@goauthentik/api 2023.8.3-1696847703 → 2023.8.3-1697642041
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +19 -0
- package/dist/apis/RbacApi.d.ts +403 -0
- package/dist/apis/RbacApi.js +840 -0
- package/dist/apis/StagesApi.d.ts +1 -0
- package/dist/apis/StagesApi.js +3 -0
- package/dist/apis/index.d.ts +1 -0
- package/dist/apis/index.js +1 -0
- package/dist/esm/apis/RbacApi.d.ts +403 -0
- package/dist/esm/apis/RbacApi.js +836 -0
- package/dist/esm/apis/StagesApi.d.ts +1 -0
- package/dist/esm/apis/StagesApi.js +3 -0
- package/dist/esm/apis/index.d.ts +1 -0
- package/dist/esm/apis/index.js +1 -0
- package/dist/esm/models/AppEnum.d.ts +2 -0
- package/dist/esm/models/AppEnum.js +2 -0
- package/dist/esm/models/ConsentChallenge.d.ts +5 -5
- package/dist/esm/models/ConsentChallenge.js +5 -5
- package/dist/esm/models/ConsentPermission.d.ts +37 -0
- package/dist/esm/models/ConsentPermission.js +46 -0
- package/dist/esm/models/DenyStage.d.ts +6 -0
- package/dist/esm/models/DenyStage.js +2 -0
- package/dist/esm/models/DenyStageRequest.d.ts +6 -0
- package/dist/esm/models/DenyStageRequest.js +2 -0
- package/dist/esm/models/ExtraRoleObjectPermission.d.ts +81 -0
- package/dist/esm/models/ExtraRoleObjectPermission.js +57 -0
- package/dist/esm/models/ExtraUserObjectPermission.d.ts +81 -0
- package/dist/esm/models/ExtraUserObjectPermission.js +57 -0
- package/dist/esm/models/Group.d.ts +15 -2
- package/dist/esm/models/Group.js +6 -1
- package/dist/esm/models/GroupRequest.d.ts +6 -0
- package/dist/esm/models/GroupRequest.js +2 -0
- package/dist/esm/models/ModelEnum.d.ts +8 -4
- package/dist/esm/models/ModelEnum.js +8 -4
- package/dist/esm/models/PaginatedExtraRoleObjectPermissionList.d.ts +39 -0
- package/dist/esm/models/PaginatedExtraRoleObjectPermissionList.js +48 -0
- package/dist/esm/models/PaginatedExtraUserObjectPermissionList.d.ts +39 -0
- package/dist/esm/models/PaginatedExtraUserObjectPermissionList.js +48 -0
- package/dist/esm/models/PaginatedPermissionList.d.ts +39 -0
- package/dist/esm/models/PaginatedPermissionList.js +48 -0
- package/dist/esm/models/PaginatedRoleAssignedObjectPermissionList.d.ts +39 -0
- package/dist/esm/models/PaginatedRoleAssignedObjectPermissionList.js +48 -0
- package/dist/esm/models/PaginatedRoleList.d.ts +39 -0
- package/dist/esm/models/PaginatedRoleList.js +48 -0
- package/dist/esm/models/PaginatedUserAssignedObjectPermissionList.d.ts +39 -0
- package/dist/esm/models/PaginatedUserAssignedObjectPermissionList.js +48 -0
- package/dist/esm/models/PatchedDenyStageRequest.d.ts +6 -0
- package/dist/esm/models/PatchedDenyStageRequest.js +2 -0
- package/dist/esm/models/PatchedGroupRequest.d.ts +6 -0
- package/dist/esm/models/PatchedGroupRequest.js +2 -0
- package/dist/esm/models/PatchedPermissionAssignRequest.d.ts +44 -0
- package/dist/esm/models/PatchedPermissionAssignRequest.js +48 -0
- package/dist/esm/models/PatchedRoleRequest.d.ts +31 -0
- package/dist/esm/models/PatchedRoleRequest.js +43 -0
- package/dist/esm/models/Permission.d.ts +32 -2
- package/dist/esm/models/Permission.js +13 -3
- package/dist/esm/models/PermissionAssignRequest.d.ts +44 -0
- package/dist/esm/models/PermissionAssignRequest.js +49 -0
- package/dist/esm/models/Role.d.ts +37 -0
- package/dist/esm/models/Role.js +45 -0
- package/dist/esm/models/RoleAssignedObjectPermission.d.ts +44 -0
- package/dist/esm/models/RoleAssignedObjectPermission.js +48 -0
- package/dist/esm/models/RoleObjectPermission.d.ts +61 -0
- package/dist/esm/models/RoleObjectPermission.js +51 -0
- package/dist/esm/models/RoleRequest.d.ts +31 -0
- package/dist/esm/models/RoleRequest.js +43 -0
- package/dist/esm/models/UserAssignedObjectPermission.d.ts +88 -0
- package/dist/esm/models/UserAssignedObjectPermission.js +66 -0
- package/dist/esm/models/UserObjectPermission.d.ts +61 -0
- package/dist/esm/models/UserObjectPermission.js +51 -0
- package/dist/esm/models/UserSelf.d.ts +6 -0
- package/dist/esm/models/UserSelf.js +2 -0
- package/dist/esm/models/index.d.ts +18 -0
- package/dist/esm/models/index.js +18 -0
- package/dist/models/AppEnum.d.ts +2 -0
- package/dist/models/AppEnum.js +2 -0
- package/dist/models/ConsentChallenge.d.ts +5 -5
- package/dist/models/ConsentChallenge.js +5 -5
- package/dist/models/ConsentPermission.d.ts +37 -0
- package/dist/models/ConsentPermission.js +53 -0
- package/dist/models/DenyStage.d.ts +6 -0
- package/dist/models/DenyStage.js +2 -0
- package/dist/models/DenyStageRequest.d.ts +6 -0
- package/dist/models/DenyStageRequest.js +2 -0
- package/dist/models/ExtraRoleObjectPermission.d.ts +81 -0
- package/dist/models/ExtraRoleObjectPermission.js +64 -0
- package/dist/models/ExtraUserObjectPermission.d.ts +81 -0
- package/dist/models/ExtraUserObjectPermission.js +64 -0
- package/dist/models/Group.d.ts +15 -2
- package/dist/models/Group.js +6 -1
- package/dist/models/GroupRequest.d.ts +6 -0
- package/dist/models/GroupRequest.js +2 -0
- package/dist/models/ModelEnum.d.ts +8 -4
- package/dist/models/ModelEnum.js +8 -4
- package/dist/models/PaginatedExtraRoleObjectPermissionList.d.ts +39 -0
- package/dist/models/PaginatedExtraRoleObjectPermissionList.js +55 -0
- package/dist/models/PaginatedExtraUserObjectPermissionList.d.ts +39 -0
- package/dist/models/PaginatedExtraUserObjectPermissionList.js +55 -0
- package/dist/models/PaginatedPermissionList.d.ts +39 -0
- package/dist/models/PaginatedPermissionList.js +55 -0
- package/dist/models/PaginatedRoleAssignedObjectPermissionList.d.ts +39 -0
- package/dist/models/PaginatedRoleAssignedObjectPermissionList.js +55 -0
- package/dist/models/PaginatedRoleList.d.ts +39 -0
- package/dist/models/PaginatedRoleList.js +55 -0
- package/dist/models/PaginatedUserAssignedObjectPermissionList.d.ts +39 -0
- package/dist/models/PaginatedUserAssignedObjectPermissionList.js +55 -0
- package/dist/models/PatchedDenyStageRequest.d.ts +6 -0
- package/dist/models/PatchedDenyStageRequest.js +2 -0
- package/dist/models/PatchedGroupRequest.d.ts +6 -0
- package/dist/models/PatchedGroupRequest.js +2 -0
- package/dist/models/PatchedPermissionAssignRequest.d.ts +44 -0
- package/dist/models/PatchedPermissionAssignRequest.js +55 -0
- package/dist/models/PatchedRoleRequest.d.ts +31 -0
- package/dist/models/PatchedRoleRequest.js +50 -0
- package/dist/models/Permission.d.ts +32 -2
- package/dist/models/Permission.js +13 -3
- package/dist/models/PermissionAssignRequest.d.ts +44 -0
- package/dist/models/PermissionAssignRequest.js +56 -0
- package/dist/models/Role.d.ts +37 -0
- package/dist/models/Role.js +52 -0
- package/dist/models/RoleAssignedObjectPermission.d.ts +44 -0
- package/dist/models/RoleAssignedObjectPermission.js +55 -0
- package/dist/models/RoleObjectPermission.d.ts +61 -0
- package/dist/models/RoleObjectPermission.js +58 -0
- package/dist/models/RoleRequest.d.ts +31 -0
- package/dist/models/RoleRequest.js +50 -0
- package/dist/models/UserAssignedObjectPermission.d.ts +88 -0
- package/dist/models/UserAssignedObjectPermission.js +73 -0
- package/dist/models/UserObjectPermission.d.ts +61 -0
- package/dist/models/UserObjectPermission.js +58 -0
- package/dist/models/UserSelf.d.ts +6 -0
- package/dist/models/UserSelf.js +2 -0
- package/dist/models/index.d.ts +18 -0
- package/dist/models/index.js +18 -0
- package/package.json +1 -1
- package/src/apis/RbacApi.ts +1081 -0
- package/src/apis/StagesApi.ts +5 -0
- package/src/apis/index.ts +1 -0
- package/src/models/AppEnum.ts +2 -0
- package/src/models/ConsentChallenge.ts +14 -14
- package/src/models/ConsentPermission.ts +75 -0
- package/src/models/DenyStage.ts +8 -0
- package/src/models/DenyStageRequest.ts +8 -0
- package/src/models/ExtraRoleObjectPermission.ts +131 -0
- package/src/models/ExtraUserObjectPermission.ts +131 -0
- package/src/models/Group.ts +25 -3
- package/src/models/GroupRequest.ts +8 -0
- package/src/models/ModelEnum.ts +8 -4
- package/src/models/PaginatedExtraRoleObjectPermissionList.ts +88 -0
- package/src/models/PaginatedExtraUserObjectPermissionList.ts +88 -0
- package/src/models/PaginatedPermissionList.ts +88 -0
- package/src/models/PaginatedRoleAssignedObjectPermissionList.ts +88 -0
- package/src/models/PaginatedRoleList.ts +88 -0
- package/src/models/PaginatedUserAssignedObjectPermissionList.ts +88 -0
- package/src/models/PatchedDenyStageRequest.ts +8 -0
- package/src/models/PatchedGroupRequest.ts +8 -0
- package/src/models/PatchedPermissionAssignRequest.ts +88 -0
- package/src/models/PatchedRoleRequest.ts +65 -0
- package/src/models/Permission.ts +45 -5
- package/src/models/PermissionAssignRequest.ts +89 -0
- package/src/models/Role.ts +74 -0
- package/src/models/RoleAssignedObjectPermission.ts +89 -0
- package/src/models/RoleObjectPermission.ts +105 -0
- package/src/models/RoleRequest.ts +66 -0
- package/src/models/UserAssignedObjectPermission.ts +148 -0
- package/src/models/UserObjectPermission.ts +105 -0
- package/src/models/UserSelf.ts +8 -0
- package/src/models/index.ts +18 -0
|
@@ -0,0 +1,1081 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* authentik
|
|
5
|
+
* Making authentication simple.
