@goauthentik/api 2023.8.3-1697470337 → 2023.8.3-1697651039

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (41) hide show
  1. package/dist/apis/StagesApi.d.ts +1 -0
  2. package/dist/apis/StagesApi.js +3 -0
  3. package/dist/esm/apis/StagesApi.d.ts +1 -0
  4. package/dist/esm/apis/StagesApi.js +3 -0
  5. package/dist/esm/models/DenyStage.d.ts +6 -0
  6. package/dist/esm/models/DenyStage.js +2 -0
  7. package/dist/esm/models/DenyStageRequest.d.ts +6 -0
  8. package/dist/esm/models/DenyStageRequest.js +2 -0
  9. package/dist/esm/models/PatchedDenyStageRequest.d.ts +6 -0
  10. package/dist/esm/models/PatchedDenyStageRequest.js +2 -0
  11. package/dist/esm/models/PatchedRadiusProviderRequest.d.ts +6 -0
  12. package/dist/esm/models/PatchedRadiusProviderRequest.js +2 -0
  13. package/dist/esm/models/RadiusOutpostConfig.d.ts +6 -0
  14. package/dist/esm/models/RadiusOutpostConfig.js +2 -0
  15. package/dist/esm/models/RadiusProvider.d.ts +6 -0
  16. package/dist/esm/models/RadiusProvider.js +2 -0
  17. package/dist/esm/models/RadiusProviderRequest.d.ts +6 -0
  18. package/dist/esm/models/RadiusProviderRequest.js +2 -0
  19. package/dist/models/DenyStage.d.ts +6 -0
  20. package/dist/models/DenyStage.js +2 -0
  21. package/dist/models/DenyStageRequest.d.ts +6 -0
  22. package/dist/models/DenyStageRequest.js +2 -0
  23. package/dist/models/PatchedDenyStageRequest.d.ts +6 -0
  24. package/dist/models/PatchedDenyStageRequest.js +2 -0
  25. package/dist/models/PatchedRadiusProviderRequest.d.ts +6 -0
  26. package/dist/models/PatchedRadiusProviderRequest.js +2 -0
  27. package/dist/models/RadiusOutpostConfig.d.ts +6 -0
  28. package/dist/models/RadiusOutpostConfig.js +2 -0
  29. package/dist/models/RadiusProvider.d.ts +6 -0
  30. package/dist/models/RadiusProvider.js +2 -0
  31. package/dist/models/RadiusProviderRequest.d.ts +6 -0
  32. package/dist/models/RadiusProviderRequest.js +2 -0
  33. package/package.json +1 -1
  34. package/src/apis/StagesApi.ts +5 -0
  35. package/src/models/DenyStage.ts +8 -0
  36. package/src/models/DenyStageRequest.ts +8 -0
  37. package/src/models/PatchedDenyStageRequest.ts +8 -0
  38. package/src/models/PatchedRadiusProviderRequest.ts +8 -0
  39. package/src/models/RadiusOutpostConfig.ts +8 -0
  40. package/src/models/RadiusProvider.ts +8 -0
  41. package/src/models/RadiusProviderRequest.ts +8 -0
@@ -295,6 +295,7 @@ export interface StagesDenyDestroyRequest {
295
295
  stageUuid: string;
296
296
  }
297
297
  export interface StagesDenyListRequest {
298
+ denyMessage?: string;
298
299
  name?: string;
299
300
  ordering?: string;
300
301
  page?: number;
@@ -2387,6 +2387,9 @@ class StagesApi extends runtime.BaseAPI {
2387
2387
  stagesDenyListRaw(requestParameters, initOverrides) {
2388
2388
  return __awaiter(this, void 0, void 0, function* () {
2389
2389
  const queryParameters = {};
2390
+ if (requestParameters.denyMessage !== undefined) {
2391
+ queryParameters['deny_message'] = requestParameters.denyMessage;
2392
+ }
2390
2393
  if (requestParameters.name !== undefined) {
2391
2394
  queryParameters['name'] = requestParameters.name;
2392
2395
  }
@@ -295,6 +295,7 @@ export interface StagesDenyDestroyRequest {
295
295
  stageUuid: string;
296
296
  }
297
297
  export interface StagesDenyListRequest {
298
+ denyMessage?: string;
298
299
  name?: string;
299
300
  ordering?: string;
300
301
  page?: number;
@@ -2384,6 +2384,9 @@ export class StagesApi extends runtime.BaseAPI {
2384
2384
  stagesDenyListRaw(requestParameters, initOverrides) {
2385
2385
  return __awaiter(this, void 0, void 0, function* () {
2386
2386
  const queryParameters = {};
2387
+ if (requestParameters.denyMessage !== undefined) {
2388
+ queryParameters['deny_message'] = requestParameters.denyMessage;
2389
+ }
2387
2390
  if (requestParameters.name !== undefined) {
2388
2391
