@goauthentik/api 2023.5.3-1685646044 → 2023.5.3-1686600706
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +1 -0
- package/dist/apis/AdminApi.d.ts +8 -0
- package/dist/apis/AdminApi.js +28 -0
- package/dist/apis/PoliciesApi.d.ts +1 -0
- package/dist/apis/PoliciesApi.js +3 -0
- package/dist/apis/SourcesApi.d.ts +2 -0
- package/dist/apis/SourcesApi.js +6 -0
- package/dist/esm/apis/AdminApi.d.ts +8 -0
- package/dist/esm/apis/AdminApi.js +28 -0
- package/dist/esm/apis/PoliciesApi.d.ts +1 -0
- package/dist/esm/apis/PoliciesApi.js +3 -0
- package/dist/esm/apis/SourcesApi.d.ts +2 -0
- package/dist/esm/apis/SourcesApi.js +6 -0
- package/dist/esm/models/EventMatcherPolicy.d.ts +7 -0
- package/dist/esm/models/EventMatcherPolicy.js +3 -0
- package/dist/esm/models/EventMatcherPolicyRequest.d.ts +7 -0
- package/dist/esm/models/EventMatcherPolicyRequest.js +3 -0
- package/dist/esm/models/LDAPSource.d.ts +12 -0
- package/dist/esm/models/LDAPSource.js +4 -0
- package/dist/esm/models/LDAPSourceRequest.d.ts +12 -0
- package/dist/esm/models/LDAPSourceRequest.js +4 -0
- package/dist/esm/models/ModelEnum.d.ts +161 -0
- package/dist/esm/models/ModelEnum.js +168 -0
- package/dist/esm/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
- package/dist/esm/models/PatchedEventMatcherPolicyRequest.js +3 -0
- package/dist/esm/models/PatchedLDAPSourceRequest.d.ts +12 -0
- package/dist/esm/models/PatchedLDAPSourceRequest.js +4 -0
- package/dist/esm/models/index.d.ts +1 -0
- package/dist/esm/models/index.js +1 -0
- package/dist/models/EventMatcherPolicy.d.ts +7 -0
- package/dist/models/EventMatcherPolicy.js +3 -0
- package/dist/models/EventMatcherPolicyRequest.d.ts +7 -0
- package/dist/models/EventMatcherPolicyRequest.js +3 -0
- package/dist/models/LDAPSource.d.ts +12 -0
- package/dist/models/LDAPSource.js +4 -0
- package/dist/models/LDAPSourceRequest.d.ts +12 -0
- package/dist/models/LDAPSourceRequest.js +4 -0
- package/dist/models/ModelEnum.d.ts +161 -0
- package/dist/models/ModelEnum.js +174 -0
- package/dist/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
- package/dist/models/PatchedEventMatcherPolicyRequest.js +3 -0
- package/dist/models/PatchedLDAPSourceRequest.d.ts +12 -0
- package/dist/models/PatchedLDAPSourceRequest.js +4 -0
- package/dist/models/index.d.ts +1 -0
- package/dist/models/index.js +1 -0
- package/package.json +1 -1
- package/src/apis/AdminApi.ts +30 -0
- package/src/apis/PoliciesApi.ts +5 -0
- package/src/apis/SourcesApi.ts +10 -0
- package/src/models/EventMatcherPolicy.ts +14 -0
- package/src/models/EventMatcherPolicyRequest.ts +14 -0
- package/src/models/LDAPSource.ts +16 -0
- package/src/models/LDAPSourceRequest.ts +16 -0
- package/src/models/ModelEnum.ts +176 -0
- package/src/models/PatchedEventMatcherPolicyRequest.ts +14 -0
- package/src/models/PatchedLDAPSourceRequest.ts +16 -0
- package/src/models/index.ts +1 -0
|
@@ -0,0 +1,174 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/* tslint:disable */
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
/**
|
|
5
|
+
* authentik
|
|
6
|
+
* Making authentication simple.
|
|
7
|
+
*
|
|
8
|
+
* The version of the OpenAPI document: 2023.5.3
|
|
9
|
+
* Contact: hello@goauthentik.io
|
|
10
|
+
*
|
|
11
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
12
|
+
* https://openapi-generator.tech
|
|
13
|
+
* Do not edit the class manually.