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 2023.8.3
|
|
8
|
+
* Contact: hello@goauthentik.io
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
|
|
15
|
+
|
|
16
|
+
import * as runtime from '../runtime';
|
|
17
|
+
import type {
|
|
18
|
+
GenericError,
|
|
19
|
+
PaginatedExtraRoleObjectPermissionList,
|
|
20
|
+
PaginatedExtraUserObjectPermissionList,
|
|
21
|
+
PaginatedPermissionList,
|
|
22
|
+
PaginatedRoleAssignedObjectPermissionList,
|
|
23
|
+
PaginatedRoleList,
|
|
24
|
+
PaginatedUserAssignedObjectPermissionList,
|
|
25
|
+
PatchedPermissionAssignRequest,
|
|
26
|
+
PatchedRoleRequest,
|
|
27
|
+
Permission,
|
|
28
|
+
PermissionAssignRequest,
|
|
29
|
+
Role,
|
|
30
|
+
RoleRequest,
|
|
31
|
+
UsedBy,
|
|
32
|
+
ValidationError,
|
|
33
|
+
} from '../models';
|
|
34
|
+
import {
|
|
35
|
+
GenericErrorFromJSON,
|
|
36
|
+
GenericErrorToJSON,
|
|
37
|
+
PaginatedExtraRoleObjectPermissionListFromJSON,
|
|
38
|
+
PaginatedExtraRoleObjectPermissionListToJSON,
|
|
39
|
+
PaginatedExtraUserObjectPermissionListFromJSON,
|
|
40
|
+
PaginatedExtraUserObjectPermissionListToJSON,
|
|
41
|
+
PaginatedPermissionListFromJSON,
|
|
42
|
+
PaginatedPermissionListToJSON,
|
|
43
|
+
PaginatedRoleAssignedObjectPermissionListFromJSON,
|
|
44
|
+
PaginatedRoleAssignedObjectPermissionListToJSON,
|
|
45
|
+
PaginatedRoleListFromJSON,
|
|
46
|
+
PaginatedRoleListToJSON,
|
|
47
|
+
PaginatedUserAssignedObjectPermissionListFromJSON,
|
|
48
|
+
PaginatedUserAssignedObjectPermissionListToJSON,
|
|
49
|
+
PatchedPermissionAssignRequestFromJSON,
|
|
50
|
+
PatchedPermissionAssignRequestToJSON,
|
|
51
|
+
PatchedRoleRequestFromJSON,
|
|
52
|
+
PatchedRoleRequestToJSON,
|
|
53
|
+
PermissionFromJSON,
|
|
54
|
+
PermissionToJSON,
|
|
55
|
+
PermissionAssignRequestFromJSON,
|
|
56
|
+
PermissionAssignRequestToJSON,
|
|
57
|
+
RoleFromJSON,
|
|
58
|
+
RoleToJSON,
|
|
59
|
+
RoleRequestFromJSON,
|
|
60
|
+
RoleRequestToJSON,
|
|
61
|
+
UsedByFromJSON,
|
|
62
|
+
UsedByToJSON,
|
|
63
|
+
ValidationErrorFromJSON,
|
|
64
|
+
ValidationErrorToJSON,
|
|
65
|
+
} from '../models';
|
|
66
|
+
|
|
67
|
+
export interface RbacPermissionsAssignedByRolesAssignCreateRequest {
|
|
68
|
+
uuid: string;
|
|
69
|
+
permissionAssignRequest: PermissionAssignRequest;
|
|
70
|
+
}
|
|
71
|
+
|
|
72
|
+
export interface RbacPermissionsAssignedByRolesListRequest {
|
|
73
|
+
model: RbacPermissionsAssignedByRolesListModelEnum;
|
|
74
|
+
objectPk?: string;
|
|
75
|
+
ordering?: string;
|
|
76
|
+
page?: number;
|
|
77
|
+
pageSize?: number;
|
|
78
|
+
search?: string;
|
|
79
|
+
}
|
|
80
|
+
|
|
81
|
+
export interface RbacPermissionsAssignedByRolesUnassignPartialUpdateRequest {
|
|
82
|
+
uuid: string;
|
|
83
|
+
patchedPermissionAssignRequest?: PatchedPermissionAssignRequest;
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
export interface RbacPermissionsAssignedByUsersAssignCreateRequest {
|
|
87
|
+
id: number;
|
|
88
|
+
permissionAssignRequest: PermissionAssignRequest;
|
|
89
|
+
}
|
|
90
|
+
|
|
91
|
+
export interface RbacPermissionsAssignedByUsersListRequest {
|
|
92
|
+
model: RbacPermissionsAssignedByUsersListModelEnum;
|
|
93
|
+
objectPk?: string;
|
|
94
|
+
ordering?: string;
|
|
95
|
+
page?: number;
|
|
96
|
+
pageSize?: number;
|
|
97
|
+
search?: string;
|
|
98
|
+
}
|
|
99
|
+
|
|
100
|
+
export interface RbacPermissionsAssignedByUsersUnassignPartialUpdateRequest {
|
|
101
|
+
id: number;
|
|
102
|
+
patchedPermissionAssignRequest?: PatchedPermissionAssignRequest;
|
|
103
|
+
}
|
|
104
|
+
|
|
105
|
+
export interface RbacPermissionsListRequest {
|
|
106
|
+
codename?: string;
|
|
107
|
+
contentTypeAppLabel?: string;
|
|
108
|
+
contentTypeModel?: string;
|
|
109
|
+
ordering?: string;
|
|
110
|
+
page?: number;
|
|
111
|
+
pageSize?: number;
|
|
112
|
+
role?: string;
|
|
113
|
+
search?: string;
|
|
114
|
+
user?: number;
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
export interface RbacPermissionsRetrieveRequest {
|
|
118
|
+
id: number;
|
|
119
|
+
}
|
|
120
|
+
|
|
121
|
+
export interface RbacPermissionsRolesListRequest {
|
|
122
|
+
uuid: string;
|
|
123
|
+
ordering?: string;
|
|
124
|
+
page?: number;
|
|
125
|
+
pageSize?: number;
|
|
126
|
+
search?: string;
|
|
127
|
+
}
|
|
128
|
+
|
|
129
|
+
export interface RbacPermissionsUsersListRequest {
|
|
130
|
+
userId: number;
|
|
131
|
+
ordering?: string;
|
|
132
|
+
page?: number;
|
|
133
|
+
pageSize?: number;
|
|
134
|
+
search?: string;
|
|
135
|
+
}
|
|
136
|
+
|
|
137
|
+
export interface RbacRolesCreateRequest {
|
|
138
|
+
roleRequest: RoleRequest;
|
|
139
|
+
}
|
|
140
|
+
|
|
141
|
+
export interface RbacRolesDestroyRequest {
|
|
142
|
+
uuid: string;
|
|
143
|
+
}
|
|
144
|
+
|
|
145
|
+
export interface RbacRolesListRequest {
|
|
146
|
+
groupName?: string;
|
|
147
|
+
ordering?: string;
|
|
148
|
+
page?: number;
|
|
149
|
+
pageSize?: number;
|
|
150
|
+
search?: string;
|
|
151
|
+
}
|
|
152
|
+
|
|
153
|
+
export interface RbacRolesPartialUpdateRequest {
|
|
154
|
+
uuid: string;
|
|
155
|
+
patchedRoleRequest?: PatchedRoleRequest;
|
|
156
|
+
}
|
|
157
|
+
|
|
158
|
+
export interface RbacRolesRetrieveRequest {
|
|
159
|
+
uuid: string;
|
|
160
|
+
}
|
|
161
|
+
|
|
162
|
+
export interface RbacRolesUpdateRequest {
|
|
163
|
+
uuid: string;
|
|
164
|
+
roleRequest: RoleRequest;
|
|
165
|
+
}
|
|
166
|
+
|
|
167
|
+
export interface RbacRolesUsedByListRequest {
|
|
168
|
+
uuid: string;
|
|
169
|
+
}
|
|
170
|
+
|
|
171
|
+
/**
|
|
172
|
+
*
|
|
173
|
+
*/
|
|
174
|
+
export class RbacApi extends runtime.BaseAPI {
|
|
175
|
+
|
|
176
|
+
/**
|
|
177
|
+
* Assign permission(s) to role. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
178
|
+
*/
|
|
179
|
+
async rbacPermissionsAssignedByRolesAssignCreateRaw(requestParameters: RbacPermissionsAssignedByRolesAssignCreateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<void>> {
|
|
180
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
181
|
+
throw new runtime.RequiredError('uuid','Required parameter requestParameters.uuid was null or undefined when calling rbacPermissionsAssignedByRolesAssignCreate.');
|
|
182
|
+
}
|
|
183
|
+
|
|
184
|
+
if (requestParameters.permissionAssignRequest === null || requestParameters.permissionAssignRequest === undefined) {
|
|
185
|
+
throw new runtime.RequiredError('permissionAssignRequest','Required parameter requestParameters.permissionAssignRequest was null or undefined when calling rbacPermissionsAssignedByRolesAssignCreate.');
|
|
186
|
+
}
|
|
187
|
+
|
|
188
|
+
const queryParameters: any = {};
|
|
189
|
+
|
|
190
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
191
|
+
|
|
192
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
193
|
+
|
|
194
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
195
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
196
|
+
}
|
|
197
|
+
|
|
198
|
+
const response = await this.request({
|
|
199
|
+
path: `/rbac/permissions/assigned_by_roles/{uuid}/assign/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
200
|
+
method: 'POST',
|
|
201
|
+
headers: headerParameters,
|
|
202
|
+
query: queryParameters,
|
|
203
|
+
body: PermissionAssignRequestToJSON(requestParameters.permissionAssignRequest),
|
|
204
|
+
}, initOverrides);
|
|
205
|
+
|
|
206
|
+
return new runtime.VoidApiResponse(response);
|
|
207
|
+
}
|
|
208
|
+
|
|
209
|
+
/**
|
|
210
|
+
* Assign permission(s) to role. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
211
|
+
*/
|
|
212
|
+
