@goauthentik/api 2023.5.3-1685646044 → 2023.5.3-1686600706

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/AdminApi.d.ts +8 -0
  3. package/dist/apis/AdminApi.js +28 -0
  4. package/dist/apis/PoliciesApi.d.ts +1 -0
  5. package/dist/apis/PoliciesApi.js +3 -0
  6. package/dist/apis/SourcesApi.d.ts +2 -0
  7. package/dist/apis/SourcesApi.js +6 -0
  8. package/dist/esm/apis/AdminApi.d.ts +8 -0
  9. package/dist/esm/apis/AdminApi.js +28 -0
  10. package/dist/esm/apis/PoliciesApi.d.ts +1 -0
  11. package/dist/esm/apis/PoliciesApi.js +3 -0
  12. package/dist/esm/apis/SourcesApi.d.ts +2 -0
  13. package/dist/esm/apis/SourcesApi.js +6 -0
  14. package/dist/esm/models/EventMatcherPolicy.d.ts +7 -0
  15. package/dist/esm/models/EventMatcherPolicy.js +3 -0
  16. package/dist/esm/models/EventMatcherPolicyRequest.d.ts +7 -0
  17. package/dist/esm/models/EventMatcherPolicyRequest.js +3 -0
  18. package/dist/esm/models/LDAPSource.d.ts +12 -0
  19. package/dist/esm/models/LDAPSource.js +4 -0
  20. package/dist/esm/models/LDAPSourceRequest.d.ts +12 -0
  21. package/dist/esm/models/LDAPSourceRequest.js +4 -0
  22. package/dist/esm/models/ModelEnum.d.ts +161 -0
  23. package/dist/esm/models/ModelEnum.js +168 -0
  24. package/dist/esm/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
  25. package/dist/esm/models/PatchedEventMatcherPolicyRequest.js +3 -0
  26. package/dist/esm/models/PatchedLDAPSourceRequest.d.ts +12 -0
  27. package/dist/esm/models/PatchedLDAPSourceRequest.js +4 -0
  28. package/dist/esm/models/index.d.ts +1 -0
  29. package/dist/esm/models/index.js +1 -0
  30. package/dist/models/EventMatcherPolicy.d.ts +7 -0
  31. package/dist/models/EventMatcherPolicy.js +3 -0
  32. package/dist/models/EventMatcherPolicyRequest.d.ts +7 -0
  33. package/dist/models/EventMatcherPolicyRequest.js +3 -0
  34. package/dist/models/LDAPSource.d.ts +12 -0
  35. package/dist/models/LDAPSource.js +4 -0
  36. package/dist/models/LDAPSourceRequest.d.ts +12 -0
  37. package/dist/models/LDAPSourceRequest.js +4 -0
  38. package/dist/models/ModelEnum.d.ts +161 -0
  39. package/dist/models/ModelEnum.js +174 -0
  40. package/dist/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
  41. package/dist/models/PatchedEventMatcherPolicyRequest.js +3 -0
  42. package/dist/models/PatchedLDAPSourceRequest.d.ts +12 -0
  43. package/dist/models/PatchedLDAPSourceRequest.js +4 -0
  44. package/dist/models/index.d.ts +1 -0
  45. package/dist/models/index.js +1 -0
  46. package/package.json +1 -1
  47. package/src/apis/AdminApi.ts +30 -0
  48. package/src/apis/PoliciesApi.ts +5 -0
  49. package/src/apis/SourcesApi.ts +10 -0
  50. package/src/models/EventMatcherPolicy.ts +14 -0
  51. package/src/models/EventMatcherPolicyRequest.ts +14 -0
  52. package/src/models/LDAPSource.ts +16 -0
  53. package/src/models/LDAPSourceRequest.ts +16 -0
  54. package/src/models/ModelEnum.ts +176 -0
  55. package/src/models/PatchedEventMatcherPolicyRequest.ts +14 -0
  56. package/src/models/PatchedLDAPSourceRequest.ts +16 -0
  57. package/src/models/index.ts +1 -0
@@ -0,0 +1,174 @@
1
+ "use strict";
2
+ /* tslint:disable */
3
+ /* eslint-disable */
4
+ /**
5
+ * authentik
6
+ * Making authentication simple.
7
+ *
8
+ * The version of the OpenAPI document: 2023.5.3
9
+ * Contact: hello@goauthentik.io
10
+ *
11
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
12
+ * https://openapi-generator.tech
13
+ * Do not edit the class manually.