  queryParameters['name'] = requestParameters.name;
2389
2392
  }
@@ -58,6 +58,12 @@ export interface DenyStage {
58
58
  * @memberof DenyStage
59
59
  */
60
60
  flowSet?: Array<FlowSet>;
61
+ /**
62
+ *
63
+ * @type {string}
64
+ * @memberof DenyStage
65
+ */
66
+ denyMessage?: string;
61
67
  }
62
68
  /**
63
69
  * Check if a given object implements the DenyStage interface.
@@ -41,6 +41,7 @@ export function DenyStageFromJSONTyped(json, ignoreDiscriminator) {
41
41
  'verboseNamePlural': json['verbose_name_plural'],
42
42
  'metaModelName': json['meta_model_name'],
43
43
  'flowSet': !exists(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSetFromJSON)),
44
+ 'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
44
45
  };
45
46
  }
46
47
  export function DenyStageToJSON(value) {
@@ -53,5 +54,6 @@ export function DenyStageToJSON(value) {
53
54
  return {
54
55
  'name': value.name,
55
56
  'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSetToJSON)),
57
+ 'deny_message': value.denyMessage,
56
58
  };
57
59
  }
@@ -28,6 +28,12 @@ export interface DenyStageRequest {
28
28
  * @memberof DenyStageRequest
29
29
  */
30
30
  flowSet?: Array<FlowSetRequest>;
31
+ /**
32
+ *
33
+ * @type {string}
34
+ * @memberof DenyStageRequest
35
+ */
36
+ denyMessage?: string;
31
37
  }
32
38
  /**
33
39
  * Check if a given object implements the DenyStageRequest interface.
@@ -31,6 +31,7 @@ export function DenyStageRequestFromJSONTyped(json, ignoreDiscriminator) {
31
31
  return {
32
32
  'name': json['name'],
33
33
  'flowSet': !exists(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSetRequestFromJSON)),
34
+ 'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
34
35
  };
35
36
  }
36
37
  export function DenyStageRequestToJSON(value) {
@@ -43,5 +44,6 @@ export function DenyStageRequestToJSON(value) {
43
44
  return {
44
45
  'name': value.name,
45
46
  'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSetRequestToJSON)),
47
+ 'deny_message': value.denyMessage,
46
48
  };
47
49
  }
@@ -28,6 +28,12 @@ export interface PatchedDenyStageRequest {
28
28
  * @memberof PatchedDenyStageRequest
29
29
  */
30
30
  flowSet?: Array<FlowSetRequest>;
31
+ /**
32
+ *
33
+ * @type {string}
34
+ * @memberof PatchedDenyStageRequest
35
+ */
36
+ denyMessage?: string;
31
37
  }
32
38
  /**
33
39
  * Check if a given object implements the PatchedDenyStageRequest interface.
@@ -30,6 +30,7 @@ export function PatchedDenyStageRequestFromJSONTyped(json, ignoreDiscriminator)
30
30
  return {
31
31
  'name': !exists(json, 'name') ? undefined : json['name'],
32
32
  'flowSet': !exists(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSetRequestFromJSON)),
33
+ 'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
33
34
  };
34
35
  }
35
36
  export function PatchedDenyStageRequestToJSON(value) {
@@ -42,5 +43,6 @@ export function PatchedDenyStageRequestToJSON(value) {
42
43
  return {
43
44
  'name': value.name,
44
45
  'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSetRequestToJSON)),
46
+ 'deny_message': value.denyMessage,
45
47
  };
46
48
  }
@@ -51,6 +51,12 @@ export interface PatchedRadiusProviderRequest {
51
51
  * @memberof PatchedRadiusProviderRequest
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof PatchedRadiusProviderRequest
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the PatchedRadiusProviderRequest interface.
@@ -33,6 +33,7 @@ export function PatchedRadiusProviderRequestFromJSONTyped(json, ignoreDiscrimina
33
33
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
34
34
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
35
35
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
36
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
36
37
  };
37
38
  }
38
39
  export function PatchedRadiusProviderRequestToJSON(value) {
@@ -49,5 +50,6 @@ export function PatchedRadiusProviderRequestToJSON(value) {
