@goauthentik/api 2023.8.3-1697470337 → 2023.8.3-1697651039
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/apis/StagesApi.d.ts +1 -0
- package/dist/apis/StagesApi.js +3 -0
- package/dist/esm/apis/StagesApi.d.ts +1 -0
- package/dist/esm/apis/StagesApi.js +3 -0
- package/dist/esm/models/DenyStage.d.ts +6 -0
- package/dist/esm/models/DenyStage.js +2 -0
- package/dist/esm/models/DenyStageRequest.d.ts +6 -0
- package/dist/esm/models/DenyStageRequest.js +2 -0
- package/dist/esm/models/PatchedDenyStageRequest.d.ts +6 -0
- package/dist/esm/models/PatchedDenyStageRequest.js +2 -0
- package/dist/esm/models/PatchedRadiusProviderRequest.d.ts +6 -0
- package/dist/esm/models/PatchedRadiusProviderRequest.js +2 -0
- package/dist/esm/models/RadiusOutpostConfig.d.ts +6 -0
- package/dist/esm/models/RadiusOutpostConfig.js +2 -0
- package/dist/esm/models/RadiusProvider.d.ts +6 -0
- package/dist/esm/models/RadiusProvider.js +2 -0
- package/dist/esm/models/RadiusProviderRequest.d.ts +6 -0
- package/dist/esm/models/RadiusProviderRequest.js +2 -0
- package/dist/models/DenyStage.d.ts +6 -0
- package/dist/models/DenyStage.js +2 -0
- package/dist/models/DenyStageRequest.d.ts +6 -0
- package/dist/models/DenyStageRequest.js +2 -0
- package/dist/models/PatchedDenyStageRequest.d.ts +6 -0
- package/dist/models/PatchedDenyStageRequest.js +2 -0
- package/dist/models/PatchedRadiusProviderRequest.d.ts +6 -0
- package/dist/models/PatchedRadiusProviderRequest.js +2 -0
- package/dist/models/RadiusOutpostConfig.d.ts +6 -0
- package/dist/models/RadiusOutpostConfig.js +2 -0
- package/dist/models/RadiusProvider.d.ts +6 -0
- package/dist/models/RadiusProvider.js +2 -0
- package/dist/models/RadiusProviderRequest.d.ts +6 -0
- package/dist/models/RadiusProviderRequest.js +2 -0
- package/package.json +1 -1
- package/src/apis/StagesApi.ts +5 -0
- package/src/models/DenyStage.ts +8 -0
- package/src/models/DenyStageRequest.ts +8 -0
- package/src/models/PatchedDenyStageRequest.ts +8 -0
- package/src/models/PatchedRadiusProviderRequest.ts +8 -0
- package/src/models/RadiusOutpostConfig.ts +8 -0
- package/src/models/RadiusProvider.ts +8 -0
- package/src/models/RadiusProviderRequest.ts +8 -0
package/dist/apis/StagesApi.d.ts
CHANGED
package/dist/apis/StagesApi.js
CHANGED
|
@@ -2387,6 +2387,9 @@ class StagesApi extends runtime.BaseAPI {
|
|
|
2387
2387
|
stagesDenyListRaw(requestParameters, initOverrides) {
|
|
2388
2388
|
return __awaiter(this, void 0, void 0, function* () {
|
|
2389
2389
|
const queryParameters = {};
|
|
2390
|
+
if (requestParameters.denyMessage !== undefined) {
|
|
2391
|
+
queryParameters['deny_message'] = requestParameters.denyMessage;
|
|
2392
|
+
}
|
|
2390
2393
|
if (requestParameters.name !== undefined) {
|
|
2391
2394
|
queryParameters['name'] = requestParameters.name;
|
|
2392
2395
|
}
|
|
@@ -2384,6 +2384,9 @@ export class StagesApi extends runtime.BaseAPI {
|
|
|
2384
2384
|
stagesDenyListRaw(requestParameters, initOverrides) {
|
|
2385
2385
|
return __awaiter(this, void 0, void 0, function* () {
|
|
2386
2386
|
const queryParameters = {};
|
|
2387
|
+
if (requestParameters.denyMessage !== undefined) {
|
|
2388
|
+
queryParameters['deny_message'] = requestParameters.denyMessage;
|
|
2389
|
+
}
|
|
2387
2390
|
if (requestParameters.name !== undefined) {
|
|
2388
2391
|
queryParameters['name'] = requestParameters.name;
|
|
2389
2392
|
}
|
|
@@ -58,6 +58,12 @@ export interface DenyStage {
|
|
|
58
58
|
* @memberof DenyStage
|
|
59
59
|
*/
|
|
60
60
|
flowSet?: Array<FlowSet>;
|
|
61
|
+
/**
|
|
62
|
+
*
|
|
63
|
+
* @type {string}
|
|
64
|
+
* @memberof DenyStage
|
|
65
|
+
*/
|
|
66
|
+
denyMessage?: string;
|
|
61
67
|
}
|
|
62
68
|
/**
|
|
63
69
|
* Check if a given object implements the DenyStage interface.
