@goauthentik/api 2023.8.3-1696847703 → 2023.8.3-1697470337
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +19 -0
- package/dist/apis/RbacApi.d.ts +403 -0
- package/dist/apis/RbacApi.js +840 -0
- package/dist/apis/index.d.ts +1 -0
- package/dist/apis/index.js +1 -0
- package/dist/esm/apis/RbacApi.d.ts +403 -0
- package/dist/esm/apis/RbacApi.js +836 -0
- package/dist/esm/apis/index.d.ts +1 -0
- package/dist/esm/apis/index.js +1 -0
- package/dist/esm/models/AppEnum.d.ts +2 -0
- package/dist/esm/models/AppEnum.js +2 -0
- package/dist/esm/models/ConsentChallenge.d.ts +5 -5
- package/dist/esm/models/ConsentChallenge.js +5 -5
- package/dist/esm/models/ConsentPermission.d.ts +37 -0
- package/dist/esm/models/ConsentPermission.js +46 -0
- package/dist/esm/models/ExtraRoleObjectPermission.d.ts +81 -0
- package/dist/esm/models/ExtraRoleObjectPermission.js +57 -0
- package/dist/esm/models/ExtraUserObjectPermission.d.ts +81 -0
- package/dist/esm/models/ExtraUserObjectPermission.js +57 -0
- package/dist/esm/models/Group.d.ts +15 -2
- package/dist/esm/models/Group.js +6 -1
- package/dist/esm/models/GroupRequest.d.ts +6 -0
- package/dist/esm/models/GroupRequest.js +2 -0
- package/dist/esm/models/ModelEnum.d.ts +8 -4
- package/dist/esm/models/ModelEnum.js +8 -4
- package/dist/esm/models/PaginatedExtraRoleObjectPermissionList.d.ts +39 -0
- package/dist/esm/models/PaginatedExtraRoleObjectPermissionList.js +48 -0
- package/dist/esm/models/PaginatedExtraUserObjectPermissionList.d.ts +39 -0
- package/dist/esm/models/PaginatedExtraUserObjectPermissionList.js +48 -0
- package/dist/esm/models/PaginatedPermissionList.d.ts +39 -0
- package/dist/esm/models/PaginatedPermissionList.js +48 -0
- package/dist/esm/models/PaginatedRoleAssignedObjectPermissionList.d.ts +39 -0
- package/dist/esm/models/PaginatedRoleAssignedObjectPermissionList.js +48 -0
- package/dist/esm/models/PaginatedRoleList.d.ts +39 -0
- package/dist/esm/models/PaginatedRoleList.js +48 -0
- package/dist/esm/models/PaginatedUserAssignedObjectPermissionList.d.ts +39 -0
- package/dist/esm/models/PaginatedUserAssignedObjectPermissionList.js +48 -0
- package/dist/esm/models/PatchedGroupRequest.d.ts +6 -0
- package/dist/esm/models/PatchedGroupRequest.js +2 -0
- package/dist/esm/models/PatchedPermissionAssignRequest.d.ts +44 -0
- package/dist/esm/models/PatchedPermissionAssignRequest.js +48 -0
- package/dist/esm/models/PatchedRoleRequest.d.ts +31 -0
- package/dist/esm/models/PatchedRoleRequest.js +43 -0
- package/dist/esm/models/Permission.d.ts +32 -2
- package/dist/esm/models/Permission.js +13 -3
- package/dist/esm/models/PermissionAssignRequest.d.ts +44 -0
- package/dist/esm/models/PermissionAssignRequest.js +49 -0
- package/dist/esm/models/Role.d.ts +37 -0
- package/dist/esm/models/Role.js +45 -0
- package/dist/esm/models/RoleAssignedObjectPermission.d.ts +44 -0
- package/dist/esm/models/RoleAssignedObjectPermission.js +48 -0
- package/dist/esm/models/RoleObjectPermission.d.ts +61 -0
- package/dist/esm/models/RoleObjectPermission.js +51 -0
- package/dist/esm/models/RoleRequest.d.ts +31 -0
- package/dist/esm/models/RoleRequest.js +43 -0
- package/dist/esm/models/UserAssignedObjectPermission.d.ts +88 -0
- package/dist/esm/models/UserAssignedObjectPermission.js +66 -0
- package/dist/esm/models/UserObjectPermission.d.ts +61 -0
- package/dist/esm/models/UserObjectPermission.js +51 -0
- package/dist/esm/models/UserSelf.d.ts +6 -0
- package/dist/esm/models/UserSelf.js +2 -0
- package/dist/esm/models/index.d.ts +18 -0
- package/dist/esm/models/index.js +18 -0
- package/dist/models/AppEnum.d.ts +2 -0
- package/dist/models/AppEnum.js +2 -0
- package/dist/models/ConsentChallenge.d.ts +5 -5
- package/dist/models/ConsentChallenge.js +5 -5
- package/dist/models/ConsentPermission.d.ts +37 -0
- package/dist/models/ConsentPermission.js +53 -0
- package/dist/models/ExtraRoleObjectPermission.d.ts +81 -0
- package/dist/models/ExtraRoleObjectPermission.js +64 -0
- package/dist/models/ExtraUserObjectPermission.d.ts +81 -0
- package/dist/models/ExtraUserObjectPermission.js +64 -0
- package/dist/models/Group.d.ts +15 -2
- package/dist/models/Group.js +6 -1
- package/dist/models/GroupRequest.d.ts +6 -0
- package/dist/models/GroupRequest.js +2 -0
- package/dist/models/ModelEnum.d.ts +8 -4
- package/dist/models/ModelEnum.js +8 -4
- package/dist/models/PaginatedExtraRoleObjectPermissionList.d.ts +39 -0
- package/dist/models/PaginatedExtraRoleObjectPermissionList.js +55 -0
- package/dist/models/PaginatedExtraUserObjectPermissionList.d.ts +39 -0
- package/dist/models/PaginatedExtraUserObjectPermissionList.js +55 -0
- package/dist/models/PaginatedPermissionList.d.ts +39 -0
- package/dist/models/PaginatedPermissionList.js +55 -0
- package/dist/models/PaginatedRoleAssignedObjectPermissionList.d.ts +39 -0
- package/dist/models/PaginatedRoleAssignedObjectPermissionList.js +55 -0
- package/dist/models/PaginatedRoleList.d.ts +39 -0
- package/dist/models/PaginatedRoleList.js +55 -0
- package/dist/models/PaginatedUserAssignedObjectPermissionList.d.ts +39 -0
- package/dist/models/PaginatedUserAssignedObjectPermissionList.js +55 -0
- package/dist/models/PatchedGroupRequest.d.ts +6 -0
- package/dist/models/PatchedGroupRequest.js +2 -0
- package/dist/models/PatchedPermissionAssignRequest.d.ts +44 -0
- package/dist/models/PatchedPermissionAssignRequest.js +55 -0
- package/dist/models/PatchedRoleRequest.d.ts +31 -0
- package/dist/models/PatchedRoleRequest.js +50 -0
- package/dist/models/Permission.d.ts +32 -2
- package/dist/models/Permission.js +13 -3
- package/dist/models/PermissionAssignRequest.d.ts +44 -0
- package/dist/models/PermissionAssignRequest.js +56 -0
- package/dist/models/Role.d.ts +37 -0
- package/dist/models/Role.js +52 -0
- package/dist/models/RoleAssignedObjectPermission.d.ts +44 -0
- package/dist/models/RoleAssignedObjectPermission.js +55 -0
- package/dist/models/RoleObjectPermission.d.ts +61 -0
- package/dist/models/RoleObjectPermission.js +58 -0
- package/dist/models/RoleRequest.d.ts +31 -0
- package/dist/models/RoleRequest.js +50 -0
- package/dist/models/UserAssignedObjectPermission.d.ts +88 -0
- package/dist/models/UserAssignedObjectPermission.js +73 -0
- package/dist/models/UserObjectPermission.d.ts +61 -0
- package/dist/models/UserObjectPermission.js +58 -0
- package/dist/models/UserSelf.d.ts +6 -0
- package/dist/models/UserSelf.js +2 -0
- package/dist/models/index.d.ts +18 -0
- package/dist/models/index.js +18 -0
- package/package.json +1 -1
- package/src/apis/RbacApi.ts +1081 -0
- package/src/apis/index.ts +1 -0
- package/src/models/AppEnum.ts +2 -0