14
+ */
15
+ Object.defineProperty(exports, "__esModule", { value: true });
16
+ exports.ModelEnumToJSON = exports.ModelEnumFromJSONTyped = exports.ModelEnumFromJSON = exports.ModelEnum = void 0;
17
+ /**
18
+ * * `authentik_crypto.certificatekeypair` - Certificate-Key Pair
19
+ * * `authentik_events.event` - Event
20
+ * * `authentik_events.notificationtransport` - Notification Transport
21
+ * * `authentik_events.notification` - Notification
22
+ * * `authentik_events.notificationrule` - Notification Rule
23
+ * * `authentik_events.notificationwebhookmapping` - Webhook Mapping
24
+ * * `authentik_flows.flow` - Flow
25
+ * * `authentik_flows.flowstagebinding` - Flow Stage Binding
26
+ * * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection
27
+ * * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection
28
+ * * `authentik_outposts.outpost` - outpost
29
+ * * `authentik_policies_dummy.dummypolicy` - Dummy Policy
30
+ * * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy
31
+ * * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy
32
+ * * `authentik_policies_expression.expressionpolicy` - Expression Policy
33
+ * * `authentik_policies_password.passwordpolicy` - Password Policy
34
+ * * `authentik_policies_reputation.reputationpolicy` - Reputation Policy
35
+ * * `authentik_policies_reputation.reputation` - reputation
36
+ * * `authentik_policies.policybinding` - Policy Binding
37
+ * * `authentik_providers_ldap.ldapprovider` - LDAP Provider
38
+ * * `authentik_providers_oauth2.scopemapping` - Scope Mapping
39
+ * * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
40
+ * * `authentik_providers_oauth2.authorizationcode` - Authorization Code
41
+ * * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
42
+ * * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
43
+ * * `authentik_providers_proxy.proxyprovider` - Proxy Provider
44
+ * * `authentik_providers_radius.radiusprovider` - Radius Provider
45
+ * * `authentik_providers_saml.samlprovider` - SAML Provider
46
+ * * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping
47
+ * * `authentik_providers_scim.scimprovider` - SCIM Provider
48
+ * * `authentik_providers_scim.scimmapping` - SCIM Mapping
49
+ * * `authentik_sources_ldap.ldapsource` - LDAP Source
50
+ * * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping
51
+ * * `authentik_sources_oauth.oauthsource` - OAuth Source
52
+ * * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection
53
+ * * `authentik_sources_plex.plexsource` - Plex Source
54
+ * * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection
55
+ * * `authentik_sources_saml.samlsource` - SAML Source
56
+ * * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
57
+ * * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
58
+ * * `authentik_stages_authenticator_duo.duodevice` - Duo Device
59
+ * * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
60
+ * * `authentik_stages_authenticator_sms.smsdevice` - SMS Device
61
+ * * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
62
+ * * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
63
+ * * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage
64
+ * * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage
65
+ * * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device
66
+ * * `authentik_stages_captcha.captchastage` - Captcha Stage
67
+ * * `authentik_stages_consent.consentstage` - Consent Stage
68
+ * * `authentik_stages_consent.userconsent` - User Consent
69
+ * * `authentik_stages_deny.denystage` - Deny Stage
70
+ * * `authentik_stages_dummy.dummystage` - Dummy Stage
71
+ * * `authentik_stages_email.emailstage` - Email Stage
72
+ * * `authentik_stages_identification.identificationstage` - Identification Stage
73
+ * * `authentik_stages_invitation.invitationstage` - Invitation Stage
74
+ * * `authentik_stages_invitation.invitation` - Invitation
75