|
|
14
|
+
*/
|
|
15
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
+
exports.ModelEnumToJSON = exports.ModelEnumFromJSONTyped = exports.ModelEnumFromJSON = exports.ModelEnum = void 0;
|
|
17
|
+
/**
|
|
18
|
+
* * `authentik_crypto.certificatekeypair` - Certificate-Key Pair
|
|
19
|
+
* * `authentik_events.event` - Event
|
|
20
|
+
* * `authentik_events.notificationtransport` - Notification Transport
|
|
21
|
+
* * `authentik_events.notification` - Notification
|
|
22
|
+
* * `authentik_events.notificationrule` - Notification Rule
|
|
23
|
+
* * `authentik_events.notificationwebhookmapping` - Webhook Mapping
|
|
24
|
+
* * `authentik_flows.flow` - Flow
|
|
25
|
+
* * `authentik_flows.flowstagebinding` - Flow Stage Binding
|
|
26
|
+
* * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection
|
|
27
|
+
* * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection
|
|
28
|
+
* * `authentik_outposts.outpost` - outpost
|
|
29
|
+
* * `authentik_policies_dummy.dummypolicy` - Dummy Policy
|
|
30
|
+
* * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy
|
|
31
|
+
* * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy
|
|
32
|
+
* * `authentik_policies_expression.expressionpolicy` - Expression Policy
|
|
33
|
+
* * `authentik_policies_password.passwordpolicy` - Password Policy
|
|
34
|
+
* * `authentik_policies_reputation.reputationpolicy` - Reputation Policy
|
|
35
|
+
* * `authentik_policies_reputation.reputation` - reputation
|
|
36
|
+
* * `authentik_policies.policybinding` - Policy Binding
|
|
37
|
+
* * `authentik_providers_ldap.ldapprovider` - LDAP Provider
|
|
38
|
+
* * `authentik_providers_oauth2.scopemapping` - Scope Mapping
|
|
39
|
+
* * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
|
|
40
|
+
* * `authentik_providers_oauth2.authorizationcode` - Authorization Code
|
|
41
|
+
* * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
|
|
42
|
+
* * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
|
|
43
|
+
* * `authentik_providers_proxy.proxyprovider` - Proxy Provider
|
|
44
|
+
* * `authentik_providers_radius.radiusprovider` - Radius Provider
|
|
45
|
+
* * `authentik_providers_saml.samlprovider` - SAML Provider
|
|
46
|
+
* * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping
|
|
47
|
+
* * `authentik_providers_scim.scimprovider` - SCIM Provider
|
|
48
|
+
* * `authentik_providers_scim.scimmapping` - SCIM Mapping
|
|
49
|
+
* * `authentik_sources_ldap.ldapsource` - LDAP Source
|
|
50
|
+
* * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping
|
|
51
|
+
* * `authentik_sources_oauth.oauthsource` - OAuth Source
|
|
52
|
+
* * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection
|
|
53
|
+
* * `authentik_sources_plex.plexsource` - Plex Source
|
|
54
|
+
* * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection
|
|
55
|
+
* * `authentik_sources_saml.samlsource` - SAML Source
|
|
56
|
+
* * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
|
|
57
|
+
* * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
|
|
58
|
+
* * `authentik_stages_authenticator_duo.duodevice` - Duo Device
|
|
59
|
+
* * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
|
|
60
|
+
* * `authentik_stages_authenticator_sms.smsdevice` - SMS Device
|
|
61
|
+
* * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
|
|
62
|
+
* * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
|
|
63
|
+
* * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage
|
|
64
|
+
* * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage
|
|
65
|
+
* * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device
|
|
66
|
+
* * `authentik_stages_captcha.captchastage` - Captcha Stage
|
|
67
|
+
* * `authentik_stages_consent.consentstage` - Consent Stage
|
|
68
|
+
* * `authentik_stages_consent.userconsent` - User Consent
|
|
69
|
+
* * `authentik_stages_deny.denystage` - Deny Stage
|
|
70
|
+
* * `authentik_stages_dummy.dummystage` - Dummy Stage
|
|
71
|
+
* * `authentik_stages_email.emailstage` - Email Stage
|
|
72
|
+
* * `authentik_stages_identification.identificationstage` - Identification Stage
|
|
73
|
+
* * `authentik_stages_invitation.invitationstage` - Invitation Stage
|
|
74
|
+
* * `authentik_stages_invitation.invitation` - Invitation
|
|
75
|
+
* * `authentik_stages_password.passwordstage` - Password Stage
|
|
76
|
+
* * `authentik_stages_prompt.prompt` - Prompt
|
|
77
|
+
* * `authentik_stages_prompt.promptstage` - Prompt Stage
|
|
78
|
+
* * `authentik_stages_user_delete.userdeletestage` - User Delete Stage
|
|
79
|
+
* * `authentik_stages_user_login.userloginstage` - User Login Stage
|
|
80
|
+
* * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage
|
|
81
|
+
* * `authentik_stages_user_write.userwritestage` - User Write Stage