49
50
  'property_mappings': value.propertyMappings,
50
51
  'client_networks': value.clientNetworks,
51
52
  'shared_secret': value.sharedSecret,
53
+ 'mfa_support': value.mfaSupport,
52
54
  };
53
55
  }
@@ -51,6 +51,12 @@ export interface RadiusOutpostConfig {
51
51
  * @memberof RadiusOutpostConfig
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof RadiusOutpostConfig
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the RadiusOutpostConfig interface.
@@ -37,6 +37,7 @@ export function RadiusOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
37
37
  'authFlowSlug': json['auth_flow_slug'],
38
38
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
39
39
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
40
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
40
41
  };
41
42
  }
42
43
  export function RadiusOutpostConfigToJSON(value) {
@@ -52,5 +53,6 @@ export function RadiusOutpostConfigToJSON(value) {
52
53
  'auth_flow_slug': value.authFlowSlug,
53
54
  'client_networks': value.clientNetworks,
54
55
  'shared_secret': value.sharedSecret,
56
+ 'mfa_support': value.mfaSupport,
55
57
  };
56
58
  }
@@ -111,6 +111,12 @@ export interface RadiusProvider {
111
111
  * @memberof RadiusProvider
112
112
  */
113
113
  readonly outpostSet: Array<string>;
114
+ /**
115
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
116
+ * @type {boolean}
117
+ * @memberof RadiusProvider
118
+ */
119
+ mfaSupport?: boolean;
114
120
  }
115
121
  /**
116
122
  * Check if a given object implements the RadiusProvider interface.
@@ -55,6 +55,7 @@ export function RadiusProviderFromJSONTyped(json, ignoreDiscriminator) {
55
55
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
56
56
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
57
57
  'outpostSet': json['outpost_set'],
58
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
58
59
  };
59
60
  }
60
61
  export function RadiusProviderToJSON(value) {
@@ -71,5 +72,6 @@ export function RadiusProviderToJSON(value) {
71
72
  'property_mappings': value.propertyMappings,
72
73
  'client_networks': value.clientNetworks,
73
74
  'shared_secret': value.sharedSecret,
75
+ 'mfa_support': value.mfaSupport,
74
76
  };
75
77
  }
@@ -51,6 +51,12 @@ export interface RadiusProviderRequest {
51
51
  * @memberof RadiusProviderRequest
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof RadiusProviderRequest
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the RadiusProviderRequest interface.
@@ -35,6 +35,7 @@ export function RadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
35
35
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
36
36
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
37
37
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
38
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
38
39
  };
39
40
  }
40
41
  export function RadiusProviderRequestToJSON(value) {
@@ -51,5 +52,6 @@ export function RadiusProviderRequestToJSON(value) {
51
52
  'property_mappings': value.propertyMappings,
52
53
  'client_networks': value.clientNetworks,
53
54
  'shared_secret': value.sharedSecret,
55
+ 'mfa_support': value.mfaSupport,
54
56
  };
55
57
  }
@@ -58,6 +58,12 @@ export interface DenyStage {
58
58
  * @memberof DenyStage
59
59
  */
60
60
  flowSet?: Array<FlowSet>;
61
+ /**
62
+ *
63
+ * @type {string}
64
+ * @memberof DenyStage
65
+ */
66
+ denyMessage?: string;
61
67
  }
62
68
  /**
63
69
  * Check if a given object implements the DenyStage interface.
@@ -46,6 +46,7 @@ function DenyStageFromJSONTyped(json, ignoreDiscriminator) {
46
46
  'verboseNamePlural': json['verbose_name_plural'],
47
47
  'metaModelName': json['meta_model_name'],
48
48
  'flowSet': !(0, runtime_1.exists)(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSet_1.FlowSetFromJSON)),
49
+ 'denyMessage': !(0, runtime_1.exists)(json, 'deny_message') ? undefined : json['deny_message'],