+ * * `authentik_stages_password.passwordstage` - Password Stage
76
+ * * `authentik_stages_prompt.prompt` - Prompt
77
+ * * `authentik_stages_prompt.promptstage` - Prompt Stage
78
+ * * `authentik_stages_user_delete.userdeletestage` - User Delete Stage
79
+ * * `authentik_stages_user_login.userloginstage` - User Login Stage
80
+ * * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage
81
+ * * `authentik_stages_user_write.userwritestage` - User Write Stage
82
+ * * `authentik_tenants.tenant` - Tenant
83
+ * * `authentik_blueprints.blueprintinstance` - Blueprint Instance
84
+ * * `authentik_core.group` - group
85
+ * * `authentik_core.user` - User
86
+ * * `authentik_core.application` - Application
87
+ * * `authentik_core.token` - Token
88
+ * @export
89
+ */
90
+ exports.ModelEnum = {
91
+ CryptoCertificatekeypair: 'authentik_crypto.certificatekeypair',
92
+ EventsEvent: 'authentik_events.event',
93
+ EventsNotificationtransport: 'authentik_events.notificationtransport',
94
+ EventsNotification: 'authentik_events.notification',
95
+ EventsNotificationrule: 'authentik_events.notificationrule',
96
+ EventsNotificationwebhookmapping: 'authentik_events.notificationwebhookmapping',
97
+ FlowsFlow: 'authentik_flows.flow',
98
+ FlowsFlowstagebinding: 'authentik_flows.flowstagebinding',
99
+ OutpostsDockerserviceconnection: 'authentik_outposts.dockerserviceconnection',
100
+ OutpostsKubernetesserviceconnection: 'authentik_outposts.kubernetesserviceconnection',
101
+ OutpostsOutpost: 'authentik_outposts.outpost',
102
+ PoliciesDummyDummypolicy: 'authentik_policies_dummy.dummypolicy',
103
+ PoliciesEventMatcherEventmatcherpolicy: 'authentik_policies_event_matcher.eventmatcherpolicy',
104
+ PoliciesExpiryPasswordexpirypolicy: 'authentik_policies_expiry.passwordexpirypolicy',
105
+ PoliciesExpressionExpressionpolicy: 'authentik_policies_expression.expressionpolicy',
106
+ PoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
107
+ PoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
108
+ PoliciesReputationReputation: 'authentik_policies_reputation.reputation',
109
+ PoliciesPolicybinding: 'authentik_policies.policybinding',
110
+ ProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
111
+ ProvidersOauth2Scopemapping: 'authentik_providers_oauth2.scopemapping',
112
+ ProvidersOauth2Oauth2provider: 'authentik_providers_oauth2.oauth2provider',
113
+ ProvidersOauth2Authorizationcode: 'authentik_providers_oauth2.authorizationcode',
114
+ ProvidersOauth2Accesstoken: 'authentik_providers_oauth2.accesstoken',
115
+ ProvidersOauth2Refreshtoken: 'authentik_providers_oauth2.refreshtoken',
116
+ ProvidersProxyProxyprovider: 'authentik_providers_proxy.proxyprovider',
117
+ ProvidersRadiusRadiusprovider: 'authentik_providers_radius.radiusprovider',
118
+ ProvidersSamlSamlprovider: 'authentik_providers_saml.samlprovider',
119
+ ProvidersSamlSamlpropertymapping: 'authentik_providers_saml.samlpropertymapping',
120
+ ProvidersScimScimprovider: 'authentik_providers_scim.scimprovider',
121
+ ProvidersScimScimmapping: 'authentik_providers_scim.scimmapping',
122
+ SourcesLdapLdapsource: 'authentik_sources_ldap.ldapsource',
123
+ SourcesLdapLdappropertymapping: 'authentik_sources_ldap.ldappropertymapping',
124
+ SourcesOauthOauthsource: 'authentik_sources_oauth.oauthsource',
125
+ SourcesOauthUseroauthsourceconnection: 'authentik_sources_oauth.useroauthsourceconnection',
126
+ SourcesPlexPlexsource: 'authentik_sources_plex.plexsource',
127
+ SourcesPlexPlexsourceconnection: 'authentik_sources_plex.plexsourceconnection',
128
+ SourcesSamlSamlsource: 'authentik_sources_saml.samlsource',
129
+ SourcesSamlUsersamlsourceconnection: 'authentik_sources_saml.usersamlsourceconnection',
130
+ StagesAuthenticatorDuoAuthenticatorduostage: 'authentik_stages_authenticator_duo.authenticatorduostage',
131
+ StagesAuthenticatorDuoDuodevice: 'authentik_stages_authenticator_duo.duodevice',