|
|
@@ -41,6 +41,7 @@ export function DenyStageFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
41
41
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
42
42
|
'metaModelName': json['meta_model_name'],
|
|
43
43
|
'flowSet': !exists(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSetFromJSON)),
|
|
44
|
+
'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
|
|
44
45
|
};
|
|
45
46
|
}
|
|
46
47
|
export function DenyStageToJSON(value) {
|
|
@@ -53,5 +54,6 @@ export function DenyStageToJSON(value) {
|
|
|
53
54
|
return {
|
|
54
55
|
'name': value.name,
|
|
55
56
|
'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSetToJSON)),
|
|
57
|
+
'deny_message': value.denyMessage,
|
|
56
58
|
};
|
|
57
59
|
}
|
|
@@ -28,6 +28,12 @@ export interface DenyStageRequest {
|
|
|
28
28
|
* @memberof DenyStageRequest
|
|
29
29
|
*/
|
|
30
30
|
flowSet?: Array<FlowSetRequest>;
|
|
31
|
+
/**
|
|
32
|
+
*
|
|
33
|
+
* @type {string}
|
|
34
|
+
* @memberof DenyStageRequest
|
|
35
|
+
*/
|
|
36
|
+
denyMessage?: string;
|
|
31
37
|
}
|
|
32
38
|
/**
|
|
33
39
|
* Check if a given object implements the DenyStageRequest interface.
|
|
@@ -31,6 +31,7 @@ export function DenyStageRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
31
31
|
return {
|
|
32
32
|
'name': json['name'],
|
|
33
33
|
'flowSet': !exists(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSetRequestFromJSON)),
|
|
34
|
+
'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
|
|
34
35
|
};
|
|
35
36
|
}
|
|
36
37
|
export function DenyStageRequestToJSON(value) {
|
|
@@ -43,5 +44,6 @@ export function DenyStageRequestToJSON(value) {
|
|
|
43
44
|
return {
|
|
44
45
|
'name': value.name,
|
|
45
46
|
'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSetRequestToJSON)),
|
|
47
|
+
'deny_message': value.denyMessage,
|
|
46
48
|
};
|
|
47
49
|
}
|
|
@@ -28,6 +28,12 @@ export interface PatchedDenyStageRequest {
|
|
|
28
28
|
* @memberof PatchedDenyStageRequest
|
|
29
29
|
*/
|
|
30
30
|
flowSet?: Array<FlowSetRequest>;
|
|
31
|
+
/**
|
|
32
|
+
*
|
|
33
|
+
* @type {string}
|
|
34
|
+
* @memberof PatchedDenyStageRequest
|
|
35
|
+
*/
|
|
36
|
+
denyMessage?: string;
|
|
31
37
|
}
|
|
32
38
|
/**
|
|
33
39
|
* Check if a given object implements the PatchedDenyStageRequest interface.
|
|
@@ -30,6 +30,7 @@ export function PatchedDenyStageRequestFromJSONTyped(json, ignoreDiscriminator)
|
|
|
30
30
|
return {
|
|
31
31
|
'name': !exists(json, 'name') ? undefined : json['name'],
|
|
32
32
|
'flowSet': !exists(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSetRequestFromJSON)),
|
|
33
|
+
'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
|
|
33
34
|
};
|
|
34
35
|
}
|
|
35
36
|
export function PatchedDenyStageRequestToJSON(value) {
|
|
@@ -42,5 +43,6 @@ export function PatchedDenyStageRequestToJSON(value) {
|
|
|
42
43
|
return {
|
|
43
44
|
'name': value.name,
|
|
44
45
|
'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSetRequestToJSON)),
|
|
46
|
+
'deny_message': value.denyMessage,
|
|
45
47
|
};
|
|
46
48
|
}
|
|
@@ -51,6 +51,12 @@ export interface PatchedRadiusProviderRequest {
|
|
|
51
51
|
* @memberof PatchedRadiusProviderRequest
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof PatchedRadiusProviderRequest
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the PatchedRadiusProviderRequest interface.