49
50
  };
50
51
  }
51
52
  exports.DenyStageFromJSONTyped = DenyStageFromJSONTyped;
@@ -59,6 +60,7 @@ function DenyStageToJSON(value) {
59
60
  return {
60
61
  'name': value.name,
61
62
  'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSet_1.FlowSetToJSON)),
63
+ 'deny_message': value.denyMessage,
62
64
  };
63
65
  }
64
66
  exports.DenyStageToJSON = DenyStageToJSON;
@@ -28,6 +28,12 @@ export interface DenyStageRequest {
28
28
  * @memberof DenyStageRequest
29
29
  */
30
30
  flowSet?: Array<FlowSetRequest>;
31
+ /**
32
+ *
33
+ * @type {string}
34
+ * @memberof DenyStageRequest
35
+ */
36
+ denyMessage?: string;
31
37
  }
32
38
  /**
33
39
  * Check if a given object implements the DenyStageRequest interface.
@@ -36,6 +36,7 @@ function DenyStageRequestFromJSONTyped(json, ignoreDiscriminator) {
36
36
  return {
37
37
  'name': json['name'],
38
38
  'flowSet': !(0, runtime_1.exists)(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSetRequest_1.FlowSetRequestFromJSON)),
39
+ 'denyMessage': !(0, runtime_1.exists)(json, 'deny_message') ? undefined : json['deny_message'],
39
40
  };
40
41
  }
41
42
  exports.DenyStageRequestFromJSONTyped = DenyStageRequestFromJSONTyped;
@@ -49,6 +50,7 @@ function DenyStageRequestToJSON(value) {
49
50
  return {
50
51
  'name': value.name,
51
52
  'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSetRequest_1.FlowSetRequestToJSON)),
53
+ 'deny_message': value.denyMessage,
52
54
  };
53
55
  }
54
56
  exports.DenyStageRequestToJSON = DenyStageRequestToJSON;
@@ -28,6 +28,12 @@ export interface PatchedDenyStageRequest {
28
28
  * @memberof PatchedDenyStageRequest
29
29
  */
30
30
  flowSet?: Array<FlowSetRequest>;
31
+ /**
32
+ *
33
+ * @type {string}
34
+ * @memberof PatchedDenyStageRequest
35
+ */
36
+ denyMessage?: string;
31
37
  }
32
38
  /**
33
39
  * Check if a given object implements the PatchedDenyStageRequest interface.
@@ -35,6 +35,7 @@ function PatchedDenyStageRequestFromJSONTyped(json, ignoreDiscriminator) {
35
35
  return {
36
36
  'name': !(0, runtime_1.exists)(json, 'name') ? undefined : json['name'],
37
37
  'flowSet': !(0, runtime_1.exists)(json, 'flow_set') ? undefined : (json['flow_set'].map(FlowSetRequest_1.FlowSetRequestFromJSON)),
38
+ 'denyMessage': !(0, runtime_1.exists)(json, 'deny_message') ? undefined : json['deny_message'],
38
39
  };
39
40
  }
40
41
  exports.PatchedDenyStageRequestFromJSONTyped = PatchedDenyStageRequestFromJSONTyped;
@@ -48,6 +49,7 @@ function PatchedDenyStageRequestToJSON(value) {
48
49
  return {
49
50
  'name': value.name,
50
51
  'flow_set': value.flowSet === undefined ? undefined : (value.flowSet.map(FlowSetRequest_1.FlowSetRequestToJSON)),
52
+ 'deny_message': value.denyMessage,
51
53
  };
52
54
  }
53
55
  exports.PatchedDenyStageRequestToJSON = PatchedDenyStageRequestToJSON;
@@ -51,6 +51,12 @@ export interface PatchedRadiusProviderRequest {
51
51
  * @memberof PatchedRadiusProviderRequest
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof PatchedRadiusProviderRequest
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the PatchedRadiusProviderRequest interface.
@@ -38,6 +38,7 @@ function PatchedRadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
38
38
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
39
39
  'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
40
40
  'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
41
+ 'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
41
42
  };
42
43
  }
43
44
  exports.PatchedRadiusProviderRequestFromJSONTyped = PatchedRadiusProviderRequestFromJSONTyped;
@@ -55,6 +56,7 @@ function PatchedRadiusProviderRequestToJSON(value) {
55
56
  'property_mappings': value.propertyMappings,
56
57
  'client_networks': value.clientNetworks,
57
58
  'shared_secret': value.sharedSecret,
59
+ 'mfa_support': value.mfaSupport,