132
+ StagesAuthenticatorSmsAuthenticatorsmsstage: 'authentik_stages_authenticator_sms.authenticatorsmsstage',
133
+ StagesAuthenticatorSmsSmsdevice: 'authentik_stages_authenticator_sms.smsdevice',
134
+ StagesAuthenticatorStaticAuthenticatorstaticstage: 'authentik_stages_authenticator_static.authenticatorstaticstage',
135
+ StagesAuthenticatorTotpAuthenticatortotpstage: 'authentik_stages_authenticator_totp.authenticatortotpstage',
136
+ StagesAuthenticatorValidateAuthenticatorvalidatestage: 'authentik_stages_authenticator_validate.authenticatorvalidatestage',
137
+ StagesAuthenticatorWebauthnAuthenticatewebauthnstage: 'authentik_stages_authenticator_webauthn.authenticatewebauthnstage',
138
+ StagesAuthenticatorWebauthnWebauthndevice: 'authentik_stages_authenticator_webauthn.webauthndevice',
139
+ StagesCaptchaCaptchastage: 'authentik_stages_captcha.captchastage',
140
+ StagesConsentConsentstage: 'authentik_stages_consent.consentstage',
141
+ StagesConsentUserconsent: 'authentik_stages_consent.userconsent',
142
+ StagesDenyDenystage: 'authentik_stages_deny.denystage',
143
+ StagesDummyDummystage: 'authentik_stages_dummy.dummystage',
144
+ StagesEmailEmailstage: 'authentik_stages_email.emailstage',
145
+ StagesIdentificationIdentificationstage: 'authentik_stages_identification.identificationstage',
146
+ StagesInvitationInvitationstage: 'authentik_stages_invitation.invitationstage',
147
+ StagesInvitationInvitation: 'authentik_stages_invitation.invitation',
148
+ StagesPasswordPasswordstage: 'authentik_stages_password.passwordstage',
149
+ StagesPromptPrompt: 'authentik_stages_prompt.prompt',
150
+ StagesPromptPromptstage: 'authentik_stages_prompt.promptstage',
151
+ StagesUserDeleteUserdeletestage: 'authentik_stages_user_delete.userdeletestage',
152
+ StagesUserLoginUserloginstage: 'authentik_stages_user_login.userloginstage',
153
+ StagesUserLogoutUserlogoutstage: 'authentik_stages_user_logout.userlogoutstage',
154
+ StagesUserWriteUserwritestage: 'authentik_stages_user_write.userwritestage',
155
+ TenantsTenant: 'authentik_tenants.tenant',
156
+ BlueprintsBlueprintinstance: 'authentik_blueprints.blueprintinstance',
157
+ CoreGroup: 'authentik_core.group',
158
+ CoreUser: 'authentik_core.user',
159
+ CoreApplication: 'authentik_core.application',
160
+ CoreToken: 'authentik_core.token',
161
+ UnknownDefaultOpenApi: '11184809'
162
+ };
163
+ function ModelEnumFromJSON(json) {
164
+ return ModelEnumFromJSONTyped(json, false);
165
+ }
166
+ exports.ModelEnumFromJSON = ModelEnumFromJSON;
167
+ function ModelEnumFromJSONTyped(json, ignoreDiscriminator) {
168
+ return json;
169
+ }
170
+ exports.ModelEnumFromJSONTyped = ModelEnumFromJSONTyped;
171
+ function ModelEnumToJSON(value) {
172
+ return value;
173
+ }
174
+ exports.ModelEnumToJSON = ModelEnumToJSON;
@@ -11,6 +11,7 @@
11
11
  */
12
12
  import type { AppEnum } from './AppEnum';
13
13
  import type { EventActions } from './EventActions';
14
+ import type { ModelEnum } from './ModelEnum';
14
15
  /**
15
16
  * Event Matcher Policy Serializer
16
17
  * @export
@@ -47,6 +48,12 @@ export interface PatchedEventMatcherPolicyRequest {
47
48
  * @memberof PatchedEventMatcherPolicyRequest
48
49
  */
49
50
  app?: AppEnum;
51
+ /**
52
+ *
53
+ * @type {ModelEnum}
54
+ * @memberof PatchedEventMatcherPolicyRequest
55
+ */
56
+ model?: ModelEnum;
50
57
  }
51
58
  /**
52
59
  * Check if a given object implements the PatchedEventMatcherPolicyRequest interface.
@@ -17,6 +17,7 @@ exports.PatchedEventMatcherPolicyRequestToJSON = exports.PatchedEventMatcherPoli
17
17
  const runtime_1 = require("../runtime");
18
18
  const AppEnum_1 = require("./AppEnum");
19
19
  const EventActions_1 = require("./EventActions");
20
+ const ModelEnum_1 = require("./ModelEnum");
20
21
  /**
21
22
  * Check if a given object implements the PatchedEventMatcherPolicyRequest interface.
