@goauthentik/api 2023.5.3-1686577333 → 2023.5.3-1687255782
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +1 -0
- package/dist/apis/AdminApi.d.ts +8 -0
- package/dist/apis/AdminApi.js +28 -0
- package/dist/apis/PoliciesApi.d.ts +1 -0
- package/dist/apis/PoliciesApi.js +3 -0
- package/dist/esm/apis/AdminApi.d.ts +8 -0
- package/dist/esm/apis/AdminApi.js +28 -0
- package/dist/esm/apis/PoliciesApi.d.ts +1 -0
- package/dist/esm/apis/PoliciesApi.js +3 -0
- package/dist/esm/models/EventMatcherPolicy.d.ts +7 -0
- package/dist/esm/models/EventMatcherPolicy.js +3 -0
- package/dist/esm/models/EventMatcherPolicyRequest.d.ts +7 -0
- package/dist/esm/models/EventMatcherPolicyRequest.js +3 -0
- package/dist/esm/models/LDAPOutpostConfig.d.ts +8 -2
- package/dist/esm/models/LDAPOutpostConfig.js +2 -0
- package/dist/esm/models/LDAPProvider.d.ts +8 -2
- package/dist/esm/models/LDAPProvider.js +2 -0
- package/dist/esm/models/LDAPProviderRequest.d.ts +8 -2
- package/dist/esm/models/LDAPProviderRequest.js +2 -0
- package/dist/esm/models/ModelEnum.d.ts +161 -0
- package/dist/esm/models/ModelEnum.js +168 -0
- package/dist/esm/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
- package/dist/esm/models/PatchedEventMatcherPolicyRequest.js +3 -0
- package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +8 -2
- package/dist/esm/models/PatchedLDAPProviderRequest.js +2 -0
- package/dist/esm/models/index.d.ts +1 -0
- package/dist/esm/models/index.js +1 -0
- package/dist/models/EventMatcherPolicy.d.ts +7 -0
- package/dist/models/EventMatcherPolicy.js +3 -0
- package/dist/models/EventMatcherPolicyRequest.d.ts +7 -0
- package/dist/models/EventMatcherPolicyRequest.js +3 -0
- package/dist/models/LDAPOutpostConfig.d.ts +8 -2
- package/dist/models/LDAPOutpostConfig.js +2 -0
- package/dist/models/LDAPProvider.d.ts +8 -2
- package/dist/models/LDAPProvider.js +2 -0
- package/dist/models/LDAPProviderRequest.d.ts +8 -2
- package/dist/models/LDAPProviderRequest.js +2 -0
- package/dist/models/ModelEnum.d.ts +161 -0
- package/dist/models/ModelEnum.js +174 -0
- package/dist/models/PatchedEventMatcherPolicyRequest.d.ts +7 -0
- package/dist/models/PatchedEventMatcherPolicyRequest.js +3 -0
- package/dist/models/PatchedLDAPProviderRequest.d.ts +8 -2
- package/dist/models/PatchedLDAPProviderRequest.js +2 -0
- package/dist/models/index.d.ts +1 -0
- package/dist/models/index.js +1 -0
- package/package.json +1 -1
- package/src/apis/AdminApi.ts +30 -0
- package/src/apis/PoliciesApi.ts +5 -0
- package/src/models/EventMatcherPolicy.ts +14 -0
- package/src/models/EventMatcherPolicyRequest.ts +14 -0
- package/src/models/LDAPOutpostConfig.ts +10 -2
- package/src/models/LDAPProvider.ts +10 -2
- package/src/models/LDAPProviderRequest.ts +10 -2
- package/src/models/ModelEnum.ts +176 -0
- package/src/models/PatchedEventMatcherPolicyRequest.ts +14 -0
- package/src/models/PatchedLDAPProviderRequest.ts +10 -2
- package/src/models/index.ts +1 -0
package/.openapi-generator/FILES
CHANGED
|
@@ -177,6 +177,7 @@ src/models/LoginChallengeTypes.ts
|
|
|
177
177
|
src/models/LoginMetrics.ts
|
|
178
178
|
src/models/LoginSource.ts
|
|
179
179
|
src/models/Metadata.ts
|
|
180
|
+
src/models/ModelEnum.ts
|
|
180
181
|
src/models/NameIdPolicyEnum.ts
|
|
181
182
|
src/models/NotConfiguredActionEnum.ts
|
|
182
183
|
src/models/Notification.ts
|
package/dist/apis/AdminApi.d.ts
CHANGED
|
@@ -37,6 +37,14 @@ export declare class AdminApi extends runtime.BaseAPI {
|
|
|
37
37
|
* Login Metrics per 1h
|
|
38
38
|
*/
|
|
39
39
|
adminMetricsRetrieve(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LoginMetrics>;
|
|
40
|
+
/**
|
|
41
|
+
* Read-only view list all installed models
|
|
42
|
+
*/
|
|
43
|
+
adminModelsListRaw(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<App>>>;
|
|
44
|
+
/**
|
|
45
|
+
* Read-only view list all installed models
|
|
46
|
+
*/
|
|
47
|
+
adminModelsList(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<App>>;
|
|
40
48
|
/**
|
|
41
49
|
* Get system information.