- package/src/models/ConsentChallenge.ts +14 -14
- package/src/models/ConsentPermission.ts +75 -0
- package/src/models/ExtraRoleObjectPermission.ts +131 -0
- package/src/models/ExtraUserObjectPermission.ts +131 -0
- package/src/models/Group.ts +25 -3
- package/src/models/GroupRequest.ts +8 -0
- package/src/models/ModelEnum.ts +8 -4
- package/src/models/PaginatedExtraRoleObjectPermissionList.ts +88 -0
- package/src/models/PaginatedExtraUserObjectPermissionList.ts +88 -0
- package/src/models/PaginatedPermissionList.ts +88 -0
- package/src/models/PaginatedRoleAssignedObjectPermissionList.ts +88 -0
- package/src/models/PaginatedRoleList.ts +88 -0
- package/src/models/PaginatedUserAssignedObjectPermissionList.ts +88 -0
- package/src/models/PatchedGroupRequest.ts +8 -0
- package/src/models/PatchedPermissionAssignRequest.ts +88 -0
- package/src/models/PatchedRoleRequest.ts +65 -0
- package/src/models/Permission.ts +45 -5
- package/src/models/PermissionAssignRequest.ts +89 -0
- package/src/models/Role.ts +74 -0
- package/src/models/RoleAssignedObjectPermission.ts +89 -0
- package/src/models/RoleObjectPermission.ts +105 -0
- package/src/models/RoleRequest.ts +66 -0
- package/src/models/UserAssignedObjectPermission.ts +148 -0
- package/src/models/UserObjectPermission.ts +105 -0
- package/src/models/UserSelf.ts +8 -0
- package/src/models/index.ts +18 -0
|
@@ -0,0 +1,836 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* authentik
|
|
5
|
+
* Making authentication simple.
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 2023.8.3
|
|
8
|
+
* Contact: hello@goauthentik.io
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
15
|
+
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
16
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
17
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
18
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
19
|
+
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
20
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
21
|
+
});
|
|
22
|
+
};
|
|
23
|
+
import * as runtime from '../runtime';
|
|
24
|
+
import { PaginatedExtraRoleObjectPermissionListFromJSON, PaginatedExtraUserObjectPermissionListFromJSON, PaginatedPermissionListFromJSON, PaginatedRoleAssignedObjectPermissionListFromJSON, PaginatedRoleListFromJSON, PaginatedUserAssignedObjectPermissionListFromJSON, PatchedPermissionAssignRequestToJSON, PatchedRoleRequestToJSON, PermissionFromJSON, PermissionAssignRequestToJSON, RoleFromJSON, RoleRequestToJSON, UsedByFromJSON, } from '../models';
|
|
25
|
+
/**
|
|
26
|
+
*
|
|
27
|
+
*/
|
|
28
|
+
export class RbacApi extends runtime.BaseAPI {
|
|
29
|
+
/**
|
|
30
|
+
* Assign permission(s) to role. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
31
|
+
*/
|
|
32
|
+
rbacPermissionsAssignedByRolesAssignCreateRaw(requestParameters, initOverrides) {
|
|
33
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
34
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
35
|
+
throw new runtime.RequiredError('uuid', 'Required parameter requestParameters.uuid was null or undefined when calling rbacPermissionsAssignedByRolesAssignCreate.');
|
|
36
|
+
}
|
|
37
|
+
if (requestParameters.permissionAssignRequest === null || requestParameters.permissionAssignRequest === undefined) {
|
|
38
|
+
throw new runtime.RequiredError('permissionAssignRequest', 'Required parameter requestParameters.permissionAssignRequest was null or undefined when calling rbacPermissionsAssignedByRolesAssignCreate.');
|
|
39
|
+
}
|
|
40
|
+
const queryParameters = {};
|
|
41
|
+
const headerParameters = {};
|
|
42
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
43
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
44
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
45
|
+
}
|
|
46
|
+
const response = yield this.request({
|
|
47
|
+
path: `/rbac/permissions/assigned_by_roles/{uuid}/assign/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
48
|
+
method: 'POST',
|
|
49
|
+
headers: headerParameters,
|
|
50
|
+
query: queryParameters,
|
|
51
|
+
body: PermissionAssignRequestToJSON(requestParameters.permissionAssignRequest),
|
|
52
|
+
}, initOverrides);
|
|
53
|
+
return new runtime.VoidApiResponse(response);
|
|
54
|
+
});
|
|
55
|
+
}
|
|
56
|
+
/**
|
|
57
|
+
* Assign permission(s) to role. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
58
|
+
*/
|
|
59
|
+
rbacPermissionsAssignedByRolesAssignCreate(requestParameters, initOverrides) {
|
|
60
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
61
|
+
yield this.rbacPermissionsAssignedByRolesAssignCreateRaw(requestParameters, initOverrides);
|
|
62
|
+
});
|
|
63
|
+
}
|
|
64
|
+
/**
|
|
65
|
+
* Get assigned object permissions for a single object
|
|
66
|
+
*/
|
|
67
|
+
rbacPermissionsAssignedByRolesListRaw(requestParameters, initOverrides) {
|
|
68
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
69
|
+
if (requestParameters.model === null || requestParameters.model === undefined) {
|
|
70
|
+
throw new runtime.RequiredError('model', 'Required parameter requestParameters.model was null or undefined when calling rbacPermissionsAssignedByRolesList.');
|
|
71
|
+
}
|
|
72
|
+
const queryParameters = {};
|
|
73
|
+
if (requestParameters.model !== undefined) {
|
|
74
|
+
queryParameters['model'] = requestParameters.model;
|
|
75
|
+
}
|
|
76
|
+
if (requestParameters.objectPk !== undefined) {
|
|
77
|
+
queryParameters['object_pk'] = requestParameters.objectPk;
|
|
78
|
+
}
|
|
79
|
+
if (requestParameters.ordering !== undefined) {
|
|
80
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
81
|
+
}
|
|
82
|
+
if (requestParameters.page !== undefined) {
|
|
83
|
+
queryParameters['page'] = requestParameters.page;
|
|
84
|
+
}
|
|
85
|
+
if (requestParameters.pageSize !== undefined) {
|
|
86
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
87
|
+
}
|
|
88
|
+
if (requestParameters.search !== undefined) {
|
|
89
|
+
queryParameters['search'] = requestParameters.search;
|
|
90
|
+
}
|
|
91
|
+
const headerParameters = {};
|
|
92
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
93
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
94
|
+
}
|
|
95
|
+
const response = yield this.request({
|
|
96
|
+
path: `/rbac/permissions/assigned_by_roles/`,
|
|
97
|
+
method: 'GET',
|
|
98
|
+
headers: headerParameters,
|
|
99
|
+
query: queryParameters,
|
|
100
|
+
}, initOverrides);
|
|
101
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedRoleAssignedObjectPermissionListFromJSON(jsonValue));
|
|
102
|
+
});
|
|
103
|
+
}
|
|
104
|
+
/**
|
|
105
|
+