22
23
  */
@@ -39,6 +40,7 @@ function PatchedEventMatcherPolicyRequestFromJSONTyped(json, ignoreDiscriminator
39
40
  'action': !(0, runtime_1.exists)(json, 'action') ? undefined : (0, EventActions_1.EventActionsFromJSON)(json['action']),
40
41
  'clientIp': !(0, runtime_1.exists)(json, 'client_ip') ? undefined : json['client_ip'],
41
42
  'app': !(0, runtime_1.exists)(json, 'app') ? undefined : (0, AppEnum_1.AppEnumFromJSON)(json['app']),
43
+ 'model': !(0, runtime_1.exists)(json, 'model') ? undefined : (0, ModelEnum_1.ModelEnumFromJSON)(json['model']),
42
44
  };
43
45
  }
44
46
  exports.PatchedEventMatcherPolicyRequestFromJSONTyped = PatchedEventMatcherPolicyRequestFromJSONTyped;
@@ -55,6 +57,7 @@ function PatchedEventMatcherPolicyRequestToJSON(value) {
55
57
  'action': (0, EventActions_1.EventActionsToJSON)(value.action),
56
58
  'client_ip': value.clientIp,
57
59
  'app': (0, AppEnum_1.AppEnumToJSON)(value.app),
60
+ 'model': (0, ModelEnum_1.ModelEnumToJSON)(value.model),
58
61
  };
59
62
  }
60
63
  exports.PatchedEventMatcherPolicyRequestToJSON = PatchedEventMatcherPolicyRequestToJSON;
@@ -77,6 +77,12 @@ export interface PatchedLDAPSourceRequest {
77
77
  * @memberof PatchedLDAPSourceRequest
78
78
  */
79
79
  peerCertificate?: string | null;
80
+ /**
81
+ * Client certificate to authenticate against the LDAP Server's Certificate.
82
+ * @type {string}
83
+ * @memberof PatchedLDAPSourceRequest
84
+ */
85
+ clientCertificate?: string | null;
80
86
  /**
81
87
  *
82
88
  * @type {string}
@@ -95,6 +101,12 @@ export interface PatchedLDAPSourceRequest {
95
101
  * @memberof PatchedLDAPSourceRequest
96
102
  */
97
103
  startTls?: boolean;
104
+ /**
105
+ *
106
+ * @type {boolean}
107
+ * @memberof PatchedLDAPSourceRequest
108
+ */
109
+ sni?: boolean;
98
110
  /**
99
111
  *
100
112
  * @type {string}
@@ -44,9 +44,11 @@ function PatchedLDAPSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
44
44
  'userPathTemplate': !(0, runtime_1.exists)(json, 'user_path_template') ? undefined : json['user_path_template'],
45
45
  'serverUri': !(0, runtime_1.exists)(json, 'server_uri') ? undefined : json['server_uri'],
46
46
  'peerCertificate': !(0, runtime_1.exists)(json, 'peer_certificate') ? undefined : json['peer_certificate'],
47
+ 'clientCertificate': !(0, runtime_1.exists)(json, 'client_certificate') ? undefined : json['client_certificate'],
47
48
  'bindCn': !(0, runtime_1.exists)(json, 'bind_cn') ? undefined : json['bind_cn'],
48
49
  'bindPassword': !(0, runtime_1.exists)(json, 'bind_password') ? undefined : json['bind_password'],
49
50
  'startTls': !(0, runtime_1.exists)(json, 'start_tls') ? undefined : json['start_tls'],
51
+ 'sni': !(0, runtime_1.exists)(json, 'sni') ? undefined : json['sni'],
50
52
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
51
53
  'additionalUserDn': !(0, runtime_1.exists)(json, 'additional_user_dn') ? undefined : json['additional_user_dn'],
52
54
  'additionalGroupDn': !(0, runtime_1.exists)(json, 'additional_group_dn') ? undefined : json['additional_group_dn'],
@@ -81,9 +83,11 @@ function PatchedLDAPSourceRequestToJSON(value) {
81
83
  'user_path_template': value.userPathTemplate,
82
84
  'server_uri': value.serverUri,
83
85
  'peer_certificate': value.peerCertificate,
86
+ 'client_certificate': value.clientCertificate,
84
87
  'bind_cn': value.bindCn,
85
88
  'bind_password': value.bindPassword,
86
89
  'start_tls': value.startTls,
90
+ 'sni': value.sni,
87
91
  'base_dn': value.baseDn,
88
92
  'additional_user_dn': value.additionalUserDn,
89
93
  'additional_group_dn': value.additionalGroupDn,
@@ -154,6 +154,7 @@ export * from './LoginChallengeTypes';
154
154