|
|
@@ -33,6 +33,7 @@ export function PatchedRadiusProviderRequestFromJSONTyped(json, ignoreDiscrimina
|
|
|
33
33
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
34
34
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
35
35
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
36
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
36
37
|
};
|
|
37
38
|
}
|
|
38
39
|
export function PatchedRadiusProviderRequestToJSON(value) {
|
|
@@ -49,5 +50,6 @@ export function PatchedRadiusProviderRequestToJSON(value) {
|
|
|
49
50
|
'property_mappings': value.propertyMappings,
|
|
50
51
|
'client_networks': value.clientNetworks,
|
|
51
52
|
'shared_secret': value.sharedSecret,
|
|
53
|
+
'mfa_support': value.mfaSupport,
|
|
52
54
|
};
|
|
53
55
|
}
|
|
@@ -51,6 +51,12 @@ export interface RadiusOutpostConfig {
|
|
|
51
51
|
* @memberof RadiusOutpostConfig
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof RadiusOutpostConfig
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the RadiusOutpostConfig interface.
|
|
@@ -37,6 +37,7 @@ export function RadiusOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
37
37
|
'authFlowSlug': json['auth_flow_slug'],
|
|
38
38
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
39
39
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
40
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
40
41
|
};
|
|
41
42
|
}
|
|
42
43
|
export function RadiusOutpostConfigToJSON(value) {
|
|
@@ -52,5 +53,6 @@ export function RadiusOutpostConfigToJSON(value) {
|
|
|
52
53
|
'auth_flow_slug': value.authFlowSlug,
|
|
53
54
|
'client_networks': value.clientNetworks,
|
|
54
55
|
'shared_secret': value.sharedSecret,
|
|
56
|
+
'mfa_support': value.mfaSupport,
|
|
55
57
|
};
|
|
56
58
|
}
|
|
@@ -111,6 +111,12 @@ export interface RadiusProvider {
|
|
|
111
111
|
* @memberof RadiusProvider
|
|
112
112
|
*/
|
|
113
113
|
readonly outpostSet: Array<string>;
|
|
114
|
+
/**
|
|
115
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
116
|
+
* @type {boolean}
|
|
117
|
+
* @memberof RadiusProvider
|
|
118
|
+
*/
|
|
119
|
+
mfaSupport?: boolean;
|
|
114
120
|
}
|
|
115
121
|
/**
|
|
116
122
|
* Check if a given object implements the RadiusProvider interface.
|
|
@@ -55,6 +55,7 @@ export function RadiusProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
55
55
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
56
56
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
57
57
|
'outpostSet': json['outpost_set'],
|
|
58
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
58
59
|
};
|
|
59
60
|
}
|
|
60
61
|
export function RadiusProviderToJSON(value) {
|
|
@@ -71,5 +72,6 @@ export function RadiusProviderToJSON(value) {
|
|
|
71
72
|
'property_mappings': value.propertyMappings,
|
|
72
73
|
'client_networks': value.clientNetworks,
|
|
73
74
|
'shared_secret': value.sharedSecret,
|
|
75
|
+
'mfa_support': value.mfaSupport,
|
|
74
76
|
};
|
|
75
77
|
}
|
|
@@ -51,6 +51,12 @@ export interface RadiusProviderRequest {
|
|
|
51
51
|
* @memberof RadiusProviderRequest
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof RadiusProviderRequest
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the RadiusProviderRequest interface.
|
|
@@ -35,6 +35,7 @@ export function RadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
35
35
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
36
36
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
37
37
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
38
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
38
39
|
};
|
|
39
40
|
}
|
|
40
41
|
export function RadiusProviderRequestToJSON(value) {
|
|
@@ -51,5 +52,6 @@ export function RadiusProviderRequestToJSON(value) {
|
|
|
51
52
|
'property_mappings': value.propertyMappings,
|
|
52
53
|
'client_networks': value.clientNetworks,
|
|
53
54
|
'shared_secret': value.sharedSecret,
|
|
55
|
+
'mfa_support': value.mfaSupport,
|
|
54
56
|
};
|
|
55
57
|
}
|
|
@@ -58,6 +58,12 @@ export interface DenyStage {
|
|
|
58
58
|
* @memberof DenyStage
|
|
59
59
|
*/
|
|
60
60
|
flowSet?: Array<FlowSet>;
|
|
61
|
+
/**
|
|
62
|
+
*
|
|
63
|
+
* @type {string}
|
|
64
|
+
* @memberof DenyStage
|
|
65
|
+
*/
|
|
66
|
+
denyMessage?: string;
|
|
61
67
|
}
|
|
62
68
|
/**
|
|
63
69
|
* Check if a given object implements the DenyStage interface.