* Get assigned object permissions for a single object
|
|
106
|
+
*/
|
|
107
|
+
rbacPermissionsAssignedByRolesList(requestParameters, initOverrides) {
|
|
108
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
109
|
+
const response = yield this.rbacPermissionsAssignedByRolesListRaw(requestParameters, initOverrides);
|
|
110
|
+
return yield response.value();
|
|
111
|
+
});
|
|
112
|
+
}
|
|
113
|
+
/**
|
|
114
|
+
* Unassign permission(s) to role. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
115
|
+
*/
|
|
116
|
+
rbacPermissionsAssignedByRolesUnassignPartialUpdateRaw(requestParameters, initOverrides) {
|
|
117
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
118
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
119
|
+
throw new runtime.RequiredError('uuid', 'Required parameter requestParameters.uuid was null or undefined when calling rbacPermissionsAssignedByRolesUnassignPartialUpdate.');
|
|
120
|
+
}
|
|
121
|
+
const queryParameters = {};
|
|
122
|
+
const headerParameters = {};
|
|
123
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
124
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
125
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
126
|
+
}
|
|
127
|
+
const response = yield this.request({
|
|
128
|
+
path: `/rbac/permissions/assigned_by_roles/{uuid}/unassign/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
129
|
+
method: 'PATCH',
|
|
130
|
+
headers: headerParameters,
|
|
131
|
+
query: queryParameters,
|
|
132
|
+
body: PatchedPermissionAssignRequestToJSON(requestParameters.patchedPermissionAssignRequest),
|
|
133
|
+
}, initOverrides);
|
|
134
|
+
return new runtime.VoidApiResponse(response);
|
|
135
|
+
});
|
|
136
|
+
}
|
|
137
|
+
/**
|
|
138
|
+
* Unassign permission(s) to role. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
139
|
+
*/
|
|
140
|
+
rbacPermissionsAssignedByRolesUnassignPartialUpdate(requestParameters, initOverrides) {
|
|
141
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
142
|
+
yield this.rbacPermissionsAssignedByRolesUnassignPartialUpdateRaw(requestParameters, initOverrides);
|
|
143
|
+
});
|
|
144
|
+
}
|
|
145
|
+
/**
|
|
146
|
+
* Assign permission(s) to user
|
|
147
|
+
*/
|
|
148
|
+
rbacPermissionsAssignedByUsersAssignCreateRaw(requestParameters, initOverrides) {
|
|
149
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
150
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
151
|
+
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling rbacPermissionsAssignedByUsersAssignCreate.');
|
|
152
|
+
}
|
|
153
|
+
if (requestParameters.permissionAssignRequest === null || requestParameters.permissionAssignRequest === undefined) {
|
|
154
|
+
throw new runtime.RequiredError('permissionAssignRequest', 'Required parameter requestParameters.permissionAssignRequest was null or undefined when calling rbacPermissionsAssignedByUsersAssignCreate.');
|
|
155
|
+
}
|
|
156
|
+
const queryParameters = {};
|
|
157
|
+
const headerParameters = {};
|
|
158
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
159
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
160
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
161
|
+
}
|
|
162
|
+
const response = yield this.request({
|
|
163
|
+
path: `/rbac/permissions/assigned_by_users/{id}/assign/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
164
|
+
method: 'POST',
|
|
165
|
+
headers: headerParameters,
|
|
166
|
+
query: queryParameters,
|
|
167
|
+
body: PermissionAssignRequestToJSON(requestParameters.permissionAssignRequest),
|
|
168
|
+
}, initOverrides);
|
|
169
|
+
return new runtime.VoidApiResponse(response);
|
|
170
|
+
});
|
|
171
|
+
}
|
|
172
|
+
/**
|
|
173
|
+
* Assign permission(s) to user
|
|
174
|
+
*/
|
|
175
|
+
rbacPermissionsAssignedByUsersAssignCreate(requestParameters, initOverrides) {
|
|
176
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
177
|
+
yield this.rbacPermissionsAssignedByUsersAssignCreateRaw(requestParameters, initOverrides);
|
|
178
|
+
});
|
|
179
|
+
}
|
|
180
|
+
/**
|
|
181
|
+
* Get assigned object permissions for a single object
|
|
182
|
+
*/
|
|
183
|
+
rbacPermissionsAssignedByUsersListRaw(requestParameters, initOverrides) {
|
|
184
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
185
|
+
if (requestParameters.model === null || requestParameters.model === undefined) {
|
|
186
|
+
throw new runtime.RequiredError('model', 'Required parameter requestParameters.model was null or undefined when calling rbacPermissionsAssignedByUsersList.');
|
|
187
|
+
}
|
|
188
|
+
const queryParameters = {};
|
|
189
|
+
if (requestParameters.model !== undefined) {
|
|
190
|
+
queryParameters['model'] = requestParameters.model;
|
|
191
|
+
}
|
|
192
|
+
if (requestParameters.objectPk !== undefined) {
|
|
193
|
+
queryParameters['object_pk'] = requestParameters.objectPk;
|
|
194
|
+
}
|
|
195
|
+
if (requestParameters.ordering !== undefined) {
|
|
196
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
197
|
+
}
|
|
198
|
+
if (requestParameters.page !== undefined) {
|
|
199
|
+
queryParameters['page'] = requestParameters.page;
|
|
200
|
+
}
|
|
201
|
+
if (requestParameters.pageSize !== undefined) {
|
|
202
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
203
|
+
}
|
|
204
|
+
if (requestParameters.search !== undefined) {
|
|
205
|
+
queryParameters['search'] = requestParameters.search;
|
|
206
|
+
}
|
|
207
|
+
const headerParameters = {};
|
|
208
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
209
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
210
|
+
}
|
|
211
|
+
const response = yield this.request({
|
|
212
|
+
path: `/rbac/permissions/assigned_by_users/`,
|
|
213
|
+
method: 'GET',
|
|
214
|
+
headers: headerParameters,
|
|
215
|
+
query: queryParameters,
|
|
216
|
+
}, initOverrides);
|
|
217
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedUserAssignedObjectPermissionListFromJSON(jsonValue));
|
|
218
|
+
});
|
|
219
|
+
}
|
|
220
|
+
/**
|
|
221
|
+
* Get assigned object permissions for a single object
|
|
222
|
+
*/
|
|
223
|
+
rbacPermissionsAssignedByUsersList(requestParameters, initOverrides) {
|
|
224
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
225
|
+
const response = yield this.rbacPermissionsAssignedByUsersListRaw(requestParameters, initOverrides);
|
|
226
|
+
return yield response.value();
|
|
227
|
+
});
|
|
228
|
+
}
|
|
229
|
+
/**
|
|
230
|
+
* Unassign permission(s) to user. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
231
|
+
*/
|
|
232
|
+
rbacPermissionsAssignedByUsersUnassignPartialUpdateRaw(requestParameters, initOverrides) {
|
|
233