async rbacPermissionsAssignedByRolesAssignCreate(requestParameters: RbacPermissionsAssignedByRolesAssignCreateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<void> {
|
|
213
|
+
await this.rbacPermissionsAssignedByRolesAssignCreateRaw(requestParameters, initOverrides);
|
|
214
|
+
}
|
|
215
|
+
|
|
216
|
+
/**
|
|
217
|
+
* Get assigned object permissions for a single object
|
|
218
|
+
*/
|
|
219
|
+
async rbacPermissionsAssignedByRolesListRaw(requestParameters: RbacPermissionsAssignedByRolesListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<PaginatedRoleAssignedObjectPermissionList>> {
|
|
220
|
+
if (requestParameters.model === null || requestParameters.model === undefined) {
|
|
221
|
+
throw new runtime.RequiredError('model','Required parameter requestParameters.model was null or undefined when calling rbacPermissionsAssignedByRolesList.');
|
|
222
|
+
}
|
|
223
|
+
|
|
224
|
+
const queryParameters: any = {};
|
|
225
|
+
|
|
226
|
+
if (requestParameters.model !== undefined) {
|
|
227
|
+
queryParameters['model'] = requestParameters.model;
|
|
228
|
+
}
|
|
229
|
+
|
|
230
|
+
if (requestParameters.objectPk !== undefined) {
|
|
231
|
+
queryParameters['object_pk'] = requestParameters.objectPk;
|
|
232
|
+
}
|
|
233
|
+
|
|
234
|
+
if (requestParameters.ordering !== undefined) {
|
|
235
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
236
|
+
}
|
|
237
|
+
|
|
238
|
+
if (requestParameters.page !== undefined) {
|
|
239
|
+
queryParameters['page'] = requestParameters.page;
|
|
240
|
+
}
|
|
241
|
+
|
|
242
|
+
if (requestParameters.pageSize !== undefined) {
|
|
243
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
244
|
+
}
|
|
245
|
+
|
|
246
|
+
if (requestParameters.search !== undefined) {
|
|
247
|
+
queryParameters['search'] = requestParameters.search;
|
|
248
|
+
}
|
|
249
|
+
|
|
250
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
251
|
+
|
|
252
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
253
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
254
|
+
}
|
|
255
|
+
|
|
256
|
+
const response = await this.request({
|
|
257
|
+
path: `/rbac/permissions/assigned_by_roles/`,
|
|
258
|
+
method: 'GET',
|
|
259
|
+
headers: headerParameters,
|
|
260
|
+
query: queryParameters,
|
|
261
|
+
}, initOverrides);
|
|
262
|
+
|
|
263
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedRoleAssignedObjectPermissionListFromJSON(jsonValue));
|
|
264
|
+
}
|
|
265
|
+
|
|
266
|
+
/**
|
|
267
|
+
* Get assigned object permissions for a single object
|
|
268
|
+
*/
|
|
269
|
+
async rbacPermissionsAssignedByRolesList(requestParameters: RbacPermissionsAssignedByRolesListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<PaginatedRoleAssignedObjectPermissionList> {
|
|
270
|
+
const response = await this.rbacPermissionsAssignedByRolesListRaw(requestParameters, initOverrides);
|
|
271
|
+
return await response.value();
|
|
272
|
+
}
|
|
273
|
+
|
|
274
|
+
/**
|
|
275
|
+
* Unassign permission(s) to role. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
276
|
+
*/
|
|
277
|
+
async rbacPermissionsAssignedByRolesUnassignPartialUpdateRaw(requestParameters: RbacPermissionsAssignedByRolesUnassignPartialUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<void>> {
|
|
278
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
279
|
+
throw new runtime.RequiredError('uuid','Required parameter requestParameters.uuid was null or undefined when calling rbacPermissionsAssignedByRolesUnassignPartialUpdate.');
|
|
280
|
+
}
|
|
281
|
+
|
|
282
|
+
const queryParameters: any = {};
|
|
283
|
+
|
|
284
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
285
|
+
|
|
286
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
287
|
+
|
|
288
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
289
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
290
|
+
}
|
|
291
|
+
|
|
292
|
+
const response = await this.request({
|
|
293
|
+
path: `/rbac/permissions/assigned_by_roles/{uuid}/unassign/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
294
|
+
method: 'PATCH',
|
|
295
|
+
headers: headerParameters,
|
|
296
|
+
query: queryParameters,
|
|
297
|
+
body: PatchedPermissionAssignRequestToJSON(requestParameters.patchedPermissionAssignRequest),
|
|
298
|
+
}, initOverrides);
|
|
299
|
+
|
|
300
|
+
return new runtime.VoidApiResponse(response);
|
|
301
|
+
}
|
|
302
|
+
|
|
303
|
+
/**
|
|
304
|
+
* Unassign permission(s) to role. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
305
|
+
*/
|
|
306
|
+
async rbacPermissionsAssignedByRolesUnassignPartialUpdate(requestParameters: RbacPermissionsAssignedByRolesUnassignPartialUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<void> {
|
|
307
|
+
await this.rbacPermissionsAssignedByRolesUnassignPartialUpdateRaw(requestParameters, initOverrides);
|
|
308
|
+
}
|
|
309
|
+
|
|
310
|
+
/**
|
|
311
|
+
* Assign permission(s) to user
|
|
312
|
+
*/
|
|
313
|
+
async rbacPermissionsAssignedByUsersAssignCreateRaw(requestParameters: RbacPermissionsAssignedByUsersAssignCreateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<void>> {
|
|
314
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
315
|
+
throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling rbacPermissionsAssignedByUsersAssignCreate.');
|
|
316
|
+
}
|
|
317
|
+
|
|
318
|
+
if (requestParameters.permissionAssignRequest === null || requestParameters.permissionAssignRequest === undefined) {
|
|
319
|
+
throw new runtime.RequiredError('permissionAssignRequest','Required parameter requestParameters.permissionAssignRequest was null or undefined when calling rbacPermissionsAssignedByUsersAssignCreate.');
|
|
320
|
+
}
|
|
321
|
+
|
|
322
|
+
const queryParameters: any = {};
|
|
323
|
+
|
|
324
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
325
|
+
|
|
326
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
327
|
+
|
|
328
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
329
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
330
|
+
}
|
|
331
|
+
|
|
332
|
+
const response = await this.request({
|
|
333
|
+
path: `/rbac/permissions/assigned_by_users/{id}/assign/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
334
|
+
method: 'POST',
|
|
335
|
+
headers: headerParameters,
|
|
336
|
+
query: queryParameters,
|
|
337
|
+
body: PermissionAssignRequestToJSON(requestParameters.permissionAssignRequest),
|
|
338
|
+
}, initOverrides);
|
|
339
|
+
|
|
340
|
+
return new runtime.VoidApiResponse(response);
|
|
341
|
+
}
|
|
342
|
+
|
|
343
|
+
/**
|
|
344
|
+
* Assign permission(s) to user
|
|
345
|
+
*/
|
|
346
|
+
async rbacPermissionsAssignedByUsersAssignCreate(requestParameters: RbacPermissionsAssignedByUsersAssignCreateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<void> {
|
|
347
|
+
await this.rbacPermissionsAssignedByUsersAssignCreateRaw(requestParameters, initOverrides);
|
|
348
|
+
}
|
|
349
|
+
|
|
350
|
+
/**
|
|
351
|
+
* Get assigned object permissions for a single object
|
|
352
|
+
*/
|
|
353
|
+
async rbacPermissionsAssignedByUsersListRaw(requestParameters: RbacPermissionsAssignedByUsersListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<PaginatedUserAssignedObjectPermissionList>> {
|
|
354
|
+
if (requestParameters.model === null || requestParameters.model === undefined) {
|
|
355
|
+
throw new runtime.RequiredError('model','Required parameter requestParameters.model was null or undefined when calling rbacPermissionsAssignedByUsersList.');
|
|
356
|
+
}
|
|
357
|
+
|
|
358
|
+
const queryParameters: any = {};