|
|
42
50
|
*/
|
package/dist/apis/AdminApi.js
CHANGED
|
@@ -85,6 +85,34 @@ class AdminApi extends runtime.BaseAPI {
|
|
|
85
85
|
return yield response.value();
|
|
86
86
|
});
|
|
87
87
|
}
|
|
88
|
+
/**
|
|
89
|
+
* Read-only view list all installed models
|
|
90
|
+
*/
|
|
91
|
+
adminModelsListRaw(initOverrides) {
|
|
92
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
93
|
+
const queryParameters = {};
|
|
94
|
+
const headerParameters = {};
|
|
95
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
96
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
97
|
+
}
|
|
98
|
+
const response = yield this.request({
|
|
99
|
+
path: `/admin/models/`,
|
|
100
|
+
method: 'GET',
|
|
101
|
+
headers: headerParameters,
|
|
102
|
+
query: queryParameters,
|
|
103
|
+
}, initOverrides);
|
|
104
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(models_1.AppFromJSON));
|
|
105
|
+
});
|
|
106
|
+
}
|
|
107
|
+
/**
|
|
108
|
+
* Read-only view list all installed models
|
|
109
|
+
*/
|
|
110
|
+
adminModelsList(initOverrides) {
|
|
111
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
112
|
+
const response = yield this.adminModelsListRaw(initOverrides);
|
|
113
|
+
return yield response.value();
|
|
114
|
+
});
|
|
115
|
+
}
|
|
88
116
|
/**
|
|
89
117
|
* Get system information.
|
|
90
118
|
*/
|
package/dist/apis/PoliciesApi.js
CHANGED
|
@@ -886,6 +886,9 @@ class PoliciesApi extends runtime.BaseAPI {
|
|
|
886
886
|
if (requestParameters.lastUpdated !== undefined) {
|
|
887
887
|
queryParameters['last_updated'] = requestParameters.lastUpdated.toISOString();
|
|
888
888
|
}
|
|
889
|
+
if (requestParameters.model !== undefined) {
|
|
890
|
+
queryParameters['model'] = requestParameters.model;
|
|
891
|
+
}
|
|
889
892
|
if (requestParameters.name !== undefined) {
|
|
890
893
|
queryParameters['name'] = requestParameters.name;
|
|
891
894
|
}
|
|
@@ -37,6 +37,14 @@ export declare class AdminApi extends runtime.BaseAPI {
|
|
|
37
37
|
* Login Metrics per 1h
|
|
38
38
|
*/
|
|
39
39
|
adminMetricsRetrieve(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LoginMetrics>;
|
|
40
|
+
/**
|
|
41
|
+
* Read-only view list all installed models
|
|
42
|
+
*/
|
|
43
|
+
adminModelsListRaw(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<App>>>;
|
|
44
|
+
/**
|
|
45
|
+
* Read-only view list all installed models
|
|
46
|
+
*/
|
|
47
|
+
adminModelsList(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<App>>;
|
|
40
48
|
/**
|
|
41
49
|
* Get system information.
|
|
42
50
|
*/
|
|
@@ -82,6 +82,34 @@ export class AdminApi extends runtime.BaseAPI {
|
|
|
82
82
|
return yield response.value();
|
|
83
83
|
});
|
|
84
84
|
}
|
|
85
|
+
/**
|
|
86
|
+
* Read-only view list all installed models
|
|
87
|
+
*/
|
|
88
|
+
adminModelsListRaw(initOverrides) {
|
|
89
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
90
|
+
const queryParameters = {};
|
|
91
|
+
const headerParameters = {};
|
|
92
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
93
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
94
|
+
}
|
|
95
|
+
const response = yield this.request({
|
|
96
|
+
path: `/admin/models/`,
|
|
97
|
+
method: 'GET',
|
|
98
|
+
headers: headerParameters,
|
|
99
|
+
query: queryParameters,
|
|
100
|
+
}, initOverrides);
|
|
101
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(AppFromJSON));
|
|
102
|
+
});
|
|
103
|
+
}
|
|
104
|
+
/**
|
|
105
|
+
* Read-only view list all installed models
|
|
106
|
+
*/
|
|
107
|
+
adminModelsList(initOverrides) {
|
|
108
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
109
|
+
const response = yield this.adminModelsListRaw(initOverrides);
|
|
110
|
+
return yield response.value();
|
|
111
|
+
});
|
|
112
|
+
}
|
|
85
113
|
/**
|
|
86
114
|
* Get system information.