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
234
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
235
|
+
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling rbacPermissionsAssignedByUsersUnassignPartialUpdate.');
|
|
236
|
+
}
|
|
237
|
+
const queryParameters = {};
|
|
238
|
+
const headerParameters = {};
|
|
239
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
240
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
241
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
242
|
+
}
|
|
243
|
+
const response = yield this.request({
|
|
244
|
+
path: `/rbac/permissions/assigned_by_users/{id}/unassign/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
245
|
+
method: 'PATCH',
|
|
246
|
+
headers: headerParameters,
|
|
247
|
+
query: queryParameters,
|
|
248
|
+
body: PatchedPermissionAssignRequestToJSON(requestParameters.patchedPermissionAssignRequest),
|
|
249
|
+
}, initOverrides);
|
|
250
|
+
return new runtime.VoidApiResponse(response);
|
|
251
|
+
});
|
|
252
|
+
}
|
|
253
|
+
/**
|
|
254
|
+
* Unassign permission(s) to user. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
255
|
+
*/
|
|
256
|
+
rbacPermissionsAssignedByUsersUnassignPartialUpdate(requestParameters, initOverrides) {
|
|
257
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
258
|
+
yield this.rbacPermissionsAssignedByUsersUnassignPartialUpdateRaw(requestParameters, initOverrides);
|
|
259
|
+
});
|
|
260
|
+
}
|
|
261
|
+
/**
|
|
262
|
+
* Read-only list of all permissions, filterable by model and app
|
|
263
|
+
*/
|
|
264
|
+
rbacPermissionsListRaw(requestParameters, initOverrides) {
|
|
265
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
266
|
+
const queryParameters = {};
|
|
267
|
+
if (requestParameters.codename !== undefined) {
|
|
268
|
+
queryParameters['codename'] = requestParameters.codename;
|
|
269
|
+
}
|
|
270
|
+
if (requestParameters.contentTypeAppLabel !== undefined) {
|
|
271
|
+
queryParameters['content_type__app_label'] = requestParameters.contentTypeAppLabel;
|
|
272
|
+
}
|
|
273
|
+
if (requestParameters.contentTypeModel !== undefined) {
|
|
274
|
+
queryParameters['content_type__model'] = requestParameters.contentTypeModel;
|
|
275
|
+
}
|
|
276
|
+
if (requestParameters.ordering !== undefined) {
|
|
277
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
278
|
+
}
|
|
279
|
+
if (requestParameters.page !== undefined) {
|
|
280
|
+
queryParameters['page'] = requestParameters.page;
|
|
281
|
+
}
|
|
282
|
+
if (requestParameters.pageSize !== undefined) {
|
|
283
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
284
|
+
}
|
|
285
|
+
if (requestParameters.role !== undefined) {
|
|
286
|
+
queryParameters['role'] = requestParameters.role;
|
|
287
|
+
}
|
|
288
|
+
if (requestParameters.search !== undefined) {
|
|
289
|
+
queryParameters['search'] = requestParameters.search;
|
|
290
|
+
}
|
|
291
|
+
if (requestParameters.user !== undefined) {
|
|
292
|
+
queryParameters['user'] = requestParameters.user;
|
|
293
|
+
}
|
|
294
|
+
const headerParameters = {};
|
|
295
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
296
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
297
|
+
}
|
|
298
|
+
const response = yield this.request({
|
|
299
|
+
path: `/rbac/permissions/`,
|
|
300
|
+
method: 'GET',
|
|
301
|
+
headers: headerParameters,
|
|
302
|
+
query: queryParameters,
|
|
303
|
+
}, initOverrides);
|
|
304
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedPermissionListFromJSON(jsonValue));
|
|
305
|
+
});
|
|
306
|
+
}
|
|
307
|
+
/**
|
|
308
|
+
* Read-only list of all permissions, filterable by model and app
|
|
309
|
+
*/
|
|
310
|
+
rbacPermissionsList(requestParameters = {}, initOverrides) {
|
|
311
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
312
|
+
const response = yield this.rbacPermissionsListRaw(requestParameters, initOverrides);
|
|
313
|
+
return yield response.value();
|
|
314
|
+
});
|
|
315
|
+
}
|
|
316
|
+
/**
|
|
317
|
+
* Read-only list of all permissions, filterable by model and app
|
|
318
|
+
*/
|
|
319
|
+
rbacPermissionsRetrieveRaw(requestParameters, initOverrides) {
|
|
320
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
321
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
322
|
+
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling rbacPermissionsRetrieve.');
|
|
323
|
+
}
|
|
324
|
+
const queryParameters = {};
|
|
325
|
+
const headerParameters = {};
|
|
326
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
327
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
328
|
+
}
|
|
329
|
+
const response = yield this.request({
|
|
330
|
+
path: `/rbac/permissions/{id}/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
331
|
+
method: 'GET',
|
|
332
|
+
headers: headerParameters,
|
|
333
|
+
query: queryParameters,
|
|
334
|
+
}, initOverrides);
|
|
335
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PermissionFromJSON(jsonValue));
|
|
336
|
+
});
|
|
337
|
+
}
|
|
338
|
+
/**
|
|
339
|
+
* Read-only list of all permissions, filterable by model and app
|
|
340
|
+
*/
|
|
341
|
+
rbacPermissionsRetrieve(requestParameters, initOverrides) {
|
|
342
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
343
|
+
const response = yield this.rbacPermissionsRetrieveRaw(requestParameters, initOverrides);
|
|
344
|
+
return yield response.value();
|
|
345
|
+
});
|
|
346
|
+
}
|
|
347
|
+
/**
|
|
348
|
+
* Get a role\'s assigned object permissions
|
|
349
|
+
*/
|
|
350
|
+
rbacPermissionsRolesListRaw(requestParameters, initOverrides) {
|
|
351
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
352
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
353
|
+
throw new runtime.RequiredError('uuid', 'Required parameter requestParameters.uuid was null or undefined when calling rbacPermissionsRolesList.');
|
|
354
|
+
}
|
|
355
|
+
const queryParameters = {};
|
|
356
|
+
if (requestParameters.ordering !== undefined) {
|
|
357
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
358
|
+
}
|
|
359
|
+
if (requestParameters.page !== undefined) {
|
|
360
|
+
queryParameters['page'] = requestParameters.page;
|
|
361
|
+
}
|
|
362
|
+
if (requestParameters.pageSize !== undefined) {
|
|
363
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
364
|
+
}
|
|
365
|
+
if (requestParameters.search !== undefined) {
|
|
366
|
+
queryParameters['search'] = requestParameters.search;
|
|
367
|
+
}
|
|
368
|
+
if (requestParameters.uuid !== undefined) {
|
|
369
|
+
queryParameters['uuid'] = requestParameters.uuid;
|
|
370
|
+
}
|
|
371
|
+
const headerParameters = {};
|
|
372