|
package/dist/models/DenyStage.js
CHANGED
|
@@ -46,6 +46,7 @@ function DenyStageFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
46
46
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
47
47
|
'metaModelName': json['meta_model_name'],
|
|
48
48
|
'flowSet': !(0, runtime_1.exists)(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSet_1.FlowSetFromJSON)),
|
|
49
|
+
'denyMessage': !(0, runtime_1.exists)(json, 'deny_message') ? undefined : json['deny_message'],
|
|
49
50
|
};
|
|
50
51
|
}
|
|
51
52
|
exports.DenyStageFromJSONTyped = DenyStageFromJSONTyped;
|
|
@@ -59,6 +60,7 @@ function DenyStageToJSON(value) {
|
|
|
59
60
|
return {
|
|
60
61
|
'name': value.name,
|
|
61
62
|
'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSet_1.FlowSetToJSON)),
|
|
63
|
+
'deny_message': value.denyMessage,
|
|
62
64
|
};
|
|
63
65
|
}
|
|
64
66
|
exports.DenyStageToJSON = DenyStageToJSON;
|
|
@@ -28,6 +28,12 @@ export interface DenyStageRequest {
|
|
|
28
28
|
* @memberof DenyStageRequest
|
|
29
29
|
*/
|
|
30
30
|
flowSet?: Array<FlowSetRequest>;
|
|
31
|
+
/**
|
|
32
|
+
*
|
|
33
|
+
* @type {string}
|
|
34
|
+
* @memberof DenyStageRequest
|
|
35
|
+
*/
|
|
36
|
+
denyMessage?: string;
|
|
31
37
|
}
|
|
32
38
|
/**
|
|
33
39
|
* Check if a given object implements the DenyStageRequest interface.
|
|
@@ -36,6 +36,7 @@ function DenyStageRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
36
36
|
return {
|
|
37
37
|
'name': json['name'],
|
|
38
38
|
'flowSet': !(0, runtime_1.exists)(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSetRequest_1.FlowSetRequestFromJSON)),
|
|
39
|
+
'denyMessage': !(0, runtime_1.exists)(json, 'deny_message') ? undefined : json['deny_message'],
|
|
39
40
|
};
|
|
40
41
|
}
|
|
41
42
|
exports.DenyStageRequestFromJSONTyped = DenyStageRequestFromJSONTyped;
|
|
@@ -49,6 +50,7 @@ function DenyStageRequestToJSON(value) {
|
|
|
49
50
|
return {
|
|
50
51
|
'name': value.name,
|
|
51
52
|
'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSetRequest_1.FlowSetRequestToJSON)),
|
|
53
|
+
'deny_message': value.denyMessage,
|
|
52
54
|
};
|
|
53
55
|
}
|
|
54
56
|
exports.DenyStageRequestToJSON = DenyStageRequestToJSON;
|
|
@@ -28,6 +28,12 @@ export interface PatchedDenyStageRequest {
|
|
|
28
28
|
* @memberof PatchedDenyStageRequest
|
|
29
29
|
*/
|
|
30
30
|
flowSet?: Array<FlowSetRequest>;
|
|
31
|
+
/**
|
|
32
|
+
*
|
|
33
|
+
* @type {string}
|
|
34
|
+
* @memberof PatchedDenyStageRequest
|
|
35
|
+
*/
|
|
36
|
+
denyMessage?: string;
|
|
31
37
|
}
|
|
32
38
|
/**
|
|
33
39
|
* Check if a given object implements the PatchedDenyStageRequest interface.