  export * from './LoginMetrics';
155
155
  export * from './LoginSource';
156
156
  export * from './Metadata';
157
+ export * from './ModelEnum';
157
158
  export * from './NameIdPolicyEnum';
158
159
  export * from './NotConfiguredActionEnum';
159
160
  export * from './Notification';
@@ -172,6 +172,7 @@ __exportStar(require("./LoginChallengeTypes"), exports);
172
172
  __exportStar(require("./LoginMetrics"), exports);
173
173
  __exportStar(require("./LoginSource"), exports);
174
174
  __exportStar(require("./Metadata"), exports);
175
+ __exportStar(require("./ModelEnum"), exports);
175
176
  __exportStar(require("./NameIdPolicyEnum"), exports);
176
177
  __exportStar(require("./NotConfiguredActionEnum"), exports);
177
178
  __exportStar(require("./Notification"), exports);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2023.5.3-1685646044",
3
+ "version": "2023.5.3-1686600706",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -116,6 +116,36 @@ export class AdminApi extends runtime.BaseAPI {
116
116
  return await response.value();
117
117
  }
118
118
 
119
+ /**
120
+ * Read-only view list all installed models
121
+ */
122
+ async adminModelsListRaw(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<App>>> {
123
+ const queryParameters: any = {};
124
+
125
+ const headerParameters: runtime.HTTPHeaders = {};
126
+
127
+ if (this.configuration && this.configuration.apiKey) {
128
+ headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
129
+ }
130
+
131
+ const response = await this.request({
132
+ path: `/admin/models/`,
133
+ method: 'GET',
134
+ headers: headerParameters,
135
+ query: queryParameters,
136
+ }, initOverrides);
137
+
138
+ return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(AppFromJSON));
139
+ }
140
+
141
+ /**
142
+ * Read-only view list all installed models
143
+ */
144
+ async adminModelsList(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<App>> {
145
+ const response = await this.adminModelsListRaw(initOverrides);
146
+ return await response.value();
147
+ }
148
+
119
149
  /**
120
150
  * Get system information.
121
151
  */
@@ -258,6 +258,7 @@ export interface PoliciesEventMatcherListRequest {
258
258
  created?: Date;
259
259
  executionLogging?: boolean;
260
260
  lastUpdated?: Date;
261
+ model?: string;
261
262
  name?: string;
262
263
  ordering?: string;
263
264
  page?: number;
@@ -1451,6 +1452,10 @@ export class PoliciesApi extends runtime.BaseAPI {
1451
1452
  queryParameters['last_updated'] = (requestParameters.lastUpdated as any).toISOString();
1452
1453
  }
1453
1454
 
1455
+ if (requestParameters.model !== undefined) {
1456
+ queryParameters['model'] = requestParameters.model;
1457
+ }
1458
+
1454
1459
  if (requestParameters.name !== undefined) {
1455
1460
  queryParameters['name'] = requestParameters.name;
1456
1461
  }
@@ -201,6 +201,7 @@ export interface SourcesLdapListRequest {
201
201
  additionalUserDn?: string;
202
202
  baseDn?: string;
203
203
  bindCn?: string;
204
+ clientCertificate?: string;
204
205
  enabled?: boolean;
205
206
  groupMembershipField?: string;
206
207
  groupObjectFilter?: string;
@@ -215,6 +216,7 @@ export interface SourcesLdapListRequest {
215
216
  search?: string;
216
217
  serverUri?: string;
217
218
  slug?: string;
219
+ sni?: boolean;
218
220
  startTls?: boolean;
219
221
  syncGroups?: boolean;
220
222
  syncParentGroup?: string;
@@ -984,6 +986,10 @@ export class SourcesApi extends runtime.BaseAPI {
984
986
  queryParameters['bind_cn'] = requestParameters.bindCn;
985
987
  }
986
988
 
989
+ if (requestParameters.clientCertificate !== undefined) {
990
+ queryParameters['client_certificate'] = requestParameters.clientCertificate;