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
373
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
374
|
+
}
|
|
375
|
+
const response = yield this.request({
|
|
376
|
+
path: `/rbac/permissions/roles/`,
|
|
377
|
+
method: 'GET',
|
|
378
|
+
headers: headerParameters,
|
|
379
|
+
query: queryParameters,
|
|
380
|
+
}, initOverrides);
|
|
381
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedExtraRoleObjectPermissionListFromJSON(jsonValue));
|
|
382
|
+
});
|
|
383
|
+
}
|
|
384
|
+
/**
|
|
385
|
+
* Get a role\'s assigned object permissions
|
|
386
|
+
*/
|
|
387
|
+
rbacPermissionsRolesList(requestParameters, initOverrides) {
|
|
388
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
389
|
+
const response = yield this.rbacPermissionsRolesListRaw(requestParameters, initOverrides);
|
|
390
|
+
return yield response.value();
|
|
391
|
+
});
|
|
392
|
+
}
|
|
393
|
+
/**
|
|
394
|
+
* Get a users\'s assigned object permissions
|
|
395
|
+
*/
|
|
396
|
+
rbacPermissionsUsersListRaw(requestParameters, initOverrides) {
|
|
397
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
398
|
+
if (requestParameters.userId === null || requestParameters.userId === undefined) {
|
|
399
|
+
throw new runtime.RequiredError('userId', 'Required parameter requestParameters.userId was null or undefined when calling rbacPermissionsUsersList.');
|
|
400
|
+
}
|
|
401
|
+
const queryParameters = {};
|
|
402
|
+
if (requestParameters.ordering !== undefined) {
|
|
403
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
404
|
+
}
|
|
405
|
+
if (requestParameters.page !== undefined) {
|
|
406
|
+
queryParameters['page'] = requestParameters.page;
|
|
407
|
+
}
|
|
408
|
+
if (requestParameters.pageSize !== undefined) {
|
|
409
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
410
|
+
}
|
|
411
|
+
if (requestParameters.search !== undefined) {
|
|
412
|
+
queryParameters['search'] = requestParameters.search;
|
|
413
|
+
}
|
|
414
|
+
if (requestParameters.userId !== undefined) {
|
|
415
|
+
queryParameters['user_id'] = requestParameters.userId;
|
|
416
|
+
}
|
|
417
|
+
const headerParameters = {};
|
|
418
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
419
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
420
|
+
}
|
|
421
|
+
const response = yield this.request({
|
|
422
|
+
path: `/rbac/permissions/users/`,
|
|
423
|
+
method: 'GET',
|
|
424
|
+
headers: headerParameters,
|
|
425
|
+
query: queryParameters,
|
|
426
|
+
}, initOverrides);
|
|
427
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedExtraUserObjectPermissionListFromJSON(jsonValue));
|
|
428
|
+
});
|
|
429
|
+
}
|
|
430
|
+
/**
|
|
431
|
+
* Get a users\'s assigned object permissions
|
|
432
|
+
*/
|
|
433
|
+
rbacPermissionsUsersList(requestParameters, initOverrides) {
|
|
434
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
435
|
+
const response = yield this.rbacPermissionsUsersListRaw(requestParameters, initOverrides);
|
|
436
|
+
return yield response.value();
|
|
437
|
+
});
|
|
438
|
+
}
|
|
439
|
+
/**
|
|
440
|
+
* Role viewset
|
|
441
|
+
*/
|
|
442
|
+
rbacRolesCreateRaw(requestParameters, initOverrides) {
|
|
443
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
444
|
+
if (requestParameters.roleRequest === null || requestParameters.roleRequest === undefined) {
|
|
445
|
+
throw new runtime.RequiredError('roleRequest', 'Required parameter requestParameters.roleRequest was null or undefined when calling rbacRolesCreate.');
|
|
446
|
+
}
|
|
447
|
+
const queryParameters = {};
|
|
448
|
+
const headerParameters = {};
|
|
449
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
450
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
451
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
452
|
+
}
|
|
453
|
+
const response = yield this.request({
|
|
454
|
+
path: `/rbac/roles/`,
|
|
455
|
+
method: 'POST',
|
|
456
|
+
headers: headerParameters,
|
|
457
|
+
query: queryParameters,
|
|
458
|
+
body: RoleRequestToJSON(requestParameters.roleRequest),
|
|
459
|
+
}, initOverrides);
|
|
460
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => RoleFromJSON(jsonValue));
|
|
461
|
+
});
|
|
462
|
+
}
|
|
463
|
+
/**
|
|
464
|
+
* Role viewset
|
|
465
|
+
*/
|
|
466
|
+
rbacRolesCreate(requestParameters, initOverrides) {
|
|
467
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
468
|
+
const response = yield this.rbacRolesCreateRaw(requestParameters, initOverrides);
|
|
469
|
+
return yield response.value();
|
|
470
|
+
});
|
|
471
|
+
}
|
|
472
|
+
/**
|
|
473
|
+
* Role viewset
|
|
474
|
+
*/
|
|
475
|
+
rbacRolesDestroyRaw(requestParameters, initOverrides) {
|
|
476
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
477
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
478
|
+
throw new runtime.RequiredError('uuid', 'Required parameter requestParameters.uuid was null or undefined when calling rbacRolesDestroy.');
|
|
479
|
+
}
|
|
480
|
+
const queryParameters = {};
|
|
481
|
+
const headerParameters = {};
|
|
482
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
483
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
484
|
+
}
|
|
485
|
+
const response = yield this.request({
|
|
486
|
+
path: `/rbac/roles/{uuid}/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
487
|
+
method: 'DELETE',
|
|
488
|
+
headers: headerParameters,
|
|
489
|
+
query: queryParameters,
|
|
490
|
+
}, initOverrides);
|
|
491
|
+
return new runtime.VoidApiResponse(response);
|
|
492
|
+
});
|
|
493
|
+
}
|
|
494
|
+
/**
|
|
495
|
+
* Role viewset
|
|
496
|
+
*/
|
|
497
|
+
rbacRolesDestroy(requestParameters, initOverrides) {
|
|
498
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
499
|
+
yield this.rbacRolesDestroyRaw(requestParameters, initOverrides);
|
|
500
|
+
});
|
|
501
|
+
}
|
|
502
|
+
/**
|
|
503
|
+
* Role viewset
|
|
504
|
+
*/
|
|
505
|
+
rbacRolesListRaw(requestParameters, initOverrides) {
|
|
506
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
507
|
+
const queryParameters = {};
|
|
508
|
+
if (requestParameters.groupName !== undefined) {
|
|
509
|
+
queryParameters['group__name'] = requestParameters.groupName;
|
|
510
|
+
}
|
|
511
|
+
if (requestParameters.ordering !== undefined) {
|
|
512
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
513
|
+
}
|
|
514
|
+
if (requestParameters.page !== undefined) {
|
|
515
|
+
queryParameters['page'] = requestParameters.page;
|
|
516
|
+
}
|
|
517
|
+
if (requestParameters.pageSize !== undefined) {
|
|
518
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
519
|
+
}
|
|
520
|
+
if (requestParameters.search !== undefined) {