|
|
359
|
+
|
|
360
|
+
if (requestParameters.model !== undefined) {
|
|
361
|
+
queryParameters['model'] = requestParameters.model;
|
|
362
|
+
}
|
|
363
|
+
|
|
364
|
+
if (requestParameters.objectPk !== undefined) {
|
|
365
|
+
queryParameters['object_pk'] = requestParameters.objectPk;
|
|
366
|
+
}
|
|
367
|
+
|
|
368
|
+
if (requestParameters.ordering !== undefined) {
|
|
369
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
370
|
+
}
|
|
371
|
+
|
|
372
|
+
if (requestParameters.page !== undefined) {
|
|
373
|
+
queryParameters['page'] = requestParameters.page;
|
|
374
|
+
}
|
|
375
|
+
|
|
376
|
+
if (requestParameters.pageSize !== undefined) {
|
|
377
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
378
|
+
}
|
|
379
|
+
|
|
380
|
+
if (requestParameters.search !== undefined) {
|
|
381
|
+
queryParameters['search'] = requestParameters.search;
|
|
382
|
+
}
|
|
383
|
+
|
|
384
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
385
|
+
|
|
386
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
387
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
388
|
+
}
|
|
389
|
+
|
|
390
|
+
const response = await this.request({
|
|
391
|
+
path: `/rbac/permissions/assigned_by_users/`,
|
|
392
|
+
method: 'GET',
|
|
393
|
+
headers: headerParameters,
|
|
394
|
+
query: queryParameters,
|
|
395
|
+
}, initOverrides);
|
|
396
|
+
|
|
397
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedUserAssignedObjectPermissionListFromJSON(jsonValue));
|
|
398
|
+
}
|
|
399
|
+
|
|
400
|
+
/**
|
|
401
|
+
* Get assigned object permissions for a single object
|
|
402
|
+
*/
|
|
403
|
+
async rbacPermissionsAssignedByUsersList(requestParameters: RbacPermissionsAssignedByUsersListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<PaginatedUserAssignedObjectPermissionList> {
|
|
404
|
+
const response = await this.rbacPermissionsAssignedByUsersListRaw(requestParameters, initOverrides);
|
|
405
|
+
return await response.value();
|
|
406
|
+
}
|
|
407
|
+
|
|
408
|
+
/**
|
|
409
|
+
* Unassign permission(s) to user. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
410
|
+
*/
|
|
411
|
+
async rbacPermissionsAssignedByUsersUnassignPartialUpdateRaw(requestParameters: RbacPermissionsAssignedByUsersUnassignPartialUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<void>> {
|
|
412
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
413
|
+
throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling rbacPermissionsAssignedByUsersUnassignPartialUpdate.');
|
|
414
|
+
}
|
|
415
|
+
|
|
416
|
+
const queryParameters: any = {};
|
|
417
|
+
|
|
418
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
419
|
+
|
|
420
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
421
|
+
|
|
422
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
423
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
424
|
+
}
|
|
425
|
+
|
|
426
|
+
const response = await this.request({
|
|
427
|
+
path: `/rbac/permissions/assigned_by_users/{id}/unassign/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
428
|
+
method: 'PATCH',
|
|
429
|
+
headers: headerParameters,
|
|
430
|
+
query: queryParameters,
|
|
431
|
+
body: PatchedPermissionAssignRequestToJSON(requestParameters.patchedPermissionAssignRequest),
|
|
432
|
+
}, initOverrides);
|
|
433
|
+
|
|
434
|
+
return new runtime.VoidApiResponse(response);
|
|
435
|
+
}
|
|
436
|
+
|
|
437
|
+
/**
|
|
438
|
+
* Unassign permission(s) to user. When `object_pk` is set, the permissions are only assigned to the specific object, otherwise they are assigned globally.
|
|
439
|
+
*/
|
|
440
|
+
async rbacPermissionsAssignedByUsersUnassignPartialUpdate(requestParameters: RbacPermissionsAssignedByUsersUnassignPartialUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<void> {
|
|
441
|
+
await this.rbacPermissionsAssignedByUsersUnassignPartialUpdateRaw(requestParameters, initOverrides);
|
|
442
|
+
}
|
|
443
|
+
|
|
444
|
+
/**
|
|
445
|
+
* Read-only list of all permissions, filterable by model and app
|
|
446
|
+
*/
|
|
447
|
+
async rbacPermissionsListRaw(requestParameters: RbacPermissionsListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<PaginatedPermissionList>> {
|
|
448
|
+
const queryParameters: any = {};
|
|
449
|
+
|
|
450
|
+
if (requestParameters.codename !== undefined) {
|
|
451
|
+
queryParameters['codename'] = requestParameters.codename;
|
|
452
|
+
}
|
|
453
|
+
|
|
454
|
+
if (requestParameters.contentTypeAppLabel !== undefined) {
|
|
455
|
+
queryParameters['content_type__app_label'] = requestParameters.contentTypeAppLabel;
|
|
456
|
+
}
|
|
457
|
+
|
|
458
|
+
if (requestParameters.contentTypeModel !== undefined) {
|
|
459
|
+
queryParameters['content_type__model'] = requestParameters.contentTypeModel;
|
|
460
|
+
}
|
|
461
|
+
|
|
462
|
+
if (requestParameters.ordering !== undefined) {
|
|
463
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
464
|
+
}
|
|
465
|
+
|
|
466
|
+
if (requestParameters.page !== undefined) {
|
|
467
|
+
queryParameters['page'] = requestParameters.page;
|
|
468
|
+
}
|
|
469
|
+
|
|
470
|
+
if (requestParameters.pageSize !== undefined) {
|
|
471
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
472
|
+
}
|
|
473
|
+
|
|
474
|
+
if (requestParameters.role !== undefined) {
|
|
475
|
+
queryParameters['role'] = requestParameters.role;
|
|
476
|
+
}
|
|
477
|
+
|
|
478
|
+
if (requestParameters.search !== undefined) {
|
|
479
|
+
queryParameters['search'] = requestParameters.search;
|
|
480
|
+
}
|
|
481
|
+
|
|
482
|
+
if (requestParameters.user !== undefined) {
|
|
483
|
+
queryParameters['user'] = requestParameters.user;
|
|
484
|
+
}
|
|
485
|
+
|
|
486
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
487
|
+
|
|
488
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
489
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
490
|
+
}
|
|
491
|
+
|
|
492
|
+
const response = await this.request({
|
|
493
|
+
path: `/rbac/permissions/`,
|
|
494
|
+
method: 'GET',
|
|
495
|
+
headers: headerParameters,
|
|
496
|
+
query: queryParameters,
|
|
497
|
+
}, initOverrides);
|
|
498
|
+
|
|
499
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedPermissionListFromJSON(jsonValue));
|
|
500
|
+
}
|
|
501
|
+
|
|
502
|
+
/**
|
|
503
|
+
* Read-only list of all permissions, filterable by model and app
|
|
504
|
+
*/
|
|
505
|
+
async rbacPermissionsList(requestParameters: RbacPermissionsListRequest = {}, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<PaginatedPermissionList> {
|
|
506
|
+
const response = await this.rbacPermissionsListRaw(requestParameters, initOverrides);
|
|
507
|
+
return await response.value();
|
|
508
|
+
}
|
|
509
|
+
|
|
510
|
+
/**
|
|
511
|
+
* Read-only list of all permissions, filterable by model and app
|
|
512
|
+
*/
|
|
513
|
+
async rbacPermissionsRetrieveRaw(requestParameters: RbacPermissionsRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Permission>> {
|
|
514
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
515
|
+
throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling rbacPermissionsRetrieve.');
|
|
516
|
+
}
|
|
517
|
+
|
|
518
|
+
const queryParameters: any = {};
|
|
519
|
+
|
|
520
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
521
|
+
|
|
522
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
523
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
524
|
+
}
|
|
525
|
+
|
|
526
|
+
const response = await this.request({
|
|
527
|
+
path: `/rbac/permissions/{id}/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
528
|
+