58
60
  };
59
61
  }
60
62
  exports.PatchedRadiusProviderRequestToJSON = PatchedRadiusProviderRequestToJSON;
@@ -51,6 +51,12 @@ export interface RadiusOutpostConfig {
51
51
  * @memberof RadiusOutpostConfig
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof RadiusOutpostConfig
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the RadiusOutpostConfig interface.
@@ -42,6 +42,7 @@ function RadiusOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
42
42
  'authFlowSlug': json['auth_flow_slug'],
43
43
  'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
44
44
  'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
45
+ 'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
45
46
  };
46
47
  }
47
48
  exports.RadiusOutpostConfigFromJSONTyped = RadiusOutpostConfigFromJSONTyped;
@@ -58,6 +59,7 @@ function RadiusOutpostConfigToJSON(value) {
58
59
  'auth_flow_slug': value.authFlowSlug,
59
60
  'client_networks': value.clientNetworks,
60
61
  'shared_secret': value.sharedSecret,
62
+ 'mfa_support': value.mfaSupport,
61
63
  };
62
64
  }
63
65
  exports.RadiusOutpostConfigToJSON = RadiusOutpostConfigToJSON;
@@ -111,6 +111,12 @@ export interface RadiusProvider {
111
111
  * @memberof RadiusProvider
112
112
  */
113
113
  readonly outpostSet: Array<string>;
114
+ /**
115
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
116
+ * @type {boolean}
117
+ * @memberof RadiusProvider
118
+ */
119
+ mfaSupport?: boolean;
114
120
  }
115
121
  /**
116
122
  * Check if a given object implements the RadiusProvider interface.
@@ -60,6 +60,7 @@ function RadiusProviderFromJSONTyped(json, ignoreDiscriminator) {
60
60
  'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
61
61
  'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
62
62
  'outpostSet': json['outpost_set'],
63
+ 'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
63
64
  };
64
65
  }
65
66
  exports.RadiusProviderFromJSONTyped = RadiusProviderFromJSONTyped;
@@ -77,6 +78,7 @@ function RadiusProviderToJSON(value) {
77
78
  'property_mappings': value.propertyMappings,
78
79
  'client_networks': value.clientNetworks,
79
80
  'shared_secret': value.sharedSecret,
81
+ 'mfa_support': value.mfaSupport,
80
82
  };
81
83
  }
82
84
  exports.RadiusProviderToJSON = RadiusProviderToJSON;
@@ -51,6 +51,12 @@ export interface RadiusProviderRequest {
51
51
  * @memberof RadiusProviderRequest
52
52
  */
53
53
  sharedSecret?: string;
54
+ /**
55
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
56
+ * @type {boolean}
57
+ * @memberof RadiusProviderRequest
58
+ */
59
+ mfaSupport?: boolean;
54
60
  }
55
61
  /**
56
62
  * Check if a given object implements the RadiusProviderRequest interface.
@@ -40,6 +40,7 @@ function RadiusProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
40
40
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
41
41
  'clientNetworks': !(0, runtime_1.exists)(json, 'client_networks') ? undefined : json['client_networks'],
42
42
  'sharedSecret': !(0, runtime_1.exists)(json, 'shared_secret') ? undefined : json['shared_secret'],
43
+ 'mfaSupport': !(0, runtime_1.exists)(json, 'mfa_support') ? undefined : json['mfa_support'],
43
44
  };
44
45
  }
45
46
  exports.RadiusProviderRequestFromJSONTyped = RadiusProviderRequestFromJSONTyped;
@@ -57,6 +58,7 @@ function RadiusProviderRequestToJSON(value) {
57
58
  'property_mappings': value.propertyMappings,
58
59
  'client_networks': value.clientNetworks,
59
60
  'shared_secret': value.sharedSecret,
61
+ 'mfa_support': value.mfaSupport,
60
62
  };
61
63
  }
62
64
  exports.RadiusProviderRequestToJSON = RadiusProviderRequestToJSON;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2023.8.3-1697470337",
3
+ "version": "2023.8.3-1697651039",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -653,6 +653,7 @@ export interface StagesDenyDestroyRequest {
653
653
  }
654
654
 