|
|
82
|
+
* * `authentik_tenants.tenant` - Tenant
|
|
83
|
+
* * `authentik_blueprints.blueprintinstance` - Blueprint Instance
|
|
84
|
+
* * `authentik_core.group` - group
|
|
85
|
+
* * `authentik_core.user` - User
|
|
86
|
+
* * `authentik_core.application` - Application
|
|
87
|
+
* * `authentik_core.token` - Token
|
|
88
|
+
* @export
|
|
89
|
+
*/
|
|
90
|
+
exports.ModelEnum = {
|
|
91
|
+
CryptoCertificatekeypair: 'authentik_crypto.certificatekeypair',
|
|
92
|
+
EventsEvent: 'authentik_events.event',
|
|
93
|
+
EventsNotificationtransport: 'authentik_events.notificationtransport',
|
|
94
|
+
EventsNotification: 'authentik_events.notification',
|
|
95
|
+
EventsNotificationrule: 'authentik_events.notificationrule',
|
|
96
|
+
EventsNotificationwebhookmapping: 'authentik_events.notificationwebhookmapping',
|
|
97
|
+
FlowsFlow: 'authentik_flows.flow',
|
|
98
|
+
FlowsFlowstagebinding: 'authentik_flows.flowstagebinding',
|
|
99
|
+
OutpostsDockerserviceconnection: 'authentik_outposts.dockerserviceconnection',
|
|
100
|
+
OutpostsKubernetesserviceconnection: 'authentik_outposts.kubernetesserviceconnection',
|
|
101
|
+
OutpostsOutpost: 'authentik_outposts.outpost',
|
|
102
|
+
PoliciesDummyDummypolicy: 'authentik_policies_dummy.dummypolicy',
|
|
103
|
+
PoliciesEventMatcherEventmatcherpolicy: 'authentik_policies_event_matcher.eventmatcherpolicy',
|
|
104
|
+
PoliciesExpiryPasswordexpirypolicy: 'authentik_policies_expiry.passwordexpirypolicy',
|
|
105
|
+
PoliciesExpressionExpressionpolicy: 'authentik_policies_expression.expressionpolicy',
|
|
106
|
+
PoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
107
|
+
PoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
108
|
+
PoliciesReputationReputation: 'authentik_policies_reputation.reputation',
|
|
109
|
+
PoliciesPolicybinding: 'authentik_policies.policybinding',
|
|
110
|
+
ProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
|
111
|
+
ProvidersOauth2Scopemapping: 'authentik_providers_oauth2.scopemapping',
|
|
112
|
+
ProvidersOauth2Oauth2provider: 'authentik_providers_oauth2.oauth2provider',
|
|
113
|
+
ProvidersOauth2Authorizationcode: 'authentik_providers_oauth2.authorizationcode',
|
|
114
|
+
ProvidersOauth2Accesstoken: 'authentik_providers_oauth2.accesstoken',
|
|
115
|
+
ProvidersOauth2Refreshtoken: 'authentik_providers_oauth2.refreshtoken',
|
|
116
|
+
ProvidersProxyProxyprovider: 'authentik_providers_proxy.proxyprovider',
|
|
117
|
+
ProvidersRadiusRadiusprovider: 'authentik_providers_radius.radiusprovider',
|
|
118
|
+
ProvidersSamlSamlprovider: 'authentik_providers_saml.samlprovider',
|
|
119
|
+
ProvidersSamlSamlpropertymapping: 'authentik_providers_saml.samlpropertymapping',
|
|
120
|
+
ProvidersScimScimprovider: 'authentik_providers_scim.scimprovider',
|
|
121
|
+
ProvidersScimScimmapping: 'authentik_providers_scim.scimmapping',
|
|
122
|
+
SourcesLdapLdapsource: 'authentik_sources_ldap.ldapsource',
|
|
123
|
+
SourcesLdapLdappropertymapping: 'authentik_sources_ldap.ldappropertymapping',
|
|
124
|
+
SourcesOauthOauthsource: 'authentik_sources_oauth.oauthsource',
|
|
125
|
+
SourcesOauthUseroauthsourceconnection: 'authentik_sources_oauth.useroauthsourceconnection',
|
|
126
|
+
SourcesPlexPlexsource: 'authentik_sources_plex.plexsource',
|
|
127
|
+
SourcesPlexPlexsourceconnection: 'authentik_sources_plex.plexsourceconnection',
|
|
128
|
+
SourcesSamlSamlsource: 'authentik_sources_saml.samlsource',
|
|
129
|
+
SourcesSamlUsersamlsourceconnection: 'authentik_sources_saml.usersamlsourceconnection',
|
|
130
|
+
StagesAuthenticatorDuoAuthenticatorduostage: 'authentik_stages_authenticator_duo.authenticatorduostage',
|
|
131
|
+
StagesAuthenticatorDuoDuodevice: 'authentik_stages_authenticator_duo.duodevice',
|
|
132
|
+
StagesAuthenticatorSmsAuthenticatorsmsstage: 'authentik_stages_authenticator_sms.authenticatorsmsstage',
|
|
133
|
+
StagesAuthenticatorSmsSmsdevice: 'authentik_stages_authenticator_sms.smsdevice',
|
|
134
|
+
StagesAuthenticatorStaticAuthenticatorstaticstage: 'authentik_stages_authenticator_static.authenticatorstaticstage',
|
|
135
|
+
StagesAuthenticatorTotpAuthenticatortotpstage: 'authentik_stages_authenticator_totp.authenticatortotpstage',
|
|
136
|
+
StagesAuthenticatorValidateAuthenticatorvalidatestage: 'authentik_stages_authenticator_validate.authenticatorvalidatestage',
|
|
137
|
+
StagesAuthenticatorWebauthnAuthenticatewebauthnstage: 'authentik_stages_authenticator_webauthn.authenticatewebauthnstage',
|
|
138
|
+
StagesAuthenticatorWebauthnWebauthndevice: 'authentik_stages_authenticator_webauthn.webauthndevice',
|
|
139
|
+
StagesCaptchaCaptchastage: 'authentik_stages_captcha.captchastage',
|
|
140
|
+
StagesConsentConsentstage: 'authentik_stages_consent.consentstage',