method: 'GET',
|
|
529
|
+
headers: headerParameters,
|
|
530
|
+
query: queryParameters,
|
|
531
|
+
}, initOverrides);
|
|
532
|
+
|
|
533
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PermissionFromJSON(jsonValue));
|
|
534
|
+
}
|
|
535
|
+
|
|
536
|
+
/**
|
|
537
|
+
* Read-only list of all permissions, filterable by model and app
|
|
538
|
+
*/
|
|
539
|
+
async rbacPermissionsRetrieve(requestParameters: RbacPermissionsRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Permission> {
|
|
540
|
+
const response = await this.rbacPermissionsRetrieveRaw(requestParameters, initOverrides);
|
|
541
|
+
return await response.value();
|
|
542
|
+
}
|
|
543
|
+
|
|
544
|
+
/**
|
|
545
|
+
* Get a role\'s assigned object permissions
|
|
546
|
+
*/
|
|
547
|
+
async rbacPermissionsRolesListRaw(requestParameters: RbacPermissionsRolesListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<PaginatedExtraRoleObjectPermissionList>> {
|
|
548
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
549
|
+
throw new runtime.RequiredError('uuid','Required parameter requestParameters.uuid was null or undefined when calling rbacPermissionsRolesList.');
|
|
550
|
+
}
|
|
551
|
+
|
|
552
|
+
const queryParameters: any = {};
|
|
553
|
+
|
|
554
|
+
if (requestParameters.ordering !== undefined) {
|
|
555
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
556
|
+
}
|
|
557
|
+
|
|
558
|
+
if (requestParameters.page !== undefined) {
|
|
559
|
+
queryParameters['page'] = requestParameters.page;
|
|
560
|
+
}
|
|
561
|
+
|
|
562
|
+
if (requestParameters.pageSize !== undefined) {
|
|
563
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
564
|
+
}
|
|
565
|
+
|
|
566
|
+
if (requestParameters.search !== undefined) {
|
|
567
|
+
queryParameters['search'] = requestParameters.search;
|
|
568
|
+
}
|
|
569
|
+
|
|
570
|
+
if (requestParameters.uuid !== undefined) {
|
|
571
|
+
queryParameters['uuid'] = requestParameters.uuid;
|
|
572
|
+
}
|
|
573
|
+
|
|
574
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
575
|
+
|
|
576
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
577
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
578
|
+
}
|
|
579
|
+
|
|
580
|
+
const response = await this.request({
|
|
581
|
+
path: `/rbac/permissions/roles/`,
|
|
582
|
+
method: 'GET',
|
|
583
|
+
headers: headerParameters,
|
|
584
|
+
query: queryParameters,
|
|
585
|
+
}, initOverrides);
|
|
586
|
+
|
|
587
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedExtraRoleObjectPermissionListFromJSON(jsonValue));
|
|
588
|
+
}
|
|
589
|
+
|
|
590
|
+
/**
|
|
591
|
+
* Get a role\'s assigned object permissions
|
|
592
|
+
*/
|
|
593
|
+
async rbacPermissionsRolesList(requestParameters: RbacPermissionsRolesListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<PaginatedExtraRoleObjectPermissionList> {
|
|
594
|
+
const response = await this.rbacPermissionsRolesListRaw(requestParameters, initOverrides);
|
|
595
|
+
return await response.value();
|
|
596
|
+
}
|
|
597
|
+
|
|
598
|
+
/**
|
|
599
|
+
* Get a users\'s assigned object permissions
|
|
600
|
+
*/
|
|
601
|
+
async rbacPermissionsUsersListRaw(requestParameters: RbacPermissionsUsersListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<PaginatedExtraUserObjectPermissionList>> {
|
|
602
|
+
if (requestParameters.userId === null || requestParameters.userId === undefined) {
|
|
603
|
+
throw new runtime.RequiredError('userId','Required parameter requestParameters.userId was null or undefined when calling rbacPermissionsUsersList.');
|
|
604
|
+
}
|
|
605
|
+
|
|
606
|
+
const queryParameters: any = {};
|
|
607
|
+
|
|
608
|
+
if (requestParameters.ordering !== undefined) {
|
|
609
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
610
|
+
}
|
|
611
|
+
|
|
612
|
+
if (requestParameters.page !== undefined) {
|
|
613
|
+
queryParameters['page'] = requestParameters.page;
|
|
614
|
+
}
|
|
615
|
+
|
|
616
|
+
if (requestParameters.pageSize !== undefined) {
|
|
617
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
618
|
+
}
|
|
619
|
+
|
|
620
|
+
if (requestParameters.search !== undefined) {
|
|
621
|
+
queryParameters['search'] = requestParameters.search;
|
|
622
|
+
}
|
|
623
|
+
|
|
624
|
+
if (requestParameters.userId !== undefined) {
|
|
625
|
+
queryParameters['user_id'] = requestParameters.userId;
|
|
626
|
+
}
|
|
627
|
+
|
|
628
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
629
|
+
|
|
630
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
631
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
632
|
+
}
|
|
633
|
+
|
|
634
|
+
const response = await this.request({
|
|
635
|
+
path: `/rbac/permissions/users/`,
|
|
636
|
+
method: 'GET',
|
|
637
|
+
headers: headerParameters,
|
|
638
|
+
query: queryParameters,
|
|
639
|
+
}, initOverrides);
|
|
640
|
+
|
|
641
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedExtraUserObjectPermissionListFromJSON(jsonValue));
|
|
642
|
+
}
|
|
643
|
+
|
|
644
|
+
/**
|
|
645
|
+
* Get a users\'s assigned object permissions
|
|
646
|
+
*/
|
|
647
|
+
async rbacPermissionsUsersList(requestParameters: RbacPermissionsUsersListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<PaginatedExtraUserObjectPermissionList> {
|
|
648
|
+
const response = await this.rbacPermissionsUsersListRaw(requestParameters, initOverrides);
|
|
649
|
+
return await response.value();
|
|
650
|
+
}
|
|
651
|
+
|
|
652
|
+
/**
|
|
653
|
+
* Role viewset
|
|
654
|
+
*/
|
|
655
|
+
async rbacRolesCreateRaw(requestParameters: RbacRolesCreateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Role>> {
|
|
656
|
+
if (requestParameters.roleRequest === null || requestParameters.roleRequest === undefined) {
|
|
657
|
+
throw new runtime.RequiredError('roleRequest','Required parameter requestParameters.roleRequest was null or undefined when calling rbacRolesCreate.');
|
|
658
|
+
}
|
|
659
|
+
|
|
660
|
+
const queryParameters: any = {};
|
|
661
|
+
|
|
662
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
663
|
+
|
|
664
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
665
|
+
|
|
666
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
667
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
668
|
+
}
|
|
669
|
+
|
|
670
|
+
const response = await this.request({
|
|
671
|
+
path: `/rbac/roles/`,
|
|
672
|
+
method: 'POST',
|
|
673
|
+
headers: headerParameters,
|
|
674
|
+
query: queryParameters,
|
|
675
|
+
body: RoleRequestToJSON(requestParameters.roleRequest),
|
|
676
|
+
}, initOverrides);
|
|
677
|
+
|
|
678
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => RoleFromJSON(jsonValue));
|
|
679
|
+
}
|
|
680
|
+
|
|
681
|
+
/**
|
|
682
|
+
* Role viewset
|
|
683
|
+
*/
|
|
684
|
+
async rbacRolesCreate(requestParameters: RbacRolesCreateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Role> {
|
|
685
|
+
const response = await this.rbacRolesCreateRaw(requestParameters, initOverrides);
|
|
686
|
+
return await response.value();
|
|
687
|
+
}
|
|
688
|
+
|
|
689
|
+
/**
|
|
690
|
+
* Role viewset
|
|
691
|
+
*/
|
|
692
|
+
async rbacRolesDestroyRaw(requestParameters: RbacRolesDestroyRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<void>> {
|
|
693
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
694
|
+
throw new runtime.RequiredError('uuid','Required parameter requestParameters.uuid was null or undefined when calling rbacRolesDestroy.');
|
|
695
|
+
}
|
|
696
|
+
|
|
697
|
+
const queryParameters: any = {};
|
|
698
|
+
|
|
699
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