655
655
  export interface StagesDenyListRequest {
656
+ denyMessage?: string;
656
657
  name?: string;
657
658
  ordering?: string;
658
659
  page?: number;
@@ -3806,6 +3807,10 @@ export class StagesApi extends runtime.BaseAPI {
3806
3807
  async stagesDenyListRaw(requestParameters: StagesDenyListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<PaginatedDenyStageList>> {
3807
3808
  const queryParameters: any = {};
3808
3809
 
3810
+ if (requestParameters.denyMessage !== undefined) {
3811
+ queryParameters['deny_message'] = requestParameters.denyMessage;
3812
+ }
3813
+
3809
3814
  if (requestParameters.name !== undefined) {
3810
3815
  queryParameters['name'] = requestParameters.name;
3811
3816
  }
@@ -68,6 +68,12 @@ export interface DenyStage {
68
68
  * @memberof DenyStage
69
69
  */
70
70
  flowSet?: Array<FlowSet>;
71
+ /**
72
+ *
73
+ * @type {string}
74
+ * @memberof DenyStage
75
+ */
76
+ denyMessage?: string;
71
77
  }
72
78
 
73
79
  /**
@@ -102,6 +108,7 @@ export function DenyStageFromJSONTyped(json: any, ignoreDiscriminator: boolean):
102
108
  'verboseNamePlural': json['verbose_name_plural'],
103
109
  'metaModelName': json['meta_model_name'],
104
110
  'flowSet': !exists(json, 'flow_set') ? undefined : ((json['flow_set'] as Array<any>).map(FlowSetFromJSON)),
111
+ 'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
105
112
  };
106
113
  }
107
114
 
@@ -116,6 +123,7 @@ export function DenyStageToJSON(value?: DenyStage | null): any {
116
123
 
117
124
  'name': value.name,
118
125
  'flow_set': value.flowSet === undefined ? undefined : ((value.flowSet as Array<any>).map(FlowSetToJSON)),
126
+ 'deny_message': value.denyMessage,
119
127
  };
120
128
  }
121
129
 
@@ -38,6 +38,12 @@ export interface DenyStageRequest {
38
38
  * @memberof DenyStageRequest
39
39
  */
40
40
  flowSet?: Array<FlowSetRequest>;
41
+ /**
42
+ *
43
+ * @type {string}
44
+ * @memberof DenyStageRequest
45
+ */
46
+ denyMessage?: string;
41
47
  }
42
48
 
43
49
  /**
@@ -62,6 +68,7 @@ export function DenyStageRequestFromJSONTyped(json: any, ignoreDiscriminator: bo
62
68
 
63
69
  'name': json['name'],
64
70
  'flowSet': !exists(json, 'flow_set') ? undefined : ((json['flow_set'] as Array<any>).map(FlowSetRequestFromJSON)),
71
+ 'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
65
72
  };
66
73
  }
67
74
 
@@ -76,6 +83,7 @@ export function DenyStageRequestToJSON(value?: DenyStageRequest | null): any {
76
83
 
77
84
  'name': value.name,
78
85
  'flow_set': value.flowSet === undefined ? undefined : ((value.flowSet as Array<any>).map(FlowSetRequestToJSON)),
86
+ 'deny_message': value.denyMessage,
79
87
  };
80
88
  }
81
89
 
@@ -38,6 +38,12 @@ export interface PatchedDenyStageRequest {
38
38
  * @memberof PatchedDenyStageRequest
39
39
  */
40
40
  flowSet?: Array<FlowSetRequest>;
41
+ /**
42
+ *
43
+ * @type {string}
44
+ * @memberof PatchedDenyStageRequest
45
+ */
46
+ denyMessage?: string;
41
47
  }
42
48
 
43
49
  /**
@@ -61,6 +67,7 @@ export function PatchedDenyStageRequestFromJSONTyped(json: any, ignoreDiscrimina
61
67
 
62
68
  'name': !exists(json, 'name') ? undefined : json['name'],
63
69
  'flowSet': !exists(json, 'flow_set') ? undefined : ((json['flow_set'] as Array<any>).map(FlowSetRequestFromJSON)),
70
+ 'denyMessage': !exists(json, 'deny_message') ? undefined : json['deny_message'],
64
71
  };
65
72
  }
66
73
 
@@ -75,6 +82,7 @@ export function PatchedDenyStageRequestToJSON(value?: PatchedDenyStageRequest |
75
82
 
76
83
  'name': value.name,
77
84
  'flow_set': value.flowSet === undefined ? undefined : ((value.flowSet as Array<any>).map(FlowSetRequestToJSON)),
85
+ 'deny_message': value.denyMessage,
78
86
  };
79
87
  }
80
88
 