|
|
141
|
+
StagesConsentUserconsent: 'authentik_stages_consent.userconsent',
|
|
142
|
+
StagesDenyDenystage: 'authentik_stages_deny.denystage',
|
|
143
|
+
StagesDummyDummystage: 'authentik_stages_dummy.dummystage',
|
|
144
|
+
StagesEmailEmailstage: 'authentik_stages_email.emailstage',
|
|
145
|
+
StagesIdentificationIdentificationstage: 'authentik_stages_identification.identificationstage',
|
|
146
|
+
StagesInvitationInvitationstage: 'authentik_stages_invitation.invitationstage',
|
|
147
|
+
StagesInvitationInvitation: 'authentik_stages_invitation.invitation',
|
|
148
|
+
StagesPasswordPasswordstage: 'authentik_stages_password.passwordstage',
|
|
149
|
+
StagesPromptPrompt: 'authentik_stages_prompt.prompt',
|
|
150
|
+
StagesPromptPromptstage: 'authentik_stages_prompt.promptstage',
|
|
151
|
+
StagesUserDeleteUserdeletestage: 'authentik_stages_user_delete.userdeletestage',
|
|
152
|
+
StagesUserLoginUserloginstage: 'authentik_stages_user_login.userloginstage',
|
|
153
|
+
StagesUserLogoutUserlogoutstage: 'authentik_stages_user_logout.userlogoutstage',
|
|
154
|
+
StagesUserWriteUserwritestage: 'authentik_stages_user_write.userwritestage',
|
|
155
|
+
TenantsTenant: 'authentik_tenants.tenant',
|
|
156
|
+
BlueprintsBlueprintinstance: 'authentik_blueprints.blueprintinstance',
|
|
157
|
+
CoreGroup: 'authentik_core.group',
|
|
158
|
+
CoreUser: 'authentik_core.user',
|
|
159
|
+
CoreApplication: 'authentik_core.application',
|
|
160
|
+
CoreToken: 'authentik_core.token',
|
|
161
|
+
UnknownDefaultOpenApi: '11184809'
|
|
162
|
+
};
|
|
163
|
+
function ModelEnumFromJSON(json) {
|
|
164
|
+
return ModelEnumFromJSONTyped(json, false);
|
|
165
|
+
}
|
|
166
|
+
exports.ModelEnumFromJSON = ModelEnumFromJSON;
|
|
167
|
+
function ModelEnumFromJSONTyped(json, ignoreDiscriminator) {
|
|
168
|
+
return json;
|
|
169
|
+
}
|
|
170
|
+
exports.ModelEnumFromJSONTyped = ModelEnumFromJSONTyped;
|
|
171
|
+
function ModelEnumToJSON(value) {
|
|
172
|
+
return value;
|
|
173
|
+
}
|
|
174
|
+
exports.ModelEnumToJSON = ModelEnumToJSON;
|
|
@@ -11,6 +11,7 @@
|
|
|
11
11
|
*/
|
|
12
12
|
import type { AppEnum } from './AppEnum';
|
|
13
13
|
import type { EventActions } from './EventActions';
|
|
14
|
+
import type { ModelEnum } from './ModelEnum';
|
|
14
15
|
/**
|
|
15
16
|
* Event Matcher Policy Serializer
|
|
16
17
|
* @export
|
|
@@ -47,6 +48,12 @@ export interface PatchedEventMatcherPolicyRequest {
|
|
|
47
48
|
* @memberof PatchedEventMatcherPolicyRequest
|
|
48
49
|
*/
|
|
49
50
|
app?: AppEnum;
|
|
51
|
+
/**
|
|
52
|
+
*
|
|
53
|
+
* @type {ModelEnum}
|
|
54
|
+
* @memberof PatchedEventMatcherPolicyRequest
|
|
55
|
+
*/
|
|
56
|
+
model?: ModelEnum;
|
|
50
57
|
}
|
|
51
58
|
/**
|
|
52
59
|
* Check if a given object implements the PatchedEventMatcherPolicyRequest interface.
|
|
@@ -17,6 +17,7 @@ exports.PatchedEventMatcherPolicyRequestToJSON = exports.PatchedEventMatcherPoli
|
|
|
17
17
|
const runtime_1 = require("../runtime");
|
|
18
18
|
const AppEnum_1 = require("./AppEnum");
|
|
19
19
|
const EventActions_1 = require("./EventActions");
|
|
20
|
+
const ModelEnum_1 = require("./ModelEnum");
|
|
20
21
|
/**
|
|
21
22
|
* Check if a given object implements the PatchedEventMatcherPolicyRequest interface.
|
|
22
23
|
*/
|
|
@@ -39,6 +40,7 @@ function PatchedEventMatcherPolicyRequestFromJSONTyped(json, ignoreDiscriminator
|
|
|
39
40
|
'action': !(0, runtime_1.exists)(json, 'action') ? undefined : (0, EventActions_1.EventActionsFromJSON)(json['action']),
|
|
40
41
|
'clientIp': !(0, runtime_1.exists)(json, 'client_ip') ? undefined : json['client_ip'],
|
|
41
42
|
'app': !(0, runtime_1.exists)(json, 'app') ? undefined : (0, AppEnum_1.AppEnumFromJSON)(json['app']),
|
|
43
|
+
'model': !(0, runtime_1.exists)(json, 'model') ? undefined : (0, ModelEnum_1.ModelEnumFromJSON)(json['model']),
|
|
42
44
|
};
|
|
43
45
|
}
|
|
44
46
|
exports.PatchedEventMatcherPolicyRequestFromJSONTyped = PatchedEventMatcherPolicyRequestFromJSONTyped;
|
|
@@ -55,6 +57,7 @@ function PatchedEventMatcherPolicyRequestToJSON(value) {
|
|
|
55
57
|
'action': (0, EventActions_1.EventActionsToJSON)(value.action),
|
|
56
58
|
'client_ip': value.clientIp,
|
|
57
59
|
'app': (0, AppEnum_1.AppEnumToJSON)(value.app),
|
|
60
|
+
'model': (0, ModelEnum_1.ModelEnumToJSON)(value.model),
|
|
58
61
|
};
|
|
59
62
|
}
|
|
60
63
|
exports.PatchedEventMatcherPolicyRequestToJSON = PatchedEventMatcherPolicyRequestToJSON;
|
|
@@ -77,6 +77,12 @@ export interface PatchedLDAPSourceRequest {
|
|
|
77
77
|
* @memberof PatchedLDAPSourceRequest
|
|
78
78
|
*/
|
|
79
79
|
peerCertificate?: string | null;
|
|
80
|
+
/**
|
|
81
|
+
* Client certificate to authenticate against the LDAP Server's Certificate.