991
+ }
992
+
987
993
  if (requestParameters.enabled !== undefined) {
988
994
  queryParameters['enabled'] = requestParameters.enabled;
989
995
  }
@@ -1040,6 +1046,10 @@ export class SourcesApi extends runtime.BaseAPI {
1040
1046
  queryParameters['slug'] = requestParameters.slug;
1041
1047
  }
1042
1048
 
1049
+ if (requestParameters.sni !== undefined) {
1050
+ queryParameters['sni'] = requestParameters.sni;
1051
+ }
1052
+
1043
1053
  if (requestParameters.startTls !== undefined) {
1044
1054
  queryParameters['start_tls'] = requestParameters.startTls;
1045
1055
  }
@@ -25,6 +25,12 @@ import {
25
25
  EventActionsFromJSONTyped,
26
26
  EventActionsToJSON,
27
27
  } from './EventActions';
28
+ import type { ModelEnum } from './ModelEnum';
29
+ import {
30
+ ModelEnumFromJSON,
31
+ ModelEnumFromJSONTyped,
32
+ ModelEnumToJSON,
33
+ } from './ModelEnum';
28
34
 
29
35
  /**
30
36
  * Event Matcher Policy Serializer
@@ -98,6 +104,12 @@ export interface EventMatcherPolicy {
98
104
  * @memberof EventMatcherPolicy
99
105
  */
100
106
  app?: AppEnum;
107
+ /**
108
+ *
109
+ * @type {ModelEnum}
110
+ * @memberof EventMatcherPolicy
111
+ */
112
+ model?: ModelEnum;
101
113
  }
102
114
 
103
115
  /**
@@ -137,6 +149,7 @@ export function EventMatcherPolicyFromJSONTyped(json: any, ignoreDiscriminator:
137
149
  'action': !exists(json, 'action') ? undefined : EventActionsFromJSON(json['action']),
138
150
  'clientIp': !exists(json, 'client_ip') ? undefined : json['client_ip'],
139
151
  'app': !exists(json, 'app') ? undefined : AppEnumFromJSON(json['app']),
152
+ 'model': !exists(json, 'model') ? undefined : ModelEnumFromJSON(json['model']),
140
153
  };
141
154
  }
142
155
 
@@ -154,6 +167,7 @@ export function EventMatcherPolicyToJSON(value?: EventMatcherPolicy | null): any
154
167
  'action': EventActionsToJSON(value.action),
155
168
  'client_ip': value.clientIp,
156
169
  'app': AppEnumToJSON(value.app),
170
+ 'model': ModelEnumToJSON(value.model),
157
171
  };
158
172
  }
159
173
 
@@ -25,6 +25,12 @@ import {
25
25
  EventActionsFromJSONTyped,
26
26
  EventActionsToJSON,
27
27
  } from './EventActions';
28
+ import type { ModelEnum } from './ModelEnum';
29
+ import {
30
+ ModelEnumFromJSON,
31
+ ModelEnumFromJSONTyped,
32
+ ModelEnumToJSON,
33
+ } from './ModelEnum';
28
34
 
29
35
  /**
30
36
  * Event Matcher Policy Serializer
@@ -62,6 +68,12 @@ export interface EventMatcherPolicyRequest {
62
68
  * @memberof EventMatcherPolicyRequest
63
69
  */
64
70
  app?: AppEnum;
71
+ /**
72
+ *
73
+ * @type {ModelEnum}
74
+ * @memberof EventMatcherPolicyRequest
75
+ */
76
+ model?: ModelEnum;
65
77
  }
66
78
 
67
79
  /**
@@ -89,6 +101,7 @@ export function EventMatcherPolicyRequestFromJSONTyped(json: any, ignoreDiscrimi
89
101
  'action': !exists(json, 'action') ? undefined : EventActionsFromJSON(json['action']),
90
102
  'clientIp': !exists(json, 'client_ip') ? undefined : json['client_ip'],
91
103
  'app': !exists(json, 'app') ? undefined : AppEnumFromJSON(json['app']),
104
+ 'model': !exists(json, 'model') ? undefined : ModelEnumFromJSON(json['model']),
92
105
  };
93
106
  }
94
107
 
@@ -106,6 +119,7 @@ export function EventMatcherPolicyRequestToJSON(value?: EventMatcherPolicyReques
106
119
  'action': EventActionsToJSON(value.action),
107
120
  'client_ip': value.clientIp,
108
121
  'app': AppEnumToJSON(value.app),
122
+ 'model': ModelEnumToJSON(value.model),
109
123
  };
110
124
  }
111
125
 
@@ -135,6 +135,12 @@ export interface LDAPSource {
135
135
  * @memberof LDAPSource
136
136
  */
137
137
  peerCertificate?: string | null;
138
+ /**
139
+ * Client certificate to authenticate against the LDAP Server's Certificate.