@@ -55,6 +55,12 @@ export interface PatchedRadiusProviderRequest {
55
55
  * @memberof PatchedRadiusProviderRequest
56
56
  */
57
57
  sharedSecret?: string;
58
+ /**
59
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
60
+ * @type {boolean}
61
+ * @memberof PatchedRadiusProviderRequest
62
+ */
63
+ mfaSupport?: boolean;
58
64
  }
59
65
 
60
66
  /**
@@ -82,6 +88,7 @@ export function PatchedRadiusProviderRequestFromJSONTyped(json: any, ignoreDiscr
82
88
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
83
89
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
84
90
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
91
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
85
92
  };
86
93
  }
87
94
 
@@ -100,6 +107,7 @@ export function PatchedRadiusProviderRequestToJSON(value?: PatchedRadiusProvider
100
107
  'property_mappings': value.propertyMappings,
101
108
  'client_networks': value.clientNetworks,
102
109
  'shared_secret': value.sharedSecret,
110
+ 'mfa_support': value.mfaSupport,
103
111
  };
104
112
  }
105
113
 
@@ -55,6 +55,12 @@ export interface RadiusOutpostConfig {
55
55
  * @memberof RadiusOutpostConfig
56
56
  */
57
57
  sharedSecret?: string;
58
+ /**
59
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
60
+ * @type {boolean}
61
+ * @memberof RadiusOutpostConfig
62
+ */
63
+ mfaSupport?: boolean;
58
64
  }
59
65
 
60
66
  /**
@@ -86,6 +92,7 @@ export function RadiusOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator:
86
92
  'authFlowSlug': json['auth_flow_slug'],
87
93
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
88
94
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
95
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
89
96
  };
90
97
  }
91
98
 
@@ -103,6 +110,7 @@ export function RadiusOutpostConfigToJSON(value?: RadiusOutpostConfig | null): a
103
110
  'auth_flow_slug': value.authFlowSlug,
104
111
  'client_networks': value.clientNetworks,
105
112
  'shared_secret': value.sharedSecret,
113
+ 'mfa_support': value.mfaSupport,
106
114
  };
107
115
  }
108
116
 
@@ -115,6 +115,12 @@ export interface RadiusProvider {
115
115
  * @memberof RadiusProvider
116
116
  */
117
117
  readonly outpostSet: Array<string>;
118
+ /**
119
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
120
+ * @type {boolean}
121
+ * @memberof RadiusProvider
122
+ */
123
+ mfaSupport?: boolean;
118
124
  }
119
125
 
120
126
  /**
@@ -164,6 +170,7 @@ export function RadiusProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
164
170
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
165
171
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
166
172
  'outpostSet': json['outpost_set'],
173
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
167
174
  };
168
175
  }
169
176
 
@@ -182,6 +189,7 @@ export function RadiusProviderToJSON(value?: RadiusProvider | null): any {
182
189
  'property_mappings': value.propertyMappings,
183
190
  'client_networks': value.clientNetworks,
184
191
  'shared_secret': value.sharedSecret,
192
+ 'mfa_support': value.mfaSupport,
185
193
  };
186
194
  }
187
195
 
@@ -55,6 +55,12 @@ export interface RadiusProviderRequest {
55
55
  * @memberof RadiusProviderRequest
56
56
  */
57
57
  sharedSecret?: string;
58
+ /**
59
+ * When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
60
+ * @type {boolean}
61
+ * @memberof RadiusProviderRequest
62
+ */
63
+ mfaSupport?: boolean;
58
64
  }
59
65
 
60
66
  /**
@@ -84,6 +90,7 @@ export function RadiusProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
84
90
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
85
91
  'clientNetworks': !exists(json, 'client_networks') ? undefined : json['client_networks'],
86
92
  'sharedSecret': !exists(json, 'shared_secret') ? undefined : json['shared_secret'],
93
+ 'mfaSupport': !exists(json, 'mfa_support') ? undefined : json['mfa_support'],
87
94
  };
88
95
  }
89
96
 
@@ -102,6 +109,7 @@ export function RadiusProviderRequestToJSON(value?: RadiusProviderRequest | null
102
109
  'property_mappings': value.propertyMappings,
103
110
  'client_networks': value.clientNetworks,
104
111
  'shared_secret': value.sharedSecret,
112
+ 'mfa_support': value.mfaSupport,
105
113
  };
106
114
  }
107
115