|
|
82
|
+
* @type {string}
|
|
83
|
+
* @memberof PatchedLDAPSourceRequest
|
|
84
|
+
*/
|
|
85
|
+
clientCertificate?: string | null;
|
|
80
86
|
/**
|
|
81
87
|
*
|
|
82
88
|
* @type {string}
|
|
@@ -95,6 +101,12 @@ export interface PatchedLDAPSourceRequest {
|
|
|
95
101
|
* @memberof PatchedLDAPSourceRequest
|
|
96
102
|
*/
|
|
97
103
|
startTls?: boolean;
|
|
104
|
+
/**
|
|
105
|
+
*
|
|
106
|
+
* @type {boolean}
|
|
107
|
+
* @memberof PatchedLDAPSourceRequest
|
|
108
|
+
*/
|
|
109
|
+
sni?: boolean;
|
|
98
110
|
/**
|
|
99
111
|
*
|
|
100
112
|
* @type {string}
|
|
@@ -44,9 +44,11 @@ function PatchedLDAPSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
44
44
|
'userPathTemplate': !(0, runtime_1.exists)(json, 'user_path_template') ? undefined : json['user_path_template'],
|
|
45
45
|
'serverUri': !(0, runtime_1.exists)(json, 'server_uri') ? undefined : json['server_uri'],
|
|
46
46
|
'peerCertificate': !(0, runtime_1.exists)(json, 'peer_certificate') ? undefined : json['peer_certificate'],
|
|
47
|
+
'clientCertificate': !(0, runtime_1.exists)(json, 'client_certificate') ? undefined : json['client_certificate'],
|
|
47
48
|
'bindCn': !(0, runtime_1.exists)(json, 'bind_cn') ? undefined : json['bind_cn'],
|
|
48
49
|
'bindPassword': !(0, runtime_1.exists)(json, 'bind_password') ? undefined : json['bind_password'],
|
|
49
50
|
'startTls': !(0, runtime_1.exists)(json, 'start_tls') ? undefined : json['start_tls'],
|
|
51
|
+
'sni': !(0, runtime_1.exists)(json, 'sni') ? undefined : json['sni'],
|
|
50
52
|
'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
|
|
51
53
|
'additionalUserDn': !(0, runtime_1.exists)(json, 'additional_user_dn') ? undefined : json['additional_user_dn'],
|
|
52
54
|
'additionalGroupDn': !(0, runtime_1.exists)(json, 'additional_group_dn') ? undefined : json['additional_group_dn'],
|
|
@@ -81,9 +83,11 @@ function PatchedLDAPSourceRequestToJSON(value) {
|
|
|
81
83
|
'user_path_template': value.userPathTemplate,
|
|
82
84
|
'server_uri': value.serverUri,
|
|
83
85
|
'peer_certificate': value.peerCertificate,
|
|
86
|
+
'client_certificate': value.clientCertificate,
|
|
84
87
|
'bind_cn': value.bindCn,
|
|
85
88
|
'bind_password': value.bindPassword,
|
|
86
89
|
'start_tls': value.startTls,
|
|
90
|
+
'sni': value.sni,
|
|
87
91
|
'base_dn': value.baseDn,
|
|
88
92
|
'additional_user_dn': value.additionalUserDn,
|
|
89
93
|
'additional_group_dn': value.additionalGroupDn,
|
package/dist/models/index.d.ts
CHANGED
|
@@ -154,6 +154,7 @@ export * from './LoginChallengeTypes';
|
|
|
154
154
|
export * from './LoginMetrics';
|
|
155
155
|
export * from './LoginSource';
|
|
156
156
|
export * from './Metadata';
|
|
157
|
+
export * from './ModelEnum';
|
|
157
158
|
export * from './NameIdPolicyEnum';
|
|
158
159
|
export * from './NotConfiguredActionEnum';
|
|
159
160
|
export * from './Notification';
|
package/dist/models/index.js
CHANGED
|
@@ -172,6 +172,7 @@ __exportStar(require("./LoginChallengeTypes"), exports);
|
|
|
172
172
|
__exportStar(require("./LoginMetrics"), exports);
|
|
173
173
|
__exportStar(require("./LoginSource"), exports);
|
|
174
174
|
__exportStar(require("./Metadata"), exports);
|
|
175
|
+
__exportStar(require("./ModelEnum"), exports);
|
|
175
176
|
__exportStar(require("./NameIdPolicyEnum"), exports);
|
|
176
177
|
__exportStar(require("./NotConfiguredActionEnum"), exports);
|
|
177
178
|
__exportStar(require("./Notification"), exports);
|
package/package.json
CHANGED
package/src/apis/AdminApi.ts
CHANGED
|
@@ -116,6 +116,36 @@ export class AdminApi extends runtime.BaseAPI {
|
|
|
116
116
|
return await response.value();
|
|
117
117
|
}
|
|
118
118
|
|
|
119
|
+
/**
|
|
120
|
+
* Read-only view list all installed models
|
|
121
|
+
*/
|
|
122
|
+
async adminModelsListRaw(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<App>>> {
|
|
123
|
+
const queryParameters: any = {};
|
|
124
|
+
|
|
125
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
126
|
+
|
|
127
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
128
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
129
|
+
}
|
|
130
|
+
|
|
131
|
+
const response = await this.request({
|
|
132
|
+
path: `/admin/models/`,
|
|
133
|
+
method: 'GET',
|
|
134
|
+
headers: headerParameters,
|
|
135
|
+
query: queryParameters,
|
|
136
|
+
}, initOverrides);
|
|
137
|
+
|
|
138
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(AppFromJSON));
|
|
139
|
+
}
|
|
140
|
+
|
|
141
|
+
/**
|
|
142
|
+
* Read-only view list all installed models
|
|
143
|
+
*/
|
|
144
|
+
async adminModelsList(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<App>> {
|
|
145
|
+
const response = await this.adminModelsListRaw(initOverrides);
|
|
146
|
+
return await response.value();
|
|
147
|
+
}
|
|
148
|
+
|
|
119
149
|
/**
|
|
120
150
|
* Get system information.