|
|
521
|
+
queryParameters['search'] = requestParameters.search;
|
|
522
|
+
}
|
|
523
|
+
const headerParameters = {};
|
|
524
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
525
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
526
|
+
}
|
|
527
|
+
const response = yield this.request({
|
|
528
|
+
path: `/rbac/roles/`,
|
|
529
|
+
method: 'GET',
|
|
530
|
+
headers: headerParameters,
|
|
531
|
+
query: queryParameters,
|
|
532
|
+
}, initOverrides);
|
|
533
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedRoleListFromJSON(jsonValue));
|
|
534
|
+
});
|
|
535
|
+
}
|
|
536
|
+
/**
|
|
537
|
+
* Role viewset
|
|
538
|
+
*/
|
|
539
|
+
rbacRolesList(requestParameters = {}, initOverrides) {
|
|
540
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
541
|
+
const response = yield this.rbacRolesListRaw(requestParameters, initOverrides);
|
|
542
|
+
return yield response.value();
|
|
543
|
+
});
|
|
544
|
+
}
|
|
545
|
+
/**
|
|
546
|
+
* Role viewset
|
|
547
|
+
*/
|
|
548
|
+
rbacRolesPartialUpdateRaw(requestParameters, initOverrides) {
|
|
549
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
550
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
551
|
+
throw new runtime.RequiredError('uuid', 'Required parameter requestParameters.uuid was null or undefined when calling rbacRolesPartialUpdate.');
|
|
552
|
+
}
|
|
553
|
+
const queryParameters = {};
|
|
554
|
+
const headerParameters = {};
|
|
555
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
556
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
557
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
558
|
+
}
|
|
559
|
+
const response = yield this.request({
|
|
560
|
+
path: `/rbac/roles/{uuid}/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
561
|
+
method: 'PATCH',
|
|
562
|
+
headers: headerParameters,
|
|
563
|
+
query: queryParameters,
|
|
564
|
+
body: PatchedRoleRequestToJSON(requestParameters.patchedRoleRequest),
|
|
565
|
+
}, initOverrides);
|
|
566
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => RoleFromJSON(jsonValue));
|
|
567
|
+
});
|
|
568
|
+
}
|
|
569
|
+
/**
|
|
570
|
+
* Role viewset
|
|
571
|
+
*/
|
|
572
|
+
rbacRolesPartialUpdate(requestParameters, initOverrides) {
|
|
573
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
574
|
+
const response = yield this.rbacRolesPartialUpdateRaw(requestParameters, initOverrides);
|
|
575
|
+
return yield response.value();
|
|
576
|
+
});
|
|
577
|
+
}
|
|
578
|
+
/**
|
|
579
|
+
* Role viewset
|
|
580
|
+
*/
|
|
581
|
+
rbacRolesRetrieveRaw(requestParameters, initOverrides) {
|
|
582
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
583
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
584
|
+
throw new runtime.RequiredError('uuid', 'Required parameter requestParameters.uuid was null or undefined when calling rbacRolesRetrieve.');
|
|
585
|
+
}
|
|
586
|
+
const queryParameters = {};
|
|
587
|
+
const headerParameters = {};
|
|
588
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
589
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
590
|
+
}
|
|
591
|
+
const response = yield this.request({
|
|
592
|
+
path: `/rbac/roles/{uuid}/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
593
|
+
method: 'GET',
|
|
594
|
+
headers: headerParameters,
|
|
595
|
+
query: queryParameters,
|
|
596
|
+
}, initOverrides);
|
|
597
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => RoleFromJSON(jsonValue));
|
|
598
|
+
});
|
|
599
|
+
}
|
|
600
|
+
/**
|
|
601
|
+
* Role viewset
|
|
602
|
+
*/
|
|
603
|
+
rbacRolesRetrieve(requestParameters, initOverrides) {
|
|
604
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
605
|
+
const response = yield this.rbacRolesRetrieveRaw(requestParameters, initOverrides);
|
|
606
|
+
return yield response.value();
|
|
607
|
+
});
|
|
608
|
+
}
|
|
609
|
+
/**
|
|
610
|
+
* Role viewset
|
|
611
|
+
*/
|
|
612
|
+
rbacRolesUpdateRaw(requestParameters, initOverrides) {
|
|
613
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
614
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
615
|
+
throw new runtime.RequiredError('uuid', 'Required parameter requestParameters.uuid was null or undefined when calling rbacRolesUpdate.');
|
|
616
|
+
}
|
|
617
|
+
if (requestParameters.roleRequest === null || requestParameters.roleRequest === undefined) {
|
|
618
|
+
throw new runtime.RequiredError('roleRequest', 'Required parameter requestParameters.roleRequest was null or undefined when calling rbacRolesUpdate.');
|
|
619
|
+
}
|
|
620
|
+
const queryParameters = {};
|
|
621
|
+
const headerParameters = {};
|
|
622
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
623
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
624
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
625
|
+
}
|
|
626
|
+
const response = yield this.request({
|
|
627
|
+
path: `/rbac/roles/{uuid}/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
628
|
+
method: 'PUT',
|
|
629
|
+
headers: headerParameters,
|
|
630
|
+
query: queryParameters,
|
|
631
|
+
body: RoleRequestToJSON(requestParameters.roleRequest),
|
|
632
|
+
}, initOverrides);
|
|
633
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => RoleFromJSON(jsonValue));
|
|
634
|
+
});
|
|
635
|
+
}
|
|
636
|
+
/**
|
|
637
|
+
* Role viewset
|
|
638
|
+
*/
|
|
639
|
+
rbacRolesUpdate(requestParameters, initOverrides) {
|
|
640
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
641
|
+
const response = yield this.rbacRolesUpdateRaw(requestParameters, initOverrides);
|
|
642
|
+
return yield response.value();
|
|
643
|
+
});
|
|
644
|
+
}
|
|
645
|
+
/**
|
|
646
|
+
* Get a list of all objects that use this object
|
|
647
|
+
*/
|
|
648
|
+
rbacRolesUsedByListRaw(requestParameters, initOverrides) {
|
|
649
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
650
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
651
|
+
throw new runtime.RequiredError('uuid', 'Required parameter requestParameters.uuid was null or undefined when calling rbacRolesUsedByList.');
|
|
652
|
+
}
|
|
653
|
+
const queryParameters = {};
|
|
654
|
+
const headerParameters = {};
|
|
655
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
656
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
657
|
+
}
|
|
658
|
+
const response = yield this.request({
|
|
659
|
+
path: `/rbac/roles/{uuid}/used_by/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
660
|
+
method: 'GET',
|
|
661
|
+
headers: headerParameters,
|
|
662
|
+
query: queryParameters,
|
|
663
|
+
}, initOverrides);
|
|
664
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(UsedByFromJSON));