|
|
87
115
|
*/
|
|
@@ -883,6 +883,9 @@ export class PoliciesApi extends runtime.BaseAPI {
|
|
|
883
883
|
if (requestParameters.lastUpdated !== undefined) {
|
|
884
884
|
queryParameters['last_updated'] = requestParameters.lastUpdated.toISOString();
|
|
885
885
|
}
|
|
886
|
+
if (requestParameters.model !== undefined) {
|
|
887
|
+
queryParameters['model'] = requestParameters.model;
|
|
888
|
+
}
|
|
886
889
|
if (requestParameters.name !== undefined) {
|
|
887
890
|
queryParameters['name'] = requestParameters.name;
|
|
888
891
|
}
|
|
@@ -11,6 +11,7 @@
|
|
|
11
11
|
*/
|
|
12
12
|
import type { AppEnum } from './AppEnum';
|
|
13
13
|
import type { EventActions } from './EventActions';
|
|
14
|
+
import type { ModelEnum } from './ModelEnum';
|
|
14
15
|
/**
|
|
15
16
|
* Event Matcher Policy Serializer
|
|
16
17
|
* @export
|
|
@@ -83,6 +84,12 @@ export interface EventMatcherPolicy {
|
|
|
83
84
|
* @memberof EventMatcherPolicy
|
|
84
85
|
*/
|
|
85
86
|
app?: AppEnum;
|
|
87
|
+
/**
|
|
88
|
+
*
|
|
89
|
+
* @type {ModelEnum}
|
|
90
|
+
* @memberof EventMatcherPolicy
|
|
91
|
+
*/
|
|
92
|
+
model?: ModelEnum;
|
|
86
93
|
}
|
|
87
94
|
/**
|
|
88
95
|
* Check if a given object implements the EventMatcherPolicy interface.
|
|
@@ -14,6 +14,7 @@
|
|
|
14
14
|
import { exists } from '../runtime';
|
|
15
15
|
import { AppEnumFromJSON, AppEnumToJSON, } from './AppEnum';
|
|
16
16
|
import { EventActionsFromJSON, EventActionsToJSON, } from './EventActions';
|
|
17
|
+
import { ModelEnumFromJSON, ModelEnumToJSON, } from './ModelEnum';
|
|
17
18
|
/**
|
|
18
19
|
* Check if a given object implements the EventMatcherPolicy interface.
|
|
19
20
|
*/
|
|
@@ -47,6 +48,7 @@ export function EventMatcherPolicyFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
47
48
|
'action': !exists(json, 'action') ? undefined : EventActionsFromJSON(json['action']),
|
|
48
49
|
'clientIp': !exists(json, 'client_ip') ? undefined : json['client_ip'],
|
|
49
50
|
'app': !exists(json, 'app') ? undefined : AppEnumFromJSON(json['app']),
|
|
51
|
+
'model': !exists(json, 'model') ? undefined : ModelEnumFromJSON(json['model']),
|
|
50
52
|
};
|
|
51
53
|
}
|
|
52
54
|
export function EventMatcherPolicyToJSON(value) {
|
|
@@ -62,5 +64,6 @@ export function EventMatcherPolicyToJSON(value) {
|
|
|
62
64
|
'action': EventActionsToJSON(value.action),
|
|
63
65
|
'client_ip': value.clientIp,
|
|
64
66
|
'app': AppEnumToJSON(value.app),
|
|
67
|
+
'model': ModelEnumToJSON(value.model),
|
|
65
68
|
};
|
|
66
69
|
}
|
|
@@ -11,6 +11,7 @@
|
|
|
11
11
|
*/
|
|
12
12
|
import type { AppEnum } from './AppEnum';
|
|
13
13
|
import type { EventActions } from './EventActions';
|
|
14
|
+
import type { ModelEnum } from './ModelEnum';
|
|
14
15
|
/**
|
|
15
16
|
* Event Matcher Policy Serializer
|
|
16
17
|
* @export
|
|
@@ -47,6 +48,12 @@ export interface EventMatcherPolicyRequest {
|
|
|
47
48
|
* @memberof EventMatcherPolicyRequest
|
|
48
49
|
*/
|
|
49
50
|
app?: AppEnum;
|
|
51
|
+
/**
|
|
52
|
+
*
|
|
53
|
+
* @type {ModelEnum}
|
|
54
|
+
* @memberof EventMatcherPolicyRequest
|
|
55
|
+
*/
|
|
56
|
+
model?: ModelEnum;
|
|
50
57
|
}
|
|
51
58
|
/**
|
|
52
59
|
* Check if a given object implements the EventMatcherPolicyRequest interface.