700
|
+
|
|
701
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
702
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
703
|
+
}
|
|
704
|
+
|
|
705
|
+
const response = await this.request({
|
|
706
|
+
path: `/rbac/roles/{uuid}/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
707
|
+
method: 'DELETE',
|
|
708
|
+
headers: headerParameters,
|
|
709
|
+
query: queryParameters,
|
|
710
|
+
}, initOverrides);
|
|
711
|
+
|
|
712
|
+
return new runtime.VoidApiResponse(response);
|
|
713
|
+
}
|
|
714
|
+
|
|
715
|
+
/**
|
|
716
|
+
* Role viewset
|
|
717
|
+
*/
|
|
718
|
+
async rbacRolesDestroy(requestParameters: RbacRolesDestroyRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<void> {
|
|
719
|
+
await this.rbacRolesDestroyRaw(requestParameters, initOverrides);
|
|
720
|
+
}
|
|
721
|
+
|
|
722
|
+
/**
|
|
723
|
+
* Role viewset
|
|
724
|
+
*/
|
|
725
|
+
async rbacRolesListRaw(requestParameters: RbacRolesListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<PaginatedRoleList>> {
|
|
726
|
+
const queryParameters: any = {};
|
|
727
|
+
|
|
728
|
+
if (requestParameters.groupName !== undefined) {
|
|
729
|
+
queryParameters['group__name'] = requestParameters.groupName;
|
|
730
|
+
}
|
|
731
|
+
|
|
732
|
+
if (requestParameters.ordering !== undefined) {
|
|
733
|
+
queryParameters['ordering'] = requestParameters.ordering;
|
|
734
|
+
}
|
|
735
|
+
|
|
736
|
+
if (requestParameters.page !== undefined) {
|
|
737
|
+
queryParameters['page'] = requestParameters.page;
|
|
738
|
+
}
|
|
739
|
+
|
|
740
|
+
if (requestParameters.pageSize !== undefined) {
|
|
741
|
+
queryParameters['page_size'] = requestParameters.pageSize;
|
|
742
|
+
}
|
|
743
|
+
|
|
744
|
+
if (requestParameters.search !== undefined) {
|
|
745
|
+
queryParameters['search'] = requestParameters.search;
|
|
746
|
+
}
|
|
747
|
+
|
|
748
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
749
|
+
|
|
750
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
751
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
752
|
+
}
|
|
753
|
+
|
|
754
|
+
const response = await this.request({
|
|
755
|
+
path: `/rbac/roles/`,
|
|
756
|
+
method: 'GET',
|
|
757
|
+
headers: headerParameters,
|
|
758
|
+
query: queryParameters,
|
|
759
|
+
}, initOverrides);
|
|
760
|
+
|
|
761
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedRoleListFromJSON(jsonValue));
|
|
762
|
+
}
|
|
763
|
+
|
|
764
|
+
/**
|
|
765
|
+
* Role viewset
|
|
766
|
+
*/
|
|
767
|
+
async rbacRolesList(requestParameters: RbacRolesListRequest = {}, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<PaginatedRoleList> {
|
|
768
|
+
const response = await this.rbacRolesListRaw(requestParameters, initOverrides);
|
|
769
|
+
return await response.value();
|
|
770
|
+
}
|
|
771
|
+
|
|
772
|
+
/**
|
|
773
|
+
* Role viewset
|
|
774
|
+
*/
|
|
775
|
+
async rbacRolesPartialUpdateRaw(requestParameters: RbacRolesPartialUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Role>> {
|
|
776
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
777
|
+
throw new runtime.RequiredError('uuid','Required parameter requestParameters.uuid was null or undefined when calling rbacRolesPartialUpdate.');
|
|
778
|
+
}
|
|
779
|
+
|
|
780
|
+
const queryParameters: any = {};
|
|
781
|
+
|
|
782
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
783
|
+
|
|
784
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
785
|
+
|
|
786
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
787
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
788
|
+
}
|
|
789
|
+
|
|
790
|
+
const response = await this.request({
|
|
791
|
+
path: `/rbac/roles/{uuid}/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
792
|
+
method: 'PATCH',
|
|
793
|
+
headers: headerParameters,
|
|
794
|
+
query: queryParameters,
|
|
795
|
+
body: PatchedRoleRequestToJSON(requestParameters.patchedRoleRequest),
|
|
796
|
+
}, initOverrides);
|
|
797
|
+
|
|
798
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => RoleFromJSON(jsonValue));
|
|
799
|
+
}
|
|
800
|
+
|
|
801
|
+
/**
|
|
802
|
+
* Role viewset
|
|
803
|
+
*/
|
|
804
|
+
async rbacRolesPartialUpdate(requestParameters: RbacRolesPartialUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Role> {
|
|
805
|
+
const response = await this.rbacRolesPartialUpdateRaw(requestParameters, initOverrides);
|
|
806
|
+
return await response.value();
|
|
807
|
+
}
|
|
808
|
+
|
|
809
|
+
/**
|
|
810
|
+
* Role viewset
|
|
811
|
+
*/
|
|
812
|
+
async rbacRolesRetrieveRaw(requestParameters: RbacRolesRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Role>> {
|
|
813
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
814
|
+
throw new runtime.RequiredError('uuid','Required parameter requestParameters.uuid was null or undefined when calling rbacRolesRetrieve.');
|
|
815
|
+
}
|
|
816
|
+
|
|
817
|
+
const queryParameters: any = {};
|
|
818
|
+
|
|
819
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
820
|
+
|
|
821
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
822
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
823
|
+
}
|
|
824
|
+
|
|
825
|
+
const response = await this.request({
|
|
826
|
+
path: `/rbac/roles/{uuid}/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
827
|
+
method: 'GET',
|
|
828
|
+
headers: headerParameters,
|
|
829
|
+
query: queryParameters,
|
|
830
|
+
}, initOverrides);
|
|
831
|
+
|
|
832
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => RoleFromJSON(jsonValue));
|
|
833
|
+
}
|
|
834
|
+
|
|
835
|
+
/**
|
|
836
|
+
* Role viewset
|
|
837
|
+
*/
|
|
838
|
+
async rbacRolesRetrieve(requestParameters: RbacRolesRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Role> {
|
|
839
|
+
const response = await this.rbacRolesRetrieveRaw(requestParameters, initOverrides);
|
|
840
|
+
return await response.value();
|
|
841
|
+
}
|
|
842
|
+
|
|
843
|
+
/**
|
|
844
|
+
* Role viewset
|
|
845
|
+
*/
|
|
846
|
+
async rbacRolesUpdateRaw(requestParameters: RbacRolesUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Role>> {
|
|
847
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
848
|
+
throw new runtime.RequiredError('uuid','Required parameter requestParameters.uuid was null or undefined when calling rbacRolesUpdate.');
|
|
849
|
+
}
|
|
850
|
+
|
|
851
|
+
if (requestParameters.roleRequest === null || requestParameters.roleRequest === undefined) {
|
|
852
|
+
throw new runtime.RequiredError('roleRequest','Required parameter requestParameters.roleRequest was null or undefined when calling rbacRolesUpdate.');
|
|
853
|
+
}
|
|
854
|
+
|
|
855
|
+
const queryParameters: any = {};
|
|
856
|
+
|
|
857
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
858
|
+
|
|
859
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
860
|
+
|
|
861
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
862
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
863
|
+
}
|
|
864
|
+
|
|
865
|
+
const response = await this.request({
|
|
866
|
+
path: `/rbac/roles/{uuid}/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
867
|
+
method: 'PUT',
|
|
868
|
+
headers: headerParameters,
|
|
869
|
+
query: queryParameters,
|
|
870
|
+
body: RoleRequestToJSON(requestParameters.roleRequest),
|
|
871
|
+
}, initOverrides);
|
|
872
|
+
|
|
873
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => RoleFromJSON(jsonValue));
|
|
874
|
+
}
|
|
875
|
+
|
|
876
|
+
/**
|
|
877
|
+
* Role viewset
|
|
878
|
+
*/
|
|
879
|
+
async rbacRolesUpdate(requestParameters: RbacRolesUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Role> {