|
|
@@ -35,6 +35,7 @@ function PatchedDenyStageRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
35
35
|
return {
|
|
36
36
|
'name': !(0, runtime_1.exists)(json, 'name') ? undefined : json['name'],
|
|
37
37
|
'flowSet': !(0, runtime_1.exists)(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSetRequest_1.FlowSetRequestFromJSON)),
|
|
38
|
+
'denyMessage': !(0, runtime_1.exists)(json, 'deny_message') ? undefined : json['deny_message'],
|
|
38
39
|
};
|
|
39
40
|
}
|
|
40
41
|
exports.PatchedDenyStageRequestFromJSONTyped = PatchedDenyStageRequestFromJSONTyped;
|
|
@@ -48,6 +49,7 @@ function PatchedDenyStageRequestToJSON(value) {
|
|
|
48
49
|
return {
|
|
49
50
|
'name': value.name,
|
|
50
51
|
'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSetRequest_1.FlowSetRequestToJSON)),
|
|
52
|
+
'deny_message': value.denyMessage,
|
|
51
53
|
};
|
|
52
54
|
}
|
|
53
55
|
exports.PatchedDenyStageRequestToJSON = PatchedDenyStageRequestToJSON;
|
|
@@ -51,6 +51,12 @@ export interface PatchedRadiusProviderRequest {
|
|
|
51
51
|
* @memberof PatchedRadiusProviderRequest
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof PatchedRadiusProviderRequest
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the PatchedRadiusProviderRequest interface.
|
|
@@ -38,6 +38,7 @@ function PatchedRadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
38
38
|
'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
39
39
|
'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
|
|
40
40
|
'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
41
|
+
'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
41
42
|
};
|
|
42
43
|
}
|
|
43
44
|
exports.PatchedRadiusProviderRequestFromJSONTyped = PatchedRadiusProviderRequestFromJSONTyped;
|
|
@@ -55,6 +56,7 @@ function PatchedRadiusProviderRequestToJSON(value) {
|
|
|
55
56
|
'property_mappings': value.propertyMappings,
|
|
56
57
|
'client_networks': value.clientNetworks,
|
|
57
58
|
'shared_secret': value.sharedSecret,
|
|
59
|
+
'mfa_support': value.mfaSupport,
|
|
58
60
|
};
|
|
59
61
|
}
|
|
60
62
|
exports.PatchedRadiusProviderRequestToJSON = PatchedRadiusProviderRequestToJSON;
|
|
@@ -51,6 +51,12 @@ export interface RadiusOutpostConfig {
|
|
|
51
51
|
* @memberof RadiusOutpostConfig
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof RadiusOutpostConfig
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the RadiusOutpostConfig interface.
|
|
@@ -42,6 +42,7 @@ function RadiusOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
42
42
|
'authFlowSlug': json['auth_flow_slug'],
|
|
43
43
|
'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
|
|
44
44
|
'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
45
|
+
'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
45
46
|
};
|
|
46
47
|
}
|
|
47
48
|
exports.RadiusOutpostConfigFromJSONTyped = RadiusOutpostConfigFromJSONTyped;
|
|
@@ -58,6 +59,7 @@ function RadiusOutpostConfigToJSON(value) {
|
|
|
58
59
|
'auth_flow_slug': value.authFlowSlug,
|
|
59
60
|
'client_networks': value.clientNetworks,
|
|
60
61
|
'shared_secret': value.sharedSecret,
|
|
62
|
+
'mfa_support': value.mfaSupport,
|
|
61
63
|
};
|
|
62
64
|
}
|
|
63
65
|
exports.RadiusOutpostConfigToJSON = RadiusOutpostConfigToJSON;
|
|
@@ -111,6 +111,12 @@ export interface RadiusProvider {
|
|
|
111
111
|
* @memberof RadiusProvider
|
|
112
112
|
*/
|
|
113
113
|
readonly outpostSet: Array<string>;
|
|
114
|
+
/**
|
|
115
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
116
|
+
* @type {boolean}
|
|
117
|
+
* @memberof RadiusProvider
|
|
118
|
+
*/
|
|
119
|
+
mfaSupport?: boolean;
|
|
114
120
|
}
|
|
115
121
|
/**
|
|
116
122
|
* Check if a given object implements the RadiusProvider interface.
