.notification";
|
|
90
|
+
readonly EventsNotificationrule: "authentik_events.notificationrule";
|
|
91
|
+
readonly EventsNotificationwebhookmapping: "authentik_events.notificationwebhookmapping";
|
|
92
|
+
readonly FlowsFlow: "authentik_flows.flow";
|
|
93
|
+
readonly FlowsFlowstagebinding: "authentik_flows.flowstagebinding";
|
|
94
|
+
readonly OutpostsDockerserviceconnection: "authentik_outposts.dockerserviceconnection";
|
|
95
|
+
readonly OutpostsKubernetesserviceconnection: "authentik_outposts.kubernetesserviceconnection";
|
|
96
|
+
readonly OutpostsOutpost: "authentik_outposts.outpost";
|
|
97
|
+
readonly PoliciesDummyDummypolicy: "authentik_policies_dummy.dummypolicy";
|
|
98
|
+
readonly PoliciesEventMatcherEventmatcherpolicy: "authentik_policies_event_matcher.eventmatcherpolicy";
|
|
99
|
+
readonly PoliciesExpiryPasswordexpirypolicy: "authentik_policies_expiry.passwordexpirypolicy";
|
|
100
|
+
readonly PoliciesExpressionExpressionpolicy: "authentik_policies_expression.expressionpolicy";
|
|
101
|
+
readonly PoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
|
|
102
|
+
readonly PoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
|
|
103
|
+
readonly PoliciesReputationReputation: "authentik_policies_reputation.reputation";
|
|
104
|
+
readonly PoliciesPolicybinding: "authentik_policies.policybinding";
|
|
105
|
+
readonly ProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
|
|
106
|
+
readonly ProvidersOauth2Scopemapping: "authentik_providers_oauth2.scopemapping";
|
|
107
|
+
readonly ProvidersOauth2Oauth2provider: "authentik_providers_oauth2.oauth2provider";
|
|
108
|
+
readonly ProvidersOauth2Authorizationcode: "authentik_providers_oauth2.authorizationcode";
|
|
109
|
+
readonly ProvidersOauth2Accesstoken: "authentik_providers_oauth2.accesstoken";
|
|
110
|
+
readonly ProvidersOauth2Refreshtoken: "authentik_providers_oauth2.refreshtoken";
|
|
111
|
+
readonly ProvidersProxyProxyprovider: "authentik_providers_proxy.proxyprovider";
|
|
112
|
+
readonly ProvidersRadiusRadiusprovider: "authentik_providers_radius.radiusprovider";
|
|
113
|
+
readonly ProvidersSamlSamlprovider: "authentik_providers_saml.samlprovider";
|
|
114
|
+
readonly ProvidersSamlSamlpropertymapping: "authentik_providers_saml.samlpropertymapping";
|
|
115
|
+
readonly ProvidersScimScimprovider: "authentik_providers_scim.scimprovider";
|
|
116
|
+
readonly ProvidersScimScimmapping: "authentik_providers_scim.scimmapping";
|
|
117
|
+
readonly SourcesLdapLdapsource: "authentik_sources_ldap.ldapsource";
|
|
118
|
+
readonly SourcesLdapLdappropertymapping: "authentik_sources_ldap.ldappropertymapping";
|
|
119
|
+
readonly SourcesOauthOauthsource: "authentik_sources_oauth.oauthsource";
|
|
120
|
+
readonly SourcesOauthUseroauthsourceconnection: "authentik_sources_oauth.useroauthsourceconnection";
|
|
121
|
+
readonly SourcesPlexPlexsource: "authentik_sources_plex.plexsource";
|
|
122
|
+
readonly SourcesPlexPlexsourceconnection: "authentik_sources_plex.plexsourceconnection";
|
|
123
|
+
readonly SourcesSamlSamlsource: "authentik_sources_saml.samlsource";
|
|
124
|
+
readonly SourcesSamlUsersamlsourceconnection: "authentik_sources_saml.usersamlsourceconnection";
|
|
125
|
+
readonly StagesAuthenticatorDuoAuthenticatorduostage: "authentik_stages_authenticator_duo.authenticatorduostage";