|
|
665
|
+
});
|
|
666
|
+
}
|
|
667
|
+
/**
|
|
668
|
+
* Get a list of all objects that use this object
|
|
669
|
+
*/
|
|
670
|
+
rbacRolesUsedByList(requestParameters, initOverrides) {
|
|
671
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
672
|
+
const response = yield this.rbacRolesUsedByListRaw(requestParameters, initOverrides);
|
|
673
|
+
return yield response.value();
|
|
674
|
+
});
|
|
675
|
+
}
|
|
676
|
+
}
|
|
677
|
+
/**
|
|
678
|
+
* @export
|
|
679
|
+
*/
|
|
680
|
+
export const RbacPermissionsAssignedByRolesListModelEnum = {
|
|
681
|
+
BlueprintsBlueprintinstance: 'authentik_blueprints.blueprintinstance',
|
|
682
|
+
CoreApplication: 'authentik_core.application',
|
|
683
|
+
CoreGroup: 'authentik_core.group',
|
|
684
|
+
CoreToken: 'authentik_core.token',
|
|
685
|
+
CoreUser: 'authentik_core.user',
|
|
686
|
+
CryptoCertificatekeypair: 'authentik_crypto.certificatekeypair',
|
|
687
|
+
EnterpriseLicense: 'authentik_enterprise.license',
|
|
688
|
+
EventsEvent: 'authentik_events.event',
|
|
689
|
+
EventsNotification: 'authentik_events.notification',
|
|
690
|
+
EventsNotificationrule: 'authentik_events.notificationrule',
|
|
691
|
+
EventsNotificationtransport: 'authentik_events.notificationtransport',
|
|
692
|
+
EventsNotificationwebhookmapping: 'authentik_events.notificationwebhookmapping',
|
|
693
|
+
FlowsFlow: 'authentik_flows.flow',
|
|
694
|
+
FlowsFlowstagebinding: 'authentik_flows.flowstagebinding',
|
|
695
|
+
OutpostsDockerserviceconnection: 'authentik_outposts.dockerserviceconnection',
|
|
696
|
+
OutpostsKubernetesserviceconnection: 'authentik_outposts.kubernetesserviceconnection',
|
|
697
|
+
OutpostsOutpost: 'authentik_outposts.outpost',
|
|
698
|
+
PoliciesPolicybinding: 'authentik_policies.policybinding',
|
|
699
|
+
PoliciesDummyDummypolicy: 'authentik_policies_dummy.dummypolicy',
|
|
700
|
+
PoliciesEventMatcherEventmatcherpolicy: 'authentik_policies_event_matcher.eventmatcherpolicy',
|
|
701
|
+
PoliciesExpiryPasswordexpirypolicy: 'authentik_policies_expiry.passwordexpirypolicy',
|
|
702
|
+
PoliciesExpressionExpressionpolicy: 'authentik_policies_expression.expressionpolicy',
|
|
703
|
+
PoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
704
|
+
PoliciesReputationReputation: 'authentik_policies_reputation.reputation',
|
|
705
|
+
PoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
706
|
+
ProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
|
707
|
+
ProvidersOauth2Accesstoken: 'authentik_providers_oauth2.accesstoken',
|
|
708
|
+
ProvidersOauth2Authorizationcode: 'authentik_providers_oauth2.authorizationcode',
|
|
709
|
+
ProvidersOauth2Oauth2provider: 'authentik_providers_oauth2.oauth2provider',
|
|
710
|
+
ProvidersOauth2Refreshtoken: 'authentik_providers_oauth2.refreshtoken',
|
|
711
|
+
ProvidersOauth2Scopemapping: 'authentik_providers_oauth2.scopemapping',
|
|
712
|
+
ProvidersProxyProxyprovider: 'authentik_providers_proxy.proxyprovider',
|
|
713
|
+
ProvidersRadiusRadiusprovider: 'authentik_providers_radius.radiusprovider',
|
|
714
|
+
ProvidersSamlSamlpropertymapping: 'authentik_providers_saml.samlpropertymapping',
|
|
715
|
+
ProvidersSamlSamlprovider: 'authentik_providers_saml.samlprovider',
|
|
716
|
+
ProvidersScimScimmapping: 'authentik_providers_scim.scimmapping',
|
|
717
|
+
ProvidersScimScimprovider: 'authentik_providers_scim.scimprovider',
|
|
718
|
+
RbacRole: 'authentik_rbac.role',
|
|
719
|
+
SourcesLdapLdappropertymapping: 'authentik_sources_ldap.ldappropertymapping',
|
|
720
|
+
SourcesLdapLdapsource: 'authentik_sources_ldap.ldapsource',
|
|
721
|
+
SourcesOauthOauthsource: 'authentik_sources_oauth.oauthsource',
|
|
722
|
+
SourcesOauthUseroauthsourceconnection: 'authentik_sources_oauth.useroauthsourceconnection',
|
|
723
|
+
SourcesPlexPlexsource: 'authentik_sources_plex.plexsource',
|
|
724
|
+
SourcesPlexPlexsourceconnection: 'authentik_sources_plex.plexsourceconnection',
|
|
725
|
+
SourcesSamlSamlsource: 'authentik_sources_saml.samlsource',
|
|
726
|
+
SourcesSamlUsersamlsourceconnection: 'authentik_sources_saml.usersamlsourceconnection',
|
|
727
|
+
StagesAuthenticatorDuoAuthenticatorduostage: 'authentik_stages_authenticator_duo.authenticatorduostage',
|
|
728
|
+
StagesAuthenticatorDuoDuodevice: 'authentik_stages_authenticator_duo.duodevice',
|
|
729
|
+
StagesAuthenticatorSmsAuthenticatorsmsstage: 'authentik_stages_authenticator_sms.authenticatorsmsstage',
|
|
730
|
+
StagesAuthenticatorSmsSmsdevice: 'authentik_stages_authenticator_sms.smsdevice',
|
|
731
|
+
StagesAuthenticatorStaticAuthenticatorstaticstage: 'authentik_stages_authenticator_static.authenticatorstaticstage',
|
|
732
|
+
StagesAuthenticatorStaticStaticdevice: 'authentik_stages_authenticator_static.staticdevice',
|
|
733
|
+
StagesAuthenticatorTotpAuthenticatortotpstage: 'authentik_stages_authenticator_totp.authenticatortotpstage',
|
|
734
|
+
StagesAuthenticatorTotpTotpdevice: 'authentik_stages_authenticator_totp.totpdevice',
|
|
735
|
+
StagesAuthenticatorValidateAuthenticatorvalidatestage: 'authentik_stages_authenticator_validate.authenticatorvalidatestage',
|
|
736
|
+
StagesAuthenticatorWebauthnAuthenticatewebauthnstage: 'authentik_stages_authenticator_webauthn.authenticatewebauthnstage',
|
|
737
|
+
StagesAuthenticatorWebauthnWebauthndevice: 'authentik_stages_authenticator_webauthn.webauthndevice',
|
|
738
|
+
StagesCaptchaCaptchastage: 'authentik_stages_captcha.captchastage',
|
|
739
|
+
StagesConsentConsentstage: 'authentik_stages_consent.consentstage',
|
|
740
|
+
StagesConsentUserconsent: 'authentik_stages_consent.userconsent',
|
|
741
|
+
StagesDenyDenystage: 'authentik_stages_deny.denystage',
|
|
742
|
+
StagesDummyDummystage: 'authentik_stages_dummy.dummystage',
|
|
743
|
+
StagesEmailEmailstage: 'authentik_stages_email.emailstage',
|
|
744
|
+
StagesIdentificationIdentificationstage: 'authentik_stages_identification.identificationstage',
|
|
745
|
+
StagesInvitationInvitation: 'authentik_stages_invitation.invitation',
|
|
746
|
+
StagesInvitationInvitationstage: 'authentik_stages_invitation.invitationstage',
|
|
747
|
+
StagesPasswordPasswordstage: 'authentik_stages_password.passwordstage',
|
|
748
|
+
StagesPromptPrompt: 'authentik_stages_prompt.prompt',
|
|
749
|
+
StagesPromptPromptstage: 'authentik_stages_prompt.promptstage',
|
|
750
|
+
StagesUserDeleteUserdeletestage: 'authentik_stages_user_delete.userdeletestage',
|
|
751
|
+
StagesUserLoginUserloginstage: 'authentik_stages_user_login.userloginstage',
|
|
752
|
+
StagesUserLogoutUserlogoutstage: 'authentik_stages_user_logout.userlogoutstage',