140
+ * @type {string}
141
+ * @memberof LDAPSource
142
+ */
143
+ clientCertificate?: string | null;
138
144
  /**
139
145
  *
140
146
  * @type {string}
@@ -147,6 +153,12 @@ export interface LDAPSource {
147
153
  * @memberof LDAPSource
148
154
  */
149
155
  startTls?: boolean;
156
+ /**
157
+ *
158
+ * @type {boolean}
159
+ * @memberof LDAPSource
160
+ */
161
+ sni?: boolean;
150
162
  /**
151
163
  *
152
164
  * @type {string}
@@ -274,8 +286,10 @@ export function LDAPSourceFromJSONTyped(json: any, ignoreDiscriminator: boolean)
274
286
  'icon': json['icon'],
275
287
  'serverUri': json['server_uri'],
276
288
  'peerCertificate': !exists(json, 'peer_certificate') ? undefined : json['peer_certificate'],
289
+ 'clientCertificate': !exists(json, 'client_certificate') ? undefined : json['client_certificate'],
277
290
  'bindCn': !exists(json, 'bind_cn') ? undefined : json['bind_cn'],
278
291
  'startTls': !exists(json, 'start_tls') ? undefined : json['start_tls'],
292
+ 'sni': !exists(json, 'sni') ? undefined : json['sni'],
279
293
  'baseDn': json['base_dn'],
280
294
  'additionalUserDn': !exists(json, 'additional_user_dn') ? undefined : json['additional_user_dn'],
281
295
  'additionalGroupDn': !exists(json, 'additional_group_dn') ? undefined : json['additional_group_dn'],
@@ -311,8 +325,10 @@ export function LDAPSourceToJSON(value?: LDAPSource | null): any {
311
325
  'user_path_template': value.userPathTemplate,
312
326
  'server_uri': value.serverUri,
313
327
  'peer_certificate': value.peerCertificate,
328
+ 'client_certificate': value.clientCertificate,
314
329
  'bind_cn': value.bindCn,
315
330
  'start_tls': value.startTls,
331
+ 'sni': value.sni,
316
332
  'base_dn': value.baseDn,
317
333
  'additional_user_dn': value.additionalUserDn,
318
334
  'additional_group_dn': value.additionalGroupDn,
@@ -92,6 +92,12 @@ export interface LDAPSourceRequest {
92
92
  * @memberof LDAPSourceRequest
93
93
  */
94
94
  peerCertificate?: string | null;
95
+ /**
96
+ * Client certificate to authenticate against the LDAP Server's Certificate.
97
+ * @type {string}
98
+ * @memberof LDAPSourceRequest
99
+ */
100
+ clientCertificate?: string | null;
95
101
  /**
96
102
  *
97
103
  * @type {string}
@@ -110,6 +116,12 @@ export interface LDAPSourceRequest {
110
116
  * @memberof LDAPSourceRequest
111
117
  */
112
118
  startTls?: boolean;
119
+ /**
120
+ *
121
+ * @type {boolean}
122
+ * @memberof LDAPSourceRequest
123
+ */
124
+ sni?: boolean;
113
125
  /**
114
126
  *
115
127
  * @type {string}
@@ -223,9 +235,11 @@ export function LDAPSourceRequestFromJSONTyped(json: any, ignoreDiscriminator: b
223
235
  'userPathTemplate': !exists(json, 'user_path_template') ? undefined : json['user_path_template'],
224
236
  'serverUri': json['server_uri'],
225
237
  'peerCertificate': !exists(json, 'peer_certificate') ? undefined : json['peer_certificate'],
238
+ 'clientCertificate': !exists(json, 'client_certificate') ? undefined : json['client_certificate'],
226
239
  'bindCn': !exists(json, 'bind_cn') ? undefined : json['bind_cn'],
227
240
  'bindPassword': !exists(json, 'bind_password') ? undefined : json['bind_password'],
228
241
  'startTls': !exists(json, 'start_tls') ? undefined : json['start_tls'],
242
+ 'sni': !exists(json, 'sni') ? undefined : json['sni'],
229
243
  'baseDn': json['base_dn'],
230
244
  'additionalUserDn': !exists(json, 'additional_user_dn') ? undefined : json['additional_user_dn'],
231
245
  'additionalGroupDn': !exists(json, 'additional_group_dn') ? undefined : json['additional_group_dn'],
@@ -261,9 +275,11 @@ export function LDAPSourceRequestToJSON(value?: LDAPSourceRequest | null): any {
261
275
  'user_path_template': value.userPathTemplate,
262
276
  'server_uri': value.serverUri,
263
277
  'peer_certificate': value.peerCertificate,
278
+ 'client_certificate': value.clientCertificate,
264
279
  'bind_cn': value.bindCn,
265
280
  'bind_password': value.bindPassword,
266
281
  'start_tls': value.startTls,
282
+ 'sni': value.sni,
267
283
  'base_dn': value.baseDn,
268
284
  'additional_user_dn': value.additionalUserDn,
269
285
  'additional_group_dn': value.additionalGroupDn,