|
|
@@ -14,6 +14,7 @@
|
|
|
14
14
|
import { exists } from '../runtime';
|
|
15
15
|
import { AppEnumFromJSON, AppEnumToJSON, } from './AppEnum';
|
|
16
16
|
import { EventActionsFromJSON, EventActionsToJSON, } from './EventActions';
|
|
17
|
+
import { ModelEnumFromJSON, ModelEnumToJSON, } from './ModelEnum';
|
|
17
18
|
/**
|
|
18
19
|
* Check if a given object implements the EventMatcherPolicyRequest interface.
|
|
19
20
|
*/
|
|
@@ -35,6 +36,7 @@ export function EventMatcherPolicyRequestFromJSONTyped(json, ignoreDiscriminator
|
|
|
35
36
|
'action': !exists(json, 'action') ? undefined : EventActionsFromJSON(json['action']),
|
|
36
37
|
'clientIp': !exists(json, 'client_ip') ? undefined : json['client_ip'],
|
|
37
38
|
'app': !exists(json, 'app') ? undefined : AppEnumFromJSON(json['app']),
|
|
39
|
+
'model': !exists(json, 'model') ? undefined : ModelEnumFromJSON(json['model']),
|
|
38
40
|
};
|
|
39
41
|
}
|
|
40
42
|
export function EventMatcherPolicyRequestToJSON(value) {
|
|
@@ -50,5 +52,6 @@ export function EventMatcherPolicyRequestToJSON(value) {
|
|
|
50
52
|
'action': EventActionsToJSON(value.action),
|
|
51
53
|
'client_ip': value.clientIp,
|
|
52
54
|
'app': AppEnumToJSON(value.app),
|
|
55
|
+
'model': ModelEnumToJSON(value.model),
|
|
53
56
|
};
|
|
54
57
|
}
|
|
@@ -65,13 +65,13 @@ export interface LDAPOutpostConfig {
|
|
|
65
65
|
*/
|
|
66
66
|
tlsServerName?: string;
|
|
67
67
|
/**
|
|
68
|
-
* The start for uidNumbers, this number is added to the user.
|
|
68
|
+
* The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
|
|
69
69
|
* @type {number}
|
|
70
70
|
* @memberof LDAPOutpostConfig
|
|
71
71
|
*/
|
|
72
72
|
uidStartNumber?: number;
|
|
73
73
|
/**
|
|
74
|
-
* The start for gidNumbers, this number is added to a number generated from the group.
|
|
74
|
+
* The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
|
|
75
75
|
* @type {number}
|
|
76
76
|
* @memberof LDAPOutpostConfig
|
|
77
77
|
*/
|
|
@@ -88,6 +88,12 @@ export interface LDAPOutpostConfig {
|
|
|
88
88
|
* @memberof LDAPOutpostConfig
|
|
89
89
|
*/
|
|
90
90
|
bindMode?: LDAPAPIAccessMode;
|
|
91
|
+
/**
|
|
92
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
93
|
+
* @type {boolean}
|
|
94
|
+
* @memberof LDAPOutpostConfig
|
|
95
|
+
*/
|
|
96
|
+
mfaSupport?: boolean;
|
|
91
97
|
}
|
|
92
98
|
/**
|
|
93
99
|
* Check if a given object implements the LDAPOutpostConfig interface.
|
|
@@ -44,6 +44,7 @@ export function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
44
44
|
'gidStartNumber': !exists(json, 'gid_start_number') ? undefined : json['gid_start_number'],
|
|
45
45
|
'searchMode': !exists(json, 'search_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['search_mode']),
|
|
46
46
|
'bindMode': !exists(json, 'bind_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['bind_mode']),
|
|
47
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
47
48
|
};
|
|
48
49
|
}
|
|
49
50
|
export function LDAPOutpostConfigToJSON(value) {
|
|
@@ -64,5 +65,6 @@ export function LDAPOutpostConfigToJSON(value) {
|
|
|
64
65
|
'gid_start_number': value.gidStartNumber,
|
|
65
66
|
'search_mode': LDAPAPIAccessModeToJSON(value.searchMode),
|
|
66
67
|
'bind_mode': LDAPAPIAccessModeToJSON(value.bindMode),
|
|
68
|
+
'mfa_support': value.mfaSupport,
|
|
67
69
|
};
|
|
68
70
|
}
|
|
@@ -119,13 +119,13 @@ export interface LDAPProvider {
|
|
|
119
119
|
*/
|
|
120
120
|
tlsServerName?: string;
|
|
121
121
|
/**
|
|
122
|
-
* The start for uidNumbers, this number is added to the user.