|
|
880
|
+
const response = await this.rbacRolesUpdateRaw(requestParameters, initOverrides);
|
|
881
|
+
return await response.value();
|
|
882
|
+
}
|
|
883
|
+
|
|
884
|
+
/**
|
|
885
|
+
* Get a list of all objects that use this object
|
|
886
|
+
*/
|
|
887
|
+
async rbacRolesUsedByListRaw(requestParameters: RbacRolesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<UsedBy>>> {
|
|
888
|
+
if (requestParameters.uuid === null || requestParameters.uuid === undefined) {
|
|
889
|
+
throw new runtime.RequiredError('uuid','Required parameter requestParameters.uuid was null or undefined when calling rbacRolesUsedByList.');
|
|
890
|
+
}
|
|
891
|
+
|
|
892
|
+
const queryParameters: any = {};
|
|
893
|
+
|
|
894
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
895
|
+
|
|
896
|
+
if (this.configuration && this.configuration.apiKey) {
|
|
897
|
+
headerParameters["Authorization"] = this.configuration.apiKey("Authorization"); // authentik authentication
|
|
898
|
+
}
|
|
899
|
+
|
|
900
|
+
const response = await this.request({
|
|
901
|
+
path: `/rbac/roles/{uuid}/used_by/`.replace(`{${"uuid"}}`, encodeURIComponent(String(requestParameters.uuid))),
|
|
902
|
+
method: 'GET',
|
|
903
|
+
headers: headerParameters,
|
|
904
|
+
query: queryParameters,
|
|
905
|
+
}, initOverrides);
|
|
906
|
+
|
|
907
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(UsedByFromJSON));
|
|
908
|
+
}
|
|
909
|
+
|
|
910
|
+
/**
|
|
911
|
+
* Get a list of all objects that use this object
|
|
912
|
+
*/
|
|
913
|
+
async rbacRolesUsedByList(requestParameters: RbacRolesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>> {
|
|
914
|
+
const response = await this.rbacRolesUsedByListRaw(requestParameters, initOverrides);
|
|
915
|
+
return await response.value();
|
|
916
|
+
}
|
|
917
|
+
|
|
918
|
+
}
|
|
919
|
+
|
|
920
|
+
/**
|
|
921
|
+
* @export
|
|
922
|
+
*/
|
|
923
|
+
export const RbacPermissionsAssignedByRolesListModelEnum = {
|
|
924
|
+
BlueprintsBlueprintinstance: 'authentik_blueprints.blueprintinstance',
|
|
925
|
+
CoreApplication: 'authentik_core.application',
|
|
926
|
+
CoreGroup: 'authentik_core.group',
|
|
927
|
+
CoreToken: 'authentik_core.token',
|
|
928
|
+
CoreUser: 'authentik_core.user',
|
|
929
|
+
CryptoCertificatekeypair: 'authentik_crypto.certificatekeypair',
|
|
930
|
+
EnterpriseLicense: 'authentik_enterprise.license',
|
|
931
|
+
EventsEvent: 'authentik_events.event',
|
|
932
|
+
EventsNotification: 'authentik_events.notification',
|
|
933
|
+
EventsNotificationrule: 'authentik_events.notificationrule',
|
|
934
|
+
EventsNotificationtransport: 'authentik_events.notificationtransport',
|
|
935
|
+
EventsNotificationwebhookmapping: 'authentik_events.notificationwebhookmapping',
|
|
936
|
+
FlowsFlow: 'authentik_flows.flow',
|
|
937
|
+
FlowsFlowstagebinding: 'authentik_flows.flowstagebinding',
|
|
938
|
+
OutpostsDockerserviceconnection: 'authentik_outposts.dockerserviceconnection',
|
|
939
|
+
OutpostsKubernetesserviceconnection: 'authentik_outposts.kubernetesserviceconnection',
|
|
940
|
+
OutpostsOutpost: 'authentik_outposts.outpost',
|
|
941
|
+
PoliciesPolicybinding: 'authentik_policies.policybinding',
|
|
942
|
+
PoliciesDummyDummypolicy: 'authentik_policies_dummy.dummypolicy',
|
|
943
|
+
PoliciesEventMatcherEventmatcherpolicy: 'authentik_policies_event_matcher.eventmatcherpolicy',
|
|
944
|
+
PoliciesExpiryPasswordexpirypolicy: 'authentik_policies_expiry.passwordexpirypolicy',
|
|
945
|
+
PoliciesExpressionExpressionpolicy: 'authentik_policies_expression.expressionpolicy',
|
|
946
|
+
PoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
947
|
+
PoliciesReputationReputation: 'authentik_policies_reputation.reputation',
|
|
948
|
+
PoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
949
|
+
ProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
|
950
|
+
ProvidersOauth2Accesstoken: 'authentik_providers_oauth2.accesstoken',
|
|
951
|
+
ProvidersOauth2Authorizationcode: 'authentik_providers_oauth2.authorizationcode',
|
|
952
|
+
ProvidersOauth2Oauth2provider: 'authentik_providers_oauth2.oauth2provider',
|
|
953
|
+
ProvidersOauth2Refreshtoken: 'authentik_providers_oauth2.refreshtoken',
|
|
954
|
+
ProvidersOauth2Scopemapping: 'authentik_providers_oauth2.scopemapping',
|
|
955
|
+
ProvidersProxyProxyprovider: 'authentik_providers_proxy.proxyprovider',
|
|
956
|
+
ProvidersRadiusRadiusprovider: 'authentik_providers_radius.radiusprovider',
|
|
957
|
+
ProvidersSamlSamlpropertymapping: 'authentik_providers_saml.samlpropertymapping',
|
|
958
|
+
ProvidersSamlSamlprovider: 'authentik_providers_saml.samlprovider',
|
|
959
|
+
ProvidersScimScimmapping: 'authentik_providers_scim.scimmapping',
|
|
960
|
+
ProvidersScimScimprovider: 'authentik_providers_scim.scimprovider',
|
|
961
|
+
RbacRole: 'authentik_rbac.role',
|
|
962
|
+
SourcesLdapLdappropertymapping: 'authentik_sources_ldap.ldappropertymapping',
|
|
963
|
+
SourcesLdapLdapsource: 'authentik_sources_ldap.ldapsource',
|
|
964
|
+
SourcesOauthOauthsource: 'authentik_sources_oauth.oauthsource',
|
|
965
|
+
SourcesOauthUseroauthsourceconnection: 'authentik_sources_oauth.useroauthsourceconnection',
|
|
966
|
+
SourcesPlexPlexsource: 'authentik_sources_plex.plexsource',
|
|
967
|
+
SourcesPlexPlexsourceconnection: 'authentik_sources_plex.plexsourceconnection',
|
|
968
|
+
SourcesSamlSamlsource: 'authentik_sources_saml.samlsource',
|
|
969
|
+
SourcesSamlUsersamlsourceconnection: 'authentik_sources_saml.usersamlsourceconnection',
|
|
970
|
+
StagesAuthenticatorDuoAuthenticatorduostage: 'authentik_stages_authenticator_duo.authenticatorduostage',
|
|
971
|
+
StagesAuthenticatorDuoDuodevice: 'authentik_stages_authenticator_duo.duodevice',
|
|
972
|
+
StagesAuthenticatorSmsAuthenticatorsmsstage: 'authentik_stages_authenticator_sms.authenticatorsmsstage',
|
|
973
|
+
StagesAuthenticatorSmsSmsdevice: 'authentik_stages_authenticator_sms.smsdevice',
|
|
974
|
+
StagesAuthenticatorStaticAuthenticatorstaticstage: 'authentik_stages_authenticator_static.authenticatorstaticstage',
|
|
975
|
+
StagesAuthenticatorStaticStaticdevice: 'authentik_stages_authenticator_static.staticdevice',
|
|
976
|
+
StagesAuthenticatorTotpAuthenticatortotpstage: 'authentik_stages_authenticator_totp.authenticatortotpstage',
|
|
977
|
+
StagesAuthenticatorTotpTotpdevice: 'authentik_stages_authenticator_totp.totpdevice',
|
|
978
|
+
StagesAuthenticatorValidateAuthenticatorvalidatestage: 'authentik_stages_authenticator_validate.authenticatorvalidatestage',
|
|
979
|
+
StagesAuthenticatorWebauthnAuthenticatewebauthnstage: 'authentik_stages_authenticator_webauthn.authenticatewebauthnstage',
|
|
980
|
+
StagesAuthenticatorWebauthnWebauthndevice: 'authentik_stages_authenticator_webauthn.webauthndevice',
|
|
981
|
+
StagesCaptchaCaptchastage: 'authentik_stages_captcha.captchastage',
|
|
982
|
+
StagesConsentConsentstage: 'authentik_stages_consent.consentstage',
|
|
983
|
+
StagesConsentUserconsent: 'authentik_stages_consent.userconsent',
|
|
984
|
+
StagesDenyDenystage: 'authentik_stages_deny.denystage',
|
|
985
|
+
StagesDummyDummystage: 'authentik_stages_dummy.dummystage',
|
|
986
|
+
StagesEmailEmailstage: 'authentik_stages_email.emailstage',
|
|
987
|
+
StagesIdentificationIdentificationstage: 'authentik_stages_identification.identificationstage',
|
|
988
|
+
StagesInvitationInvitation: 'authentik_stages_invitation.invitation',
|
|
989
|
+
StagesInvitationInvitationstage: 'authentik_stages_invitation.invitationstage',
|
|
990
|