|
|
121
151
|
*/
|
package/src/apis/PoliciesApi.ts
CHANGED
|
@@ -258,6 +258,7 @@ export interface PoliciesEventMatcherListRequest {
|
|
|
258
258
|
created?: Date;
|
|
259
259
|
executionLogging?: boolean;
|
|
260
260
|
lastUpdated?: Date;
|
|
261
|
+
model?: string;
|
|
261
262
|
name?: string;
|
|
262
263
|
ordering?: string;
|
|
263
264
|
page?: number;
|
|
@@ -1451,6 +1452,10 @@ export class PoliciesApi extends runtime.BaseAPI {
|
|
|
1451
1452
|
queryParameters['last_updated'] = (requestParameters.lastUpdated as any).toISOString();
|
|
1452
1453
|
}
|
|
1453
1454
|
|
|
1455
|
+
if (requestParameters.model !== undefined) {
|
|
1456
|
+
queryParameters['model'] = requestParameters.model;
|
|
1457
|
+
}
|
|
1458
|
+
|
|
1454
1459
|
if (requestParameters.name !== undefined) {
|
|
1455
1460
|
queryParameters['name'] = requestParameters.name;
|
|
1456
1461
|
}
|
package/src/apis/SourcesApi.ts
CHANGED
|
@@ -201,6 +201,7 @@ export interface SourcesLdapListRequest {
|
|
|
201
201
|
additionalUserDn?: string;
|
|
202
202
|
baseDn?: string;
|
|
203
203
|
bindCn?: string;
|
|
204
|
+
clientCertificate?: string;
|
|
204
205
|
enabled?: boolean;
|
|
205
206
|
groupMembershipField?: string;
|
|
206
207
|
groupObjectFilter?: string;
|
|
@@ -215,6 +216,7 @@ export interface SourcesLdapListRequest {
|
|
|
215
216
|
search?: string;
|
|
216
217
|
serverUri?: string;
|
|
217
218
|
slug?: string;
|
|
219
|
+
sni?: boolean;
|
|
218
220
|
startTls?: boolean;
|
|
219
221
|
syncGroups?: boolean;
|
|
220
222
|
syncParentGroup?: string;
|
|
@@ -984,6 +986,10 @@ export class SourcesApi extends runtime.BaseAPI {
|
|
|
984
986
|
queryParameters['bind_cn'] = requestParameters.bindCn;
|
|
985
987
|
}
|
|
986
988
|
|
|
989
|
+
if (requestParameters.clientCertificate !== undefined) {
|
|
990
|
+
queryParameters['client_certificate'] = requestParameters.clientCertificate;
|
|
991
|
+
}
|
|
992
|
+
|
|
987
993
|
if (requestParameters.enabled !== undefined) {
|
|
988
994
|
queryParameters['enabled'] = requestParameters.enabled;
|
|
989
995
|
}
|
|
@@ -1040,6 +1046,10 @@ export class SourcesApi extends runtime.BaseAPI {
|
|
|
1040
1046
|
queryParameters['slug'] = requestParameters.slug;
|
|
1041
1047
|
}
|
|
1042
1048
|
|
|
1049
|
+
if (requestParameters.sni !== undefined) {
|
|
1050
|
+
queryParameters['sni'] = requestParameters.sni;
|
|
1051
|
+
}
|
|
1052
|
+
|
|
1043
1053
|
if (requestParameters.startTls !== undefined) {
|
|
1044
1054
|
queryParameters['start_tls'] = requestParameters.startTls;
|
|
1045
1055
|
}
|
|
@@ -25,6 +25,12 @@ import {
|
|
|
25
25
|
EventActionsFromJSONTyped,
|
|
26
26
|
EventActionsToJSON,
|
|
27
27
|
} from './EventActions';
|
|
28
|
+
import type { ModelEnum } from './ModelEnum';
|
|
29
|
+
import {
|
|
30
|
+
ModelEnumFromJSON,
|
|
31
|
+
ModelEnumFromJSONTyped,
|
|
32
|
+
ModelEnumToJSON,
|
|
33
|
+
} from './ModelEnum';
|
|
28
34
|
|
|
29
35
|
/**
|
|
30
36
|
* Event Matcher Policy Serializer
|
|
@@ -98,6 +104,12 @@ export interface EventMatcherPolicy {
|
|
|
98
104
|
* @memberof EventMatcherPolicy