|
|
@@ -60,6 +60,7 @@ function RadiusProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
60
60
|
'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
|
|
61
61
|
'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
62
62
|
'outpostSet': json['outpost_set'],
|
|
63
|
+
'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
63
64
|
};
|
|
64
65
|
}
|
|
65
66
|
exports.RadiusProviderFromJSONTyped = RadiusProviderFromJSONTyped;
|
|
@@ -77,6 +78,7 @@ function RadiusProviderToJSON(value) {
|
|
|
77
78
|
'property_mappings': value.propertyMappings,
|
|
78
79
|
'client_networks': value.clientNetworks,
|
|
79
80
|
'shared_secret': value.sharedSecret,
|
|
81
|
+
'mfa_support': value.mfaSupport,
|
|
80
82
|
};
|
|
81
83
|
}
|
|
82
84
|
exports.RadiusProviderToJSON = RadiusProviderToJSON;
|
|
@@ -51,6 +51,12 @@ export interface RadiusProviderRequest {
|
|
|
51
51
|
* @memberof RadiusProviderRequest
|
|
52
52
|
*/
|
|
53
53
|
sharedSecret?: string;
|
|
54
|
+
/**
|
|
55
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
56
|
+
* @type {boolean}
|
|
57
|
+
* @memberof RadiusProviderRequest
|
|
58
|
+
*/
|
|
59
|
+
mfaSupport?: boolean;
|
|
54
60
|
}
|
|
55
61
|
/**
|
|
56
62
|
* Check if a given object implements the RadiusProviderRequest interface.
|
|
@@ -40,6 +40,7 @@ function RadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
40
40
|
'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
41
41
|
'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
|
|
42
42
|
'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
43
|
+
'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
43
44
|
};
|
|
44
45
|
}
|
|
45
46
|
exports.RadiusProviderRequestFromJSONTyped = RadiusProviderRequestFromJSONTyped;
|
|
@@ -57,6 +58,7 @@ function RadiusProviderRequestToJSON(value) {
|
|
|
57
58
|
'property_mappings': value.propertyMappings,
|
|
58
59
|
'client_networks': value.clientNetworks,
|
|
59
60
|
'shared_secret': value.sharedSecret,
|
|
61
|
+
'mfa_support': value.mfaSupport,
|
|
60
62
|
};
|
|
61
63
|
}
|
|
62
64
|
exports.RadiusProviderRequestToJSON = RadiusProviderRequestToJSON;
|
package/package.json
CHANGED
package/src/apis/StagesApi.ts
CHANGED
|
@@ -653,6 +653,7 @@ export interface StagesDenyDestroyRequest {
|
|
|
653
653
|
}
|
|
654
654
|
|
|
655
655
|
export interface StagesDenyListRequest {
|
|
656
|
+
denyMessage?: string;
|
|
656
657
|
name?: string;
|
|
657
658
|
ordering?: string;
|
|
658
659
|
page?: number;
|
|
@@ -3806,6 +3807,10 @@ export class StagesApi extends runtime.BaseAPI {
|
|
|
3806
3807
|
async stagesDenyListRaw(requestParameters: StagesDenyListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<PaginatedDenyStageList>> {
|
|
3807
3808
|
const queryParameters: any = {};
|
|
3808
3809
|
|
|
3810
|
+
if (requestParameters.denyMessage !== undefined) {
|
|
3811
|
+
queryParameters['deny_message'] = requestParameters.denyMessage;
|
|
3812
|
+
}
|
|
3813
|
+
|
|
3809
3814
|
if (requestParameters.name !== undefined) {
|
|
3810
3815
|
queryParameters['name'] = requestParameters.name;
|
|
3811
3816
|
}
|
package/src/models/DenyStage.ts
CHANGED
|
@@ -68,6 +68,12 @@ export interface DenyStage {
|
|
|
68
68
|
* @memberof DenyStage
|
|
69
69
|
*/
|
|
70
70
|
flowSet?: Array<FlowSet>;
|
|
71
|
+
/**
|
|
72
|
+
*
|
|
73
|
+
* @type {string}
|
|
74
|
+
* @memberof DenyStage
|
|
75
|
+
*/
|
|
76
|
+
denyMessage?: string;
|
|
71
77
|
}
|
|
72
78
|
|
|
73
79
|
/**
|
|
@@ -102,6 +108,7 @@ export function DenyStageFromJSONTyped(json: any, ignoreDiscriminator: boolean):
|
|
|
102
108
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
103
109
|
'metaModelName': json['meta_model_name'],
|
|
104
110
|