|
|
753
|
+
StagesUserWriteUserwritestage: 'authentik_stages_user_write.userwritestage',
|
|
754
|
+
TenantsTenant: 'authentik_tenants.tenant',
|
|
755
|
+
UnknownDefaultOpenApi: '11184809'
|
|
756
|
+
};
|
|
757
|
+
/**
|
|
758
|
+
* @export
|
|
759
|
+
*/
|
|
760
|
+
export const RbacPermissionsAssignedByUsersListModelEnum = {
|
|
761
|
+
BlueprintsBlueprintinstance: 'authentik_blueprints.blueprintinstance',
|
|
762
|
+
CoreApplication: 'authentik_core.application',
|
|
763
|
+
CoreGroup: 'authentik_core.group',
|
|
764
|
+
CoreToken: 'authentik_core.token',
|
|
765
|
+
CoreUser: 'authentik_core.user',
|
|
766
|
+
CryptoCertificatekeypair: 'authentik_crypto.certificatekeypair',
|
|
767
|
+
EnterpriseLicense: 'authentik_enterprise.license',
|
|
768
|
+
EventsEvent: 'authentik_events.event',
|
|
769
|
+
EventsNotification: 'authentik_events.notification',
|
|
770
|
+
EventsNotificationrule: 'authentik_events.notificationrule',
|
|
771
|
+
EventsNotificationtransport: 'authentik_events.notificationtransport',
|
|
772
|
+
EventsNotificationwebhookmapping: 'authentik_events.notificationwebhookmapping',
|
|
773
|
+
FlowsFlow: 'authentik_flows.flow',
|
|
774
|
+
FlowsFlowstagebinding: 'authentik_flows.flowstagebinding',
|
|
775
|
+
OutpostsDockerserviceconnection: 'authentik_outposts.dockerserviceconnection',
|
|
776
|
+
OutpostsKubernetesserviceconnection: 'authentik_outposts.kubernetesserviceconnection',
|
|
777
|
+
OutpostsOutpost: 'authentik_outposts.outpost',
|
|
778
|
+
PoliciesPolicybinding: 'authentik_policies.policybinding',
|
|
779
|
+
PoliciesDummyDummypolicy: 'authentik_policies_dummy.dummypolicy',
|
|
780
|
+
PoliciesEventMatcherEventmatcherpolicy: 'authentik_policies_event_matcher.eventmatcherpolicy',
|
|
781
|
+
PoliciesExpiryPasswordexpirypolicy: 'authentik_policies_expiry.passwordexpirypolicy',
|
|
782
|
+
PoliciesExpressionExpressionpolicy: 'authentik_policies_expression.expressionpolicy',
|
|
783
|
+
PoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
784
|
+
PoliciesReputationReputation: 'authentik_policies_reputation.reputation',
|
|
785
|
+
PoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
786
|
+
ProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
|
787
|
+
ProvidersOauth2Accesstoken: 'authentik_providers_oauth2.accesstoken',
|
|
788
|
+
ProvidersOauth2Authorizationcode: 'authentik_providers_oauth2.authorizationcode',
|
|
789
|
+
ProvidersOauth2Oauth2provider: 'authentik_providers_oauth2.oauth2provider',
|
|
790
|
+
ProvidersOauth2Refreshtoken: 'authentik_providers_oauth2.refreshtoken',
|
|
791
|
+
ProvidersOauth2Scopemapping: 'authentik_providers_oauth2.scopemapping',
|
|
792
|
+
ProvidersProxyProxyprovider: 'authentik_providers_proxy.proxyprovider',
|
|
793
|
+
ProvidersRadiusRadiusprovider: 'authentik_providers_radius.radiusprovider',
|
|
794
|
+
ProvidersSamlSamlpropertymapping: 'authentik_providers_saml.samlpropertymapping',
|
|
795
|
+
ProvidersSamlSamlprovider: 'authentik_providers_saml.samlprovider',
|
|
796
|
+
ProvidersScimScimmapping: 'authentik_providers_scim.scimmapping',
|
|
797
|
+
ProvidersScimScimprovider: 'authentik_providers_scim.scimprovider',
|
|
798
|
+
RbacRole: 'authentik_rbac.role',
|
|
799
|
+
SourcesLdapLdappropertymapping: 'authentik_sources_ldap.ldappropertymapping',
|
|
800
|
+
SourcesLdapLdapsource: 'authentik_sources_ldap.ldapsource',
|
|
801
|
+
SourcesOauthOauthsource: 'authentik_sources_oauth.oauthsource',
|
|
802
|
+
SourcesOauthUseroauthsourceconnection: 'authentik_sources_oauth.useroauthsourceconnection',
|
|
803
|
+
SourcesPlexPlexsource: 'authentik_sources_plex.plexsource',
|
|
804
|
+
SourcesPlexPlexsourceconnection: 'authentik_sources_plex.plexsourceconnection',
|
|
805
|
+
SourcesSamlSamlsource: 'authentik_sources_saml.samlsource',
|
|
806
|
+
SourcesSamlUsersamlsourceconnection: 'authentik_sources_saml.usersamlsourceconnection',
|
|
807
|
+
StagesAuthenticatorDuoAuthenticatorduostage: 'authentik_stages_authenticator_duo.authenticatorduostage',
|
|
808
|
+
StagesAuthenticatorDuoDuodevice: 'authentik_stages_authenticator_duo.duodevice',
|
|
809
|
+
StagesAuthenticatorSmsAuthenticatorsmsstage: 'authentik_stages_authenticator_sms.authenticatorsmsstage',
|
|
810
|
+
StagesAuthenticatorSmsSmsdevice: 'authentik_stages_authenticator_sms.smsdevice',
|
|
811
|
+
StagesAuthenticatorStaticAuthenticatorstaticstage: 'authentik_stages_authenticator_static.authenticatorstaticstage',
|
|
812
|
+
StagesAuthenticatorStaticStaticdevice: 'authentik_stages_authenticator_static.staticdevice',
|
|
813
|
+
StagesAuthenticatorTotpAuthenticatortotpstage: 'authentik_stages_authenticator_totp.authenticatortotpstage',
|
|
814
|
+
StagesAuthenticatorTotpTotpdevice: 'authentik_stages_authenticator_totp.totpdevice',
|
|
815
|
+
StagesAuthenticatorValidateAuthenticatorvalidatestage: 'authentik_stages_authenticator_validate.authenticatorvalidatestage',
|
|
816
|
+
StagesAuthenticatorWebauthnAuthenticatewebauthnstage: 'authentik_stages_authenticator_webauthn.authenticatewebauthnstage',
|
|
817
|
+
StagesAuthenticatorWebauthnWebauthndevice: 'authentik_stages_authenticator_webauthn.webauthndevice',
|
|
818
|
+
StagesCaptchaCaptchastage: 'authentik_stages_captcha.captchastage',
|
|
819
|
+
StagesConsentConsentstage: 'authentik_stages_consent.consentstage',
|
|
820
|
+
StagesConsentUserconsent: 'authentik_stages_consent.userconsent',
|
|
821
|
+
StagesDenyDenystage: 'authentik_stages_deny.denystage',
|
|
822
|
+
StagesDummyDummystage: 'authentik_stages_dummy.dummystage',
|
|
823
|
+
StagesEmailEmailstage: 'authentik_stages_email.emailstage',
|
|
824
|
+
StagesIdentificationIdentificationstage: 'authentik_stages_identification.identificationstage',
|
|
825
|
+
StagesInvitationInvitation: 'authentik_stages_invitation.invitation',
|
|
826
|
+
StagesInvitationInvitationstage: 'authentik_stages_invitation.invitationstage',
|
|
827
|
+
StagesPasswordPasswordstage: 'authentik_stages_password.passwordstage',
|
|
828
|
+
StagesPromptPrompt: 'authentik_stages_prompt.prompt',
|
|
829
|
+
StagesPromptPromptstage: 'authentik_stages_prompt.promptstage',
|
|
830
|
+
StagesUserDeleteUserdeletestage: 'authentik_stages_user_delete.userdeletestage',
|
|
831
|
+
StagesUserLoginUserloginstage: 'authentik_stages_user_login.userloginstage',
|
|
832
|
+
StagesUserLogoutUserlogoutstage: 'authentik_stages_user_logout.userlogoutstage',
|
|
833
|
+
StagesUserWriteUserwritestage: 'authentik_stages_user_write.userwritestage',
|
|
834
|
+
TenantsTenant: 'authentik_tenants.tenant',
|
|
835
|
+
UnknownDefaultOpenApi: '11184809'
|
|
836
|
+
};
|