|
|
122
|
+
* The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
|
|
123
123
|
* @type {number}
|
|
124
124
|
* @memberof LDAPProvider
|
|
125
125
|
*/
|
|
126
126
|
uidStartNumber?: number;
|
|
127
127
|
/**
|
|
128
|
-
* The start for gidNumbers, this number is added to a number generated from the group.
|
|
128
|
+
* The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
|
|
129
129
|
* @type {number}
|
|
130
130
|
* @memberof LDAPProvider
|
|
131
131
|
*/
|
|
@@ -148,6 +148,12 @@ export interface LDAPProvider {
|
|
|
148
148
|
* @memberof LDAPProvider
|
|
149
149
|
*/
|
|
150
150
|
bindMode?: LDAPAPIAccessMode;
|
|
151
|
+
/**
|
|
152
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
153
|
+
* @type {boolean}
|
|
154
|
+
* @memberof LDAPProvider
|
|
155
|
+
*/
|
|
156
|
+
mfaSupport?: boolean;
|
|
151
157
|
}
|
|
152
158
|
/**
|
|
153
159
|
* Check if a given object implements the LDAPProvider interface.
|
|
@@ -62,6 +62,7 @@ export function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
62
62
|
'outpostSet': json['outpost_set'],
|
|
63
63
|
'searchMode': !exists(json, 'search_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['search_mode']),
|
|
64
64
|
'bindMode': !exists(json, 'bind_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['bind_mode']),
|
|
65
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
65
66
|
};
|
|
66
67
|
}
|
|
67
68
|
export function LDAPProviderToJSON(value) {
|
|
@@ -84,5 +85,6 @@ export function LDAPProviderToJSON(value) {
|
|
|
84
85
|
'gid_start_number': value.gidStartNumber,
|
|
85
86
|
'search_mode': LDAPAPIAccessModeToJSON(value.searchMode),
|
|
86
87
|
'bind_mode': LDAPAPIAccessModeToJSON(value.bindMode),
|
|
88
|
+
'mfa_support': value.mfaSupport,
|
|
87
89
|
};
|
|
88
90
|
}
|
|
@@ -65,13 +65,13 @@ export interface LDAPProviderRequest {
|
|
|
65
65
|
*/
|
|
66
66
|
tlsServerName?: string;
|
|
67
67
|
/**
|
|
68
|
-
* The start for uidNumbers, this number is added to the user.
|
|
68
|
+
* The start for uidNumbers, this number is added to the user.pk to make sure that the numbers aren't too low for POSIX users. Default is 2000 to ensure that we don't collide with local users uidNumber
|
|
69
69
|
* @type {number}
|
|
70
70
|
* @memberof LDAPProviderRequest
|
|
71
71
|
*/
|
|
72
72
|
uidStartNumber?: number;
|
|
73
73
|
/**
|
|
74
|
-
* The start for gidNumbers, this number is added to a number generated from the group.
|
|
74
|
+
* The start for gidNumbers, this number is added to a number generated from the group.pk to make sure that the numbers aren't too low for POSIX groups. Default is 4000 to ensure that we don't collide with local groups or users primary groups gidNumber
|
|
75
75
|
* @type {number}
|
|
76
76
|
* @memberof LDAPProviderRequest
|
|
77
77
|
*/
|
|
@@ -88,6 +88,12 @@ export interface LDAPProviderRequest {
|
|
|
88
88
|
* @memberof LDAPProviderRequest
|
|
89
89
|
*/
|
|
90
90
|
bindMode?: LDAPAPIAccessMode;
|
|
91
|
+
/**
|
|
92
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
93
|
+
* @type {boolean}
|
|
94
|
+
* @memberof LDAPProviderRequest
|
|
95
|
+
*/
|
|
96
|
+
mfaSupport?: boolean;
|
|
91
97
|
}
|
|
92
98
|
/**
|
|
93
99
|
* Check if a given object implements the LDAPProviderRequest interface.