|
|
99
105
|
*/
|
|
100
106
|
app?: AppEnum;
|
|
107
|
+
/**
|
|
108
|
+
*
|
|
109
|
+
* @type {ModelEnum}
|
|
110
|
+
* @memberof EventMatcherPolicy
|
|
111
|
+
*/
|
|
112
|
+
model?: ModelEnum;
|
|
101
113
|
}
|
|
102
114
|
|
|
103
115
|
/**
|
|
@@ -137,6 +149,7 @@ export function EventMatcherPolicyFromJSONTyped(json: any, ignoreDiscriminator:
|
|
|
137
149
|
'action': !exists(json, 'action') ? undefined : EventActionsFromJSON(json['action']),
|
|
138
150
|
'clientIp': !exists(json, 'client_ip') ? undefined : json['client_ip'],
|
|
139
151
|
'app': !exists(json, 'app') ? undefined : AppEnumFromJSON(json['app']),
|
|
152
|
+
'model': !exists(json, 'model') ? undefined : ModelEnumFromJSON(json['model']),
|
|
140
153
|
};
|
|
141
154
|
}
|
|
142
155
|
|
|
@@ -154,6 +167,7 @@ export function EventMatcherPolicyToJSON(value?: EventMatcherPolicy | null): any
|
|
|
154
167
|
'action': EventActionsToJSON(value.action),
|
|
155
168
|
'client_ip': value.clientIp,
|
|
156
169
|
'app': AppEnumToJSON(value.app),
|
|
170
|
+
'model': ModelEnumToJSON(value.model),
|
|
157
171
|
};
|
|
158
172
|
}
|
|
159
173
|
|
|
@@ -25,6 +25,12 @@ import {
|
|
|
25
25
|
EventActionsFromJSONTyped,
|
|
26
26
|
EventActionsToJSON,
|
|
27
27
|
} from './EventActions';
|
|
28
|
+
import type { ModelEnum } from './ModelEnum';
|
|
29
|
+
import {
|
|
30
|
+
ModelEnumFromJSON,
|
|
31
|
+
ModelEnumFromJSONTyped,
|
|
32
|
+
ModelEnumToJSON,
|
|
33
|
+
} from './ModelEnum';
|
|
28
34
|
|
|
29
35
|
/**
|
|
30
36
|
* Event Matcher Policy Serializer
|
|
@@ -62,6 +68,12 @@ export interface EventMatcherPolicyRequest {
|
|
|
62
68
|
* @memberof EventMatcherPolicyRequest
|
|
63
69
|
*/
|
|
64
70
|
app?: AppEnum;
|
|
71
|
+
/**
|
|
72
|
+
*
|
|
73
|
+
* @type {ModelEnum}
|
|
74
|
+
* @memberof EventMatcherPolicyRequest
|
|
75
|
+
*/
|
|
76
|
+
model?: ModelEnum;
|
|
65
77
|
}
|
|
66
78
|
|
|
67
79
|
/**
|
|
@@ -89,6 +101,7 @@ export function EventMatcherPolicyRequestFromJSONTyped(json: any, ignoreDiscrimi
|
|
|
89
101
|
'action': !exists(json, 'action') ? undefined : EventActionsFromJSON(json['action']),
|
|
90
102
|
'clientIp': !exists(json, 'client_ip') ? undefined : json['client_ip'],
|
|
91
103
|
'app': !exists(json, 'app') ? undefined : AppEnumFromJSON(json['app']),
|
|
104
|
+
'model': !exists(json, 'model') ? undefined : ModelEnumFromJSON(json['model']),
|
|
92
105
|
};
|
|
93
106
|
}
|
|
94
107
|
|
|
@@ -106,6 +119,7 @@ export function EventMatcherPolicyRequestToJSON(value?: EventMatcherPolicyReques
|
|
|
106
119
|
'action': EventActionsToJSON(value.action),
|
|
107
120
|
'client_ip': value.clientIp,
|
|
108
121
|
'app': AppEnumToJSON(value.app),
|
|
122
|
+
'model': ModelEnumToJSON(value.model),
|
|
109
123
|
};
|
|
110
124
|
}
|
|
111
125
|
|
package/src/models/LDAPSource.ts
CHANGED
|
@@ -135,6 +135,12 @@ export interface LDAPSource {
|
|
|
135
135
|
* @memberof LDAPSource
|
|
136
136
|
*/
|
|
137
137
|
peerCertificate?: string | null;
|
|
138
|
+
/**
|
|
139
|
+
* Client certificate to authenticate against the LDAP Server's Certificate.