'flowSet': !exists(json, 'flow_set') ? undefined : ((json['flow_set'] as Array<any>).map(FlowSetFromJSON)),
|
|
111
|
+
'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
|
|
105
112
|
};
|
|
106
113
|
}
|
|
107
114
|
|
|
@@ -116,6 +123,7 @@ export function DenyStageToJSON(value?: DenyStage | null): any {
|
|
|
116
123
|
|
|
117
124
|
'name': value.name,
|
|
118
125
|
'flow_set': value.flowSet === undefined ? undefined : ((value.flowSet as Array<any>).map(FlowSetToJSON)),
|
|
126
|
+
'deny_message': value.denyMessage,
|
|
119
127
|
};
|
|
120
128
|
}
|
|
121
129
|
|
|
@@ -38,6 +38,12 @@ export interface DenyStageRequest {
|
|
|
38
38
|
* @memberof DenyStageRequest
|
|
39
39
|
*/
|
|
40
40
|
flowSet?: Array<FlowSetRequest>;
|
|
41
|
+
/**
|
|
42
|
+
*
|
|
43
|
+
* @type {string}
|
|
44
|
+
* @memberof DenyStageRequest
|
|
45
|
+
*/
|
|
46
|
+
denyMessage?: string;
|
|
41
47
|
}
|
|
42
48
|
|
|
43
49
|
/**
|
|
@@ -62,6 +68,7 @@ export function DenyStageRequestFromJSONTyped(json: any, ignoreDiscriminator: bo
|
|
|
62
68
|
|
|
63
69
|
'name': json['name'],
|
|
64
70
|
'flowSet': !exists(json, 'flow_set') ? undefined : ((json['flow_set'] as Array<any>).map(FlowSetRequestFromJSON)),
|
|
71
|
+
'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
|
|
65
72
|
};
|
|
66
73
|
}
|
|
67
74
|
|
|
@@ -76,6 +83,7 @@ export function DenyStageRequestToJSON(value?: DenyStageRequest | null): any {
|
|
|
76
83
|
|
|
77
84
|
'name': value.name,
|
|
78
85
|
'flow_set': value.flowSet === undefined ? undefined : ((value.flowSet as Array<any>).map(FlowSetRequestToJSON)),
|
|
86
|
+
'deny_message': value.denyMessage,
|
|
79
87
|
};
|
|
80
88
|
}
|
|
81
89
|
|
|
@@ -38,6 +38,12 @@ export interface PatchedDenyStageRequest {
|
|
|
38
38
|
* @memberof PatchedDenyStageRequest
|
|
39
39
|
*/
|
|
40
40
|
flowSet?: Array<FlowSetRequest>;
|
|
41
|
+
/**
|
|
42
|
+
*
|
|
43
|
+
* @type {string}
|
|
44
|
+
* @memberof PatchedDenyStageRequest
|
|
45
|
+
*/
|
|
46
|
+
denyMessage?: string;
|
|
41
47
|
}
|
|
42
48
|
|
|
43
49
|
/**
|
|
@@ -61,6 +67,7 @@ export function PatchedDenyStageRequestFromJSONTyped(json: any, ignoreDiscrimina
|
|
|
61
67
|
|
|
62
68
|
'name': !exists(json, 'name') ? undefined : json['name'],
|
|
63
69
|
'flowSet': !exists(json, 'flow_set') ? undefined : ((json['flow_set'] as Array<any>).map(FlowSetRequestFromJSON)),
|
|
70
|
+
'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
|
|
64
71
|
};
|
|
65
72
|
}
|
|
66
73
|
|
|
@@ -75,6 +82,7 @@ export function PatchedDenyStageRequestToJSON(value?: PatchedDenyStageRequest |
|
|
|
75
82
|
|
|
76
83
|
'name': value.name,
|
|
77
84
|
'flow_set': value.flowSet === undefined ? undefined : ((value.flowSet as Array<any>).map(FlowSetRequestToJSON)),
|
|
85
|
+
'deny_message': value.denyMessage,
|
|
78
86
|
};
|
|
79
87
|
}
|
|
80
88
|
|
|
@@ -55,6 +55,12 @@ export interface PatchedRadiusProviderRequest {
|
|
|
55
55
|
* @memberof PatchedRadiusProviderRequest
|
|
56
56
|
*/
|
|
57
57
|
sharedSecret?: string;
|
|
58
|
+
/**
|
|
59
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
60
|
+
* @type {boolean}
|
|
61
|
+
* @memberof PatchedRadiusProviderRequest
|
|
62
|
+
*/
|
|
63
|
+
mfaSupport?: boolean;
|
|
58
64
|
}
|
|
59
65
|
|
|
60
66
|
/**
|
|
@@ -82,6 +88,7 @@ export function PatchedRadiusProviderRequestFromJSONTyped(json: any, ignoreDiscr
|
|
|
82
88
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
83
89
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
84
90
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
91
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
85
92
|
};
|
|
86
93
|
}
|
|
87
94
|
|
|
@@ -100,6 +107,7 @@ export function PatchedRadiusProviderRequestToJSON(value?: PatchedRadiusProvider
|
|
|
100