|
|
@@ -42,6 +42,7 @@ export function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
42
42
|
'gidStartNumber': !exists(json, 'gid_start_number') ? undefined : json['gid_start_number'],
|
|
43
43
|
'searchMode': !exists(json, 'search_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['search_mode']),
|
|
44
44
|
'bindMode': !exists(json, 'bind_mode') ? undefined : LDAPAPIAccessModeFromJSON(json['bind_mode']),
|
|
45
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
45
46
|
};
|
|
46
47
|
}
|
|
47
48
|
export function LDAPProviderRequestToJSON(value) {
|
|
@@ -64,5 +65,6 @@ export function LDAPProviderRequestToJSON(value) {
|
|
|
64
65
|
'gid_start_number': value.gidStartNumber,
|
|
65
66
|
'search_mode': LDAPAPIAccessModeToJSON(value.searchMode),
|
|
66
67
|
'bind_mode': LDAPAPIAccessModeToJSON(value.bindMode),
|
|
68
|
+
'mfa_support': value.mfaSupport,
|
|
67
69
|
};
|
|
68
70
|
}
|
|
@@ -0,0 +1,161 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2023.5.3
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
* * `authentik_crypto.certificatekeypair` - Certificate-Key Pair
|
|
14
|
+
* * `authentik_events.event` - Event
|
|
15
|
+
* * `authentik_events.notificationtransport` - Notification Transport
|
|
16
|
+
* * `authentik_events.notification` - Notification
|
|
17
|
+
* * `authentik_events.notificationrule` - Notification Rule
|
|
18
|
+
* * `authentik_events.notificationwebhookmapping` - Webhook Mapping
|
|
19
|
+
* * `authentik_flows.flow` - Flow
|
|
20
|
+
* * `authentik_flows.flowstagebinding` - Flow Stage Binding
|
|
21
|
+
* * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection
|
|
22
|
+
* * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection
|
|
23
|
+
* * `authentik_outposts.outpost` - outpost
|
|
24
|
+
* * `authentik_policies_dummy.dummypolicy` - Dummy Policy
|
|
25
|
+
* * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy
|
|
26
|
+
* * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy
|
|
27
|
+
* * `authentik_policies_expression.expressionpolicy` - Expression Policy
|
|
28
|
+
* * `authentik_policies_password.passwordpolicy` - Password Policy
|
|
29
|
+
* * `authentik_policies_reputation.reputationpolicy` - Reputation Policy
|
|
30
|
+
* * `authentik_policies_reputation.reputation` - reputation
|
|
31
|
+
* * `authentik_policies.policybinding` - Policy Binding
|
|
32
|
+
* * `authentik_providers_ldap.ldapprovider` - LDAP Provider
|
|
33
|
+
* * `authentik_providers_oauth2.scopemapping` - Scope Mapping
|
|
34
|
+
* * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
|
|
35
|
+
* * `authentik_providers_oauth2.authorizationcode` - Authorization Code
|
|
36
|
+
* * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
|
|
37
|
+
* * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
|
|
38
|
+
* * `authentik_providers_proxy.proxyprovider` - Proxy Provider
|
|
39
|
+
* * `authentik_providers_radius.radiusprovider` - Radius Provider
|
|
40
|
+
* * `authentik_providers_saml.samlprovider` - SAML Provider
|
|
41
|
+
* * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping
|
|
42
|
+
* * `authentik_providers_scim.scimprovider` - SCIM Provider
|
|
43
|
+
* * `authentik_providers_scim.scimmapping` - SCIM Mapping
|
|
44
|
+
* * `authentik_sources_ldap.ldapsource` - LDAP Source
|
|
45
|
+
* * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping
|
|
46
|
+
* * `authentik_sources_oauth.oauthsource` - OAuth Source
|
|
47
|
+
* * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection
|
|
48
|
+
* * `authentik_sources_plex.plexsource` - Plex Source
|
|
49
|
+
* * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection
|
|
50
|
+
* * `authentik_sources_saml.samlsource` - SAML Source
|
|
51
|
+
* * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
|
|
52
|
+
* * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
|
|
53
|
+
* * `authentik_stages_authenticator_duo.duodevice` - Duo Device
|
|
54
|
+
* * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
|
|
55
|
+
* * `authentik_stages_authenticator_sms.smsdevice` - SMS Device
|
|
56
|
+
* * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
|
|
57
|
+
* * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
|
|
58
|
+
* * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage
|
|
59
|
+
* * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage
|
|
60
|
+
* * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device
|
|
61
|
+
* * `authentik_stages_captcha.captchastage` - Captcha Stage
|
|
62
|
+
* * `authentik_stages_consent.consentstage` - Consent Stage
|
|
63
|
+
* * `authentik_stages_consent.userconsent` - User Consent
|
|
64
|
+
* * `authentik_stages_deny.denystage` - Deny Stage
|
|
65
|
+
* * `authentik_stages_dummy.dummystage` - Dummy Stage
|
|
66
|
+
* * `authentik_stages_email.emailstage` - Email Stage
|
|
67
|
+
* * `authentik_stages_identification.identificationstage` - Identification Stage
|
|
68
|
+
* * `authentik_stages_invitation.invitationstage` - Invitation Stage
|
|
69
|
+
* * `authentik_stages_invitation.invitation` - Invitation
|
|
70
|
+
* * `authentik_stages_password.passwordstage` - Password Stage
|
|
71
|
+
* * `authentik_stages_prompt.prompt` - Prompt
|
|
72
|
+
* * `authentik_stages_prompt.promptstage` - Prompt Stage
|
|
73
|
+
* * `authentik_stages_user_delete.userdeletestage` - User Delete Stage
|
|
74
|
+
* * `authentik_stages_user_login.userloginstage` - User Login Stage
|
|
75
|
+
* * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage
|
|
76
|
+
* * `authentik_stages_user_write.userwritestage` - User Write Stage
|
|
77
|
+
* * `authentik_tenants.tenant` - Tenant
|
|
78
|
+
* * `authentik_blueprints.blueprintinstance` - Blueprint Instance
|
|
79
|
+
* * `authentik_core.group` - group
|
|
80
|
+
* * `authentik_core.user` - User
|
|
81
|
+
* * `authentik_core.application` - Application
|
|
82
|
+
* * `authentik_core.token` - Token
|
|
83
|
+
* @export
|
|
84
|
+
*/
|
|
85
|
+
export declare const ModelEnum: {
|
|
86
|
+
readonly CryptoCertificatekeypair: "authentik_crypto.certificatekeypair";
|
|
87
|
+
readonly EventsEvent: "authentik_events.event";
|
|
88
|
+
readonly EventsNotificationtransport: "authentik_events.notificationtransport";
|
|
89
|
+
readonly EventsNotification: "authentik_events.notification";
|
|
90
|
+
readonly EventsNotificationrule: "authentik_events.notificationrule";
|
|
91
|
+
readonly EventsNotificationwebhookmapping: "authentik_events.notificationwebhookmapping";
|
|
92
|
+
readonly FlowsFlow: "authentik_flows.flow";
|
|
93
|
+
readonly FlowsFlowstagebinding: "authentik_flows.flowstagebinding";
|
|
94
|
+
readonly OutpostsDockerserviceconnection: "authentik_outposts.dockerserviceconnection";
|
|
95
|
+
readonly OutpostsKubernetesserviceconnection: "authentik_outposts.kubernetesserviceconnection";
|
|
96
|
+
readonly OutpostsOutpost: "authentik_outposts.outpost";
|
|
97
|
+
readonly PoliciesDummyDummypolicy: "authentik_policies_dummy.dummypolicy";
|
|
98
|
+
readonly PoliciesEventMatcherEventmatcherpolicy: "authentik_policies_event_matcher.eventmatcherpolicy";
|
|
99
|
+
readonly PoliciesExpiryPasswordexpirypolicy: "authentik_policies_expiry.passwordexpirypolicy";
|
|
100
|
+
readonly PoliciesExpressionExpressionpolicy: "authentik_policies_expression.expressionpolicy";
|
|
101
|
+
readonly PoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
|
|
102
|
+
readonly PoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
|
|
103
|
+
readonly PoliciesReputationReputation: "authentik_policies_reputation.reputation";
|
|
104
|
+
readonly PoliciesPolicybinding: "authentik_policies.policybinding";
|
|
105
|
+
readonly ProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
|
|
106
|
+
readonly ProvidersOauth2Scopemapping: "authentik_providers_oauth2.scopemapping";
|
|
107
|
+
readonly ProvidersOauth2Oauth2provider: "authentik_providers_oauth2.oauth2provider";
|
|
108
|
+
readonly ProvidersOauth2Authorizationcode: "authentik_providers_oauth2.authorizationcode";
|
|
109
|
+
readonly ProvidersOauth2Accesstoken: "authentik_providers_oauth2.accesstoken";
|
|
110
|
+
readonly ProvidersOauth2Refreshtoken: "authentik_providers_oauth2.refreshtoken";
|
|
111
|
+
readonly ProvidersProxyProxyprovider: "authentik_providers_proxy.proxyprovider";
|
|
112
|
+
readonly ProvidersRadiusRadiusprovider: "authentik_providers_radius.radiusprovider";
|
|
113
|
+
readonly ProvidersSamlSamlprovider: "authentik_providers_saml.samlprovider";
|
|
114
|
+
readonly ProvidersSamlSamlpropertymapping: "authentik_providers_saml.samlpropertymapping";
|
|
115
|
+