|
|
140
|
+
* @type {string}
|
|
141
|
+
* @memberof LDAPSource
|
|
142
|
+
*/
|
|
143
|
+
clientCertificate?: string | null;
|
|
138
144
|
/**
|
|
139
145
|
*
|
|
140
146
|
* @type {string}
|
|
@@ -147,6 +153,12 @@ export interface LDAPSource {
|
|
|
147
153
|
* @memberof LDAPSource
|
|
148
154
|
*/
|
|
149
155
|
startTls?: boolean;
|
|
156
|
+
/**
|
|
157
|
+
*
|
|
158
|
+
* @type {boolean}
|
|
159
|
+
* @memberof LDAPSource
|
|
160
|
+
*/
|
|
161
|
+
sni?: boolean;
|
|
150
162
|
/**
|
|
151
163
|
*
|
|
152
164
|
* @type {string}
|
|
@@ -274,8 +286,10 @@ export function LDAPSourceFromJSONTyped(json: any, ignoreDiscriminator: boolean)
|
|
|
274
286
|
'icon': json['icon'],
|
|
275
287
|
'serverUri': json['server_uri'],
|
|
276
288
|
'peerCertificate': !exists(json, 'peer_certificate') ? undefined : json['peer_certificate'],
|
|
289
|
+
'clientCertificate': !exists(json, 'client_certificate') ? undefined : json['client_certificate'],
|
|
277
290
|
'bindCn': !exists(json, 'bind_cn') ? undefined : json['bind_cn'],
|
|
278
291
|
'startTls': !exists(json, 'start_tls') ? undefined : json['start_tls'],
|
|
292
|
+
'sni': !exists(json, 'sni') ? undefined : json['sni'],
|
|
279
293
|
'baseDn': json['base_dn'],
|
|
280
294
|
'additionalUserDn': !exists(json, 'additional_user_dn') ? undefined : json['additional_user_dn'],
|
|
281
295
|
'additionalGroupDn': !exists(json, 'additional_group_dn') ? undefined : json['additional_group_dn'],
|
|
@@ -311,8 +325,10 @@ export function LDAPSourceToJSON(value?: LDAPSource | null): any {
|
|
|
311
325
|
'user_path_template': value.userPathTemplate,
|
|
312
326
|
'server_uri': value.serverUri,
|
|
313
327
|
'peer_certificate': value.peerCertificate,
|
|
328
|
+
'client_certificate': value.clientCertificate,
|
|
314
329
|
'bind_cn': value.bindCn,
|
|
315
330
|
'start_tls': value.startTls,
|
|
331
|
+
'sni': value.sni,
|
|
316
332
|
'base_dn': value.baseDn,
|
|
317
333
|
'additional_user_dn': value.additionalUserDn,
|
|
318
334
|
'additional_group_dn': value.additionalGroupDn,
|
|
@@ -92,6 +92,12 @@ export interface LDAPSourceRequest {
|
|
|
92
92
|
* @memberof LDAPSourceRequest
|
|
93
93
|
*/
|
|
94
94
|
peerCertificate?: string | null;
|
|
95
|
+
/**
|
|
96
|
+
* Client certificate to authenticate against the LDAP Server's Certificate.
|
|
97
|
+
* @type {string}
|
|
98
|
+
* @memberof LDAPSourceRequest
|
|
99
|
+
*/
|
|
100
|
+
clientCertificate?: string | null;
|
|
95
101
|
/**
|
|
96
102
|
*
|
|
97
103
|
* @type {string}
|
|
@@ -110,6 +116,12 @@ export interface LDAPSourceRequest {
|
|
|
110
116
|
* @memberof LDAPSourceRequest
|
|
111
117
|
*/
|
|
112
118
|
startTls?: boolean;
|
|
119
|
+
/**
|
|
120
|
+
*
|
|
121
|
+
* @type {boolean}
|
|
122
|
+
* @memberof LDAPSourceRequest
|
|
123
|
+
*/
|
|
124
|
+
sni?: boolean;
|
|
113
125
|
/**
|
|
114
126
|
*
|
|
115
127
|
* @type {string}
|
|
@@ -223,9 +235,11 @@ export function LDAPSourceRequestFromJSONTyped(json: any, ignoreDiscriminator: b
|
|
|
223
235
|
'userPathTemplate': !exists(json, 'user_path_template') ? undefined : json['user_path_template'],
|
|
224
236
|
'serverUri': json['server_uri'],
|
|
225
237
|
'peerCertificate': !exists(json, 'peer_certificate') ? undefined : json['peer_certificate'],
|
|
238
|
+
'clientCertificate': !exists(json, 'client_certificate') ? undefined : json['client_certificate'],
|
|
226
239
|
'bindCn': !exists(json, 'bind_cn') ? undefined : json['bind_cn'],
|
|
227
240
|
'bindPassword': !exists(json, 'bind_password') ? undefined : json['bind_password'],
|
|
228
241
|
'startTls': !exists(json, 'start_tls') ? undefined : json['start_tls'],
|
|
242
|
+
'sni': !exists(json, 'sni') ? undefined : json['sni'],
|
|
229
243
|
'baseDn': json['base_dn'],
|
|
230
244
|
'additionalUserDn': !exists(json, 'additional_user_dn') ? undefined : json['additional_user_dn'],
|
|
231
245
|
'additionalGroupDn': !exists(json, 'additional_group_dn') ? undefined : json['additional_group_dn'],
|
|
@@ -261,9 +275,11 @@ export function LDAPSourceRequestToJSON(value?: LDAPSourceRequest | null): any {
|
|
|
261
275
|
'user_path_template': value.userPathTemplate,
|
|
262
276
|
'server_uri': value.serverUri,
|
|
263
277
|
'peer_certificate': value.peerCertificate,
|
|
278
|
+
'client_certificate': value.clientCertificate,
|
|
264
279
|
'bind_cn': value.bindCn,
|
|
265
280
|
'bind_password': value.bindPassword,
|
|
266
281
|
'start_tls': value.startTls,
|
|
282
|
+
'sni': value.sni,
|
|
267
283
|
'base_dn': value.baseDn,
|
|
268
284
|
'additional_user_dn': value.additionalUserDn,
|
|
269
285
|
'additional_group_dn': value.additionalGroupDn,
|