107
|
'property_mappings': value.propertyMappings,
|
|
101
108
|
'client_networks': value.clientNetworks,
|
|
102
109
|
'shared_secret': value.sharedSecret,
|
|
110
|
+
'mfa_support': value.mfaSupport,
|
|
103
111
|
};
|
|
104
112
|
}
|
|
105
113
|
|
|
@@ -55,6 +55,12 @@ export interface RadiusOutpostConfig {
|
|
|
55
55
|
* @memberof RadiusOutpostConfig
|
|
56
56
|
*/
|
|
57
57
|
sharedSecret?: string;
|
|
58
|
+
/**
|
|
59
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
60
|
+
* @type {boolean}
|
|
61
|
+
* @memberof RadiusOutpostConfig
|
|
62
|
+
*/
|
|
63
|
+
mfaSupport?: boolean;
|
|
58
64
|
}
|
|
59
65
|
|
|
60
66
|
/**
|
|
@@ -86,6 +92,7 @@ export function RadiusOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator:
|
|
|
86
92
|
'authFlowSlug': json['auth_flow_slug'],
|
|
87
93
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
88
94
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
95
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
89
96
|
};
|
|
90
97
|
}
|
|
91
98
|
|
|
@@ -103,6 +110,7 @@ export function RadiusOutpostConfigToJSON(value?: RadiusOutpostConfig | null): a
|
|
|
103
110
|
'auth_flow_slug': value.authFlowSlug,
|
|
104
111
|
'client_networks': value.clientNetworks,
|
|
105
112
|
'shared_secret': value.sharedSecret,
|
|
113
|
+
'mfa_support': value.mfaSupport,
|
|
106
114
|
};
|
|
107
115
|
}
|
|
108
116
|
|
|
@@ -115,6 +115,12 @@ export interface RadiusProvider {
|
|
|
115
115
|
* @memberof RadiusProvider
|
|
116
116
|
*/
|
|
117
117
|
readonly outpostSet: Array<string>;
|
|
118
|
+
/**
|
|
119
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
120
|
+
* @type {boolean}
|
|
121
|
+
* @memberof RadiusProvider
|
|
122
|
+
*/
|
|
123
|
+
mfaSupport?: boolean;
|
|
118
124
|
}
|
|
119
125
|
|
|
120
126
|
/**
|
|
@@ -164,6 +170,7 @@ export function RadiusProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
|
|
|
164
170
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
165
171
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
166
172
|
'outpostSet': json['outpost_set'],
|
|
173
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
167
174
|
};
|
|
168
175
|
}
|
|
169
176
|
|
|
@@ -182,6 +189,7 @@ export function RadiusProviderToJSON(value?: RadiusProvider | null): any {
|
|
|
182
189
|
'property_mappings': value.propertyMappings,
|
|
183
190
|
'client_networks': value.clientNetworks,
|
|
184
191
|
'shared_secret': value.sharedSecret,
|
|
192
|
+
'mfa_support': value.mfaSupport,
|
|
185
193
|
};
|
|
186
194
|
}
|
|
187
195
|
|
|
@@ -55,6 +55,12 @@ export interface RadiusProviderRequest {
|
|
|
55
55
|
* @memberof RadiusProviderRequest
|
|
56
56
|
*/
|
|
57
57
|
sharedSecret?: string;
|
|
58
|
+
/**
|
|
59
|
+
* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
|
|
60
|
+
* @type {boolean}
|
|
61
|
+
* @memberof RadiusProviderRequest
|
|
62
|
+
*/
|
|
63
|
+
mfaSupport?: boolean;
|
|
58
64
|
}
|
|
59
65
|
|
|
60
66
|
/**
|
|
@@ -84,6 +90,7 @@ export function RadiusProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
|
|
|
84
90
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
85
91
|
'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
|
|
86
92
|
'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
|
|
93
|
+
'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
|
|
87
94
|
};
|
|
88
95
|
}
|
|
89
96
|
|
|
@@ -102,6 +109,7 @@ export function RadiusProviderRequestToJSON(value?: RadiusProviderRequest | null
|
|
|
102
109
|
'property_mappings': value.propertyMappings,
|
|
103
110
|
'client_networks': value.clientNetworks,
|
|
104
111
|
'shared_secret': value.sharedSecret,
|
|
112
|
+
'mfa_support': value.mfaSupport,
|
|
105
113
|
};
|
|
106
114
|
}
|
|
107
115
|
|