|
|
126
|
+
readonly StagesAuthenticatorDuoDuodevice: "authentik_stages_authenticator_duo.duodevice";
|
|
127
|
+
readonly StagesAuthenticatorSmsAuthenticatorsmsstage: "authentik_stages_authenticator_sms.authenticatorsmsstage";
|
|
128
|
+
readonly StagesAuthenticatorSmsSmsdevice: "authentik_stages_authenticator_sms.smsdevice";
|
|
129
|
+
readonly StagesAuthenticatorStaticAuthenticatorstaticstage: "authentik_stages_authenticator_static.authenticatorstaticstage";
|
|
130
|
+
readonly StagesAuthenticatorTotpAuthenticatortotpstage: "authentik_stages_authenticator_totp.authenticatortotpstage";
|
|
131
|
+
readonly StagesAuthenticatorValidateAuthenticatorvalidatestage: "authentik_stages_authenticator_validate.authenticatorvalidatestage";
|
|
132
|
+
readonly StagesAuthenticatorWebauthnAuthenticatewebauthnstage: "authentik_stages_authenticator_webauthn.authenticatewebauthnstage";
|
|
133
|
+
readonly StagesAuthenticatorWebauthnWebauthndevice: "authentik_stages_authenticator_webauthn.webauthndevice";
|
|
134
|
+
readonly StagesCaptchaCaptchastage: "authentik_stages_captcha.captchastage";
|
|
135
|
+
readonly StagesConsentConsentstage: "authentik_stages_consent.consentstage";
|
|
136
|
+
readonly StagesConsentUserconsent: "authentik_stages_consent.userconsent";
|
|
137
|
+
readonly StagesDenyDenystage: "authentik_stages_deny.denystage";
|
|
138
|
+
readonly StagesDummyDummystage: "authentik_stages_dummy.dummystage";
|
|
139
|
+
readonly StagesEmailEmailstage: "authentik_stages_email.emailstage";
|
|
140
|
+
readonly StagesIdentificationIdentificationstage: "authentik_stages_identification.identificationstage";
|
|
141
|
+
readonly StagesInvitationInvitationstage: "authentik_stages_invitation.invitationstage";
|
|
142
|
+
readonly StagesInvitationInvitation: "authentik_stages_invitation.invitation";
|
|
143
|
+
readonly StagesPasswordPasswordstage: "authentik_stages_password.passwordstage";
|
|
144
|
+
readonly StagesPromptPrompt: "authentik_stages_prompt.prompt";
|
|
145
|
+
readonly StagesPromptPromptstage: "authentik_stages_prompt.promptstage";
|
|
146
|
+
readonly StagesUserDeleteUserdeletestage: "authentik_stages_user_delete.userdeletestage";
|
|
147
|
+
readonly StagesUserLoginUserloginstage: "authentik_stages_user_login.userloginstage";
|
|
148
|
+
readonly StagesUserLogoutUserlogoutstage: "authentik_stages_user_logout.userlogoutstage";
|
|
149
|
+
readonly StagesUserWriteUserwritestage: "authentik_stages_user_write.userwritestage";
|
|
150
|
+
readonly TenantsTenant: "authentik_tenants.tenant";
|
|
151
|
+
readonly BlueprintsBlueprintinstance: "authentik_blueprints.blueprintinstance";
|
|
152
|
+
readonly CoreGroup: "authentik_core.group";
|
|
153
|
+
readonly CoreUser: "authentik_core.user";
|
|
154
|
+
readonly CoreApplication: "authentik_core.application";
|
|
155
|
+
readonly CoreToken: "authentik_core.token";
|
|
156
|
+
readonly UnknownDefaultOpenApi: "11184809";
|
|
157
|
+
};
|
|
158
|
+
export type ModelEnum = typeof ModelEnum[keyof typeof ModelEnum];
|
|
159
|
+
export declare function ModelEnumFromJSON(json: any): ModelEnum;
|
|
160
|
+
export declare function ModelEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): ModelEnum;
|
|
161
|
+
export declare function ModelEnumToJSON(value?: ModelEnum | null): any;
|