+
StagesPasswordPasswordstage: 'authentik_stages_password.passwordstage',
|
|
991
|
+
StagesPromptPrompt: 'authentik_stages_prompt.prompt',
|
|
992
|
+
StagesPromptPromptstage: 'authentik_stages_prompt.promptstage',
|
|
993
|
+
StagesUserDeleteUserdeletestage: 'authentik_stages_user_delete.userdeletestage',
|
|
994
|
+
StagesUserLoginUserloginstage: 'authentik_stages_user_login.userloginstage',
|
|
995
|
+
StagesUserLogoutUserlogoutstage: 'authentik_stages_user_logout.userlogoutstage',
|
|
996
|
+
StagesUserWriteUserwritestage: 'authentik_stages_user_write.userwritestage',
|
|
997
|
+
TenantsTenant: 'authentik_tenants.tenant',
|
|
998
|
+
UnknownDefaultOpenApi: '11184809'
|
|
999
|
+
} as const;
|
|
1000
|
+
export type RbacPermissionsAssignedByRolesListModelEnum = typeof RbacPermissionsAssignedByRolesListModelEnum[keyof typeof RbacPermissionsAssignedByRolesListModelEnum];
|
|
1001
|
+
/**
|
|
1002
|
+
* @export
|
|
1003
|
+
*/
|
|
1004
|
+
export const RbacPermissionsAssignedByUsersListModelEnum = {
|
|
1005
|
+
BlueprintsBlueprintinstance: 'authentik_blueprints.blueprintinstance',
|
|
1006
|
+
CoreApplication: 'authentik_core.application',
|
|
1007
|
+
CoreGroup: 'authentik_core.group',
|
|
1008
|
+
CoreToken: 'authentik_core.token',
|
|
1009
|
+
CoreUser: 'authentik_core.user',
|
|
1010
|
+
CryptoCertificatekeypair: 'authentik_crypto.certificatekeypair',
|
|
1011
|
+
EnterpriseLicense: 'authentik_enterprise.license',
|
|
1012
|
+
EventsEvent: 'authentik_events.event',
|
|
1013
|
+
EventsNotification: 'authentik_events.notification',
|
|
1014
|
+
EventsNotificationrule: 'authentik_events.notificationrule',
|
|
1015
|
+
EventsNotificationtransport: 'authentik_events.notificationtransport',
|
|
1016
|
+
EventsNotificationwebhookmapping: 'authentik_events.notificationwebhookmapping',
|
|
1017
|
+
FlowsFlow: 'authentik_flows.flow',
|
|
1018
|
+
FlowsFlowstagebinding: 'authentik_flows.flowstagebinding',
|
|
1019
|
+
OutpostsDockerserviceconnection: 'authentik_outposts.dockerserviceconnection',
|
|
1020
|
+
OutpostsKubernetesserviceconnection: 'authentik_outposts.kubernetesserviceconnection',
|
|
1021
|
+
OutpostsOutpost: 'authentik_outposts.outpost',
|
|
1022
|
+
PoliciesPolicybinding: 'authentik_policies.policybinding',
|
|
1023
|
+
PoliciesDummyDummypolicy: 'authentik_policies_dummy.dummypolicy',
|
|
1024
|
+
PoliciesEventMatcherEventmatcherpolicy: 'authentik_policies_event_matcher.eventmatcherpolicy',
|
|
1025
|
+
PoliciesExpiryPasswordexpirypolicy: 'authentik_policies_expiry.passwordexpirypolicy',
|
|
1026
|
+
PoliciesExpressionExpressionpolicy: 'authentik_policies_expression.expressionpolicy',
|
|
1027
|
+
PoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
1028
|
+
PoliciesReputationReputation: 'authentik_policies_reputation.reputation',
|
|
1029
|
+
PoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
1030
|
+
ProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
|
1031
|
+
ProvidersOauth2Accesstoken: 'authentik_providers_oauth2.accesstoken',
|
|
1032
|
+
ProvidersOauth2Authorizationcode: 'authentik_providers_oauth2.authorizationcode',
|
|
1033
|
+
ProvidersOauth2Oauth2provider: 'authentik_providers_oauth2.oauth2provider',
|
|
1034
|
+
ProvidersOauth2Refreshtoken: 'authentik_providers_oauth2.refreshtoken',
|
|
1035
|
+
ProvidersOauth2Scopemapping: 'authentik_providers_oauth2.scopemapping',
|
|
1036
|
+
ProvidersProxyProxyprovider: 'authentik_providers_proxy.proxyprovider',
|
|
1037
|
+
ProvidersRadiusRadiusprovider: 'authentik_providers_radius.radiusprovider',
|
|
1038
|
+
ProvidersSamlSamlpropertymapping: 'authentik_providers_saml.samlpropertymapping',
|
|
1039
|
+
ProvidersSamlSamlprovider: 'authentik_providers_saml.samlprovider',
|
|
1040
|
+
ProvidersScimScimmapping: 'authentik_providers_scim.scimmapping',
|
|
1041
|
+
ProvidersScimScimprovider: 'authentik_providers_scim.scimprovider',
|
|
1042
|
+
RbacRole: 'authentik_rbac.role',
|
|
1043
|
+
SourcesLdapLdappropertymapping: 'authentik_sources_ldap.ldappropertymapping',
|
|
1044
|
+
SourcesLdapLdapsource: 'authentik_sources_ldap.ldapsource',
|
|
1045
|
+
SourcesOauthOauthsource: 'authentik_sources_oauth.oauthsource',
|
|
1046
|
+
SourcesOauthUseroauthsourceconnection: 'authentik_sources_oauth.useroauthsourceconnection',
|
|
1047
|
+
SourcesPlexPlexsource: 'authentik_sources_plex.plexsource',
|
|
1048
|
+
SourcesPlexPlexsourceconnection: 'authentik_sources_plex.plexsourceconnection',
|
|
1049
|
+
SourcesSamlSamlsource: 'authentik_sources_saml.samlsource',
|
|
1050
|
+
SourcesSamlUsersamlsourceconnection: 'authentik_sources_saml.usersamlsourceconnection',
|
|
1051
|
+
StagesAuthenticatorDuoAuthenticatorduostage: 'authentik_stages_authenticator_duo.authenticatorduostage',
|
|
1052
|
+
StagesAuthenticatorDuoDuodevice: 'authentik_stages_authenticator_duo.duodevice',
|
|
1053
|
+
StagesAuthenticatorSmsAuthenticatorsmsstage: 'authentik_stages_authenticator_sms.authenticatorsmsstage',
|
|
1054
|
+
StagesAuthenticatorSmsSmsdevice: 'authentik_stages_authenticator_sms.smsdevice',
|
|
1055
|
+
StagesAuthenticatorStaticAuthenticatorstaticstage: 'authentik_stages_authenticator_static.authenticatorstaticstage',
|
|
1056
|
+
StagesAuthenticatorStaticStaticdevice: 'authentik_stages_authenticator_static.staticdevice',
|
|
1057
|
+
StagesAuthenticatorTotpAuthenticatortotpstage: 'authentik_stages_authenticator_totp.authenticatortotpstage',
|
|
1058
|
+
StagesAuthenticatorTotpTotpdevice: 'authentik_stages_authenticator_totp.totpdevice',
|
|
1059
|
+
StagesAuthenticatorValidateAuthenticatorvalidatestage: 'authentik_stages_authenticator_validate.authenticatorvalidatestage',
|
|
1060
|
+
StagesAuthenticatorWebauthnAuthenticatewebauthnstage: 'authentik_stages_authenticator_webauthn.authenticatewebauthnstage',
|
|
1061
|
+
StagesAuthenticatorWebauthnWebauthndevice: 'authentik_stages_authenticator_webauthn.webauthndevice',
|
|
1062
|
+
StagesCaptchaCaptchastage: 'authentik_stages_captcha.captchastage',
|
|
1063
|
+
StagesConsentConsentstage: 'authentik_stages_consent.consentstage',
|
|
1064
|
+
StagesConsentUserconsent: 'authentik_stages_consent.userconsent',
|
|
1065
|
+
StagesDenyDenystage: 'authentik_stages_deny.denystage',
|
|
1066
|
+
StagesDummyDummystage: 'authentik_stages_dummy.dummystage',
|
|
1067
|
+
StagesEmailEmailstage: 'authentik_stages_email.emailstage',
|
|
1068
|
+
StagesIdentificationIdentificationstage: 'authentik_stages_identification.identificationstage',
|
|
1069
|
+
StagesInvitationInvitation: 'authentik_stages_invitation.invitation',
|
|
1070
|
+
StagesInvitationInvitationstage: 'authentik_stages_invitation.invitationstage',
|
|
1071
|
+
StagesPasswordPasswordstage: 'authentik_stages_password.passwordstage',
|
|
1072
|
+
StagesPromptPrompt: 'authentik_stages_prompt.prompt',
|
|
1073
|
+
StagesPromptPromptstage: 'authentik_stages_prompt.promptstage',
|
|
1074
|
+
StagesUserDeleteUserdeletestage: 'authentik_stages_user_delete.userdeletestage',
|
|
1075
|
+
StagesUserLoginUserloginstage: 'authentik_stages_user_login.userloginstage',
|
|
1076
|
+
StagesUserLogoutUserlogoutstage: 'authentik_stages_user_logout.userlogoutstage',
|
|
1077
|
+
StagesUserWriteUserwritestage: 'authentik_stages_user_write.userwritestage',
|
|
1078
|
+
TenantsTenant: 'authentik_tenants.tenant',
|
|
1079
|
+
UnknownDefaultOpenApi: '11184809'
|
|
1080
|
+
} as const;
|
|
1081
|
+
export type RbacPermissionsAssignedByUsersListModelEnum = typeof RbacPermissionsAssignedByUsersListModelEnum[keyof typeof RbacPermissionsAssignedByUsersListModelEnum];
|