readonly ProvidersScimScimprovider: "authentik_providers_scim.scimprovider";
|
|
116
|
+
readonly ProvidersScimScimmapping: "authentik_providers_scim.scimmapping";
|
|
117
|
+
readonly SourcesLdapLdapsource: "authentik_sources_ldap.ldapsource";
|
|
118
|
+
readonly SourcesLdapLdappropertymapping: "authentik_sources_ldap.ldappropertymapping";
|
|
119
|
+
readonly SourcesOauthOauthsource: "authentik_sources_oauth.oauthsource";
|
|
120
|
+
readonly SourcesOauthUseroauthsourceconnection: "authentik_sources_oauth.useroauthsourceconnection";
|
|
121
|
+
readonly SourcesPlexPlexsource: "authentik_sources_plex.plexsource";
|
|
122
|
+
readonly SourcesPlexPlexsourceconnection: "authentik_sources_plex.plexsourceconnection";
|
|
123
|
+
readonly SourcesSamlSamlsource: "authentik_sources_saml.samlsource";
|
|
124
|
+
readonly SourcesSamlUsersamlsourceconnection: "authentik_sources_saml.usersamlsourceconnection";
|
|
125
|
+
readonly StagesAuthenticatorDuoAuthenticatorduostage: "authentik_stages_authenticator_duo.authenticatorduostage";
|
|
126
|
+
readonly StagesAuthenticatorDuoDuodevice: "authentik_stages_authenticator_duo.duodevice";
|
|
127
|
+
readonly StagesAuthenticatorSmsAuthenticatorsmsstage: "authentik_stages_authenticator_sms.authenticatorsmsstage";
|
|
128
|
+
readonly StagesAuthenticatorSmsSmsdevice: "authentik_stages_authenticator_sms.smsdevice";
|
|
129
|
+
readonly StagesAuthenticatorStaticAuthenticatorstaticstage: "authentik_stages_authenticator_static.authenticatorstaticstage";
|
|
130
|
+
readonly StagesAuthenticatorTotpAuthenticatortotpstage: "authentik_stages_authenticator_totp.authenticatortotpstage";
|
|
131
|
+
readonly StagesAuthenticatorValidateAuthenticatorvalidatestage: "authentik_stages_authenticator_validate.authenticatorvalidatestage";
|
|
132
|
+
readonly StagesAuthenticatorWebauthnAuthenticatewebauthnstage: "authentik_stages_authenticator_webauthn.authenticatewebauthnstage";
|
|
133
|
+
readonly StagesAuthenticatorWebauthnWebauthndevice: "authentik_stages_authenticator_webauthn.webauthndevice";
|
|
134
|
+
readonly StagesCaptchaCaptchastage: "authentik_stages_captcha.captchastage";
|
|
135
|
+
readonly StagesConsentConsentstage: "authentik_stages_consent.consentstage";
|
|
136
|
+
readonly StagesConsentUserconsent: "authentik_stages_consent.userconsent";
|
|
137
|
+
readonly StagesDenyDenystage: "authentik_stages_deny.denystage";
|
|
138
|
+
readonly StagesDummyDummystage: "authentik_stages_dummy.dummystage";
|
|
139
|
+
readonly StagesEmailEmailstage: "authentik_stages_email.emailstage";
|
|
140
|
+
readonly StagesIdentificationIdentificationstage: "authentik_stages_identification.identificationstage";
|
|
141
|
+
readonly StagesInvitationInvitationstage: "authentik_stages_invitation.invitationstage";
|
|
142
|
+
readonly StagesInvitationInvitation: "authentik_stages_invitation.invitation";
|
|
143
|
+
readonly StagesPasswordPasswordstage: "authentik_stages_password.passwordstage";
|
|
144
|
+
readonly StagesPromptPrompt: "authentik_stages_prompt.prompt";
|
|
145
|
+
readonly StagesPromptPromptstage: "authentik_stages_prompt.promptstage";
|
|
146
|
+
readonly StagesUserDeleteUserdeletestage: "authentik_stages_user_delete.userdeletestage";
|
|
147
|
+
readonly StagesUserLoginUserloginstage: "authentik_stages_user_login.userloginstage";
|
|
148
|
+
readonly StagesUserLogoutUserlogoutstage: "authentik_stages_user_logout.userlogoutstage";
|
|
149
|
+
readonly StagesUserWriteUserwritestage: "authentik_stages_user_write.userwritestage";
|
|
150
|
+
readonly TenantsTenant: "authentik_tenants.tenant";
|
|
151
|
+
readonly BlueprintsBlueprintinstance: "authentik_blueprints.blueprintinstance";
|
|
152
|
+
readonly CoreGroup: "authentik_core.group";
|
|
153
|
+
readonly CoreUser: "authentik_core.user";
|
|
154
|
+
readonly CoreApplication: "authentik_core.application";
|
|
155
|
+
readonly CoreToken: "authentik_core.token";
|
|
156
|
+
readonly UnknownDefaultOpenApi: "11184809";
|
|
157
|
+
};
|
|
158
|
+
export type ModelEnum = typeof ModelEnum[keyof typeof ModelEnum];
|
|
159
|
+
export declare function ModelEnumFromJSON(json: any): ModelEnum;
|
|
160
|
+
export declare function ModelEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): ModelEnum;
|
|
161
|
+
export declare function ModelEnumToJSON(value?: ModelEnum | null): any;
|