@goauthentik/api 2024.10.5-1733854821 → 2024.10.5-1734006367
Sign up to get free protection for your applications and to get access to all the features.
- package/.openapi-generator/FILES +1 -0
- package/dist/apis/SourcesApi.d.ts +11 -0
- package/dist/apis/SourcesApi.js +13 -1
- package/dist/esm/apis/SourcesApi.d.ts +11 -0
- package/dist/esm/apis/SourcesApi.js +12 -0
- package/dist/esm/models/KadminTypeEnum.d.ts +25 -0
- package/dist/esm/models/KadminTypeEnum.js +32 -0
- package/dist/esm/models/KerberosSource.d.ts +7 -0
- package/dist/esm/models/KerberosSource.js +3 -0
- package/dist/esm/models/KerberosSourceRequest.d.ts +7 -0
- package/dist/esm/models/KerberosSourceRequest.js +3 -0
- package/dist/esm/models/PatchedKerberosSourceRequest.d.ts +7 -0
- package/dist/esm/models/PatchedKerberosSourceRequest.js +3 -0
- package/dist/esm/models/index.d.ts +1 -0
- package/dist/esm/models/index.js +1 -0
- package/dist/models/KadminTypeEnum.d.ts +25 -0
- package/dist/models/KadminTypeEnum.js +38 -0
- package/dist/models/KerberosSource.d.ts +7 -0
- package/dist/models/KerberosSource.js +3 -0
- package/dist/models/KerberosSourceRequest.d.ts +7 -0
- package/dist/models/KerberosSourceRequest.js +3 -0
- package/dist/models/PatchedKerberosSourceRequest.d.ts +7 -0
- package/dist/models/PatchedKerberosSourceRequest.js +3 -0
- package/dist/models/index.d.ts +1 -0
- package/dist/models/index.js +1 -0
- package/package.json +1 -1
- package/src/apis/SourcesApi.ts +15 -0
- package/src/models/KadminTypeEnum.ts +40 -0
- package/src/models/KerberosSource.ts +14 -0
- package/src/models/KerberosSourceRequest.ts +14 -0
- package/src/models/PatchedKerberosSourceRequest.ts +14 -0
- package/src/models/index.ts +1 -0
package/.openapi-generator/FILES
CHANGED
@@ -209,6 +209,7 @@ src/models/InvitationRequest.ts
|
|
209
209
|
src/models/InvitationStage.ts
|
210
210
|
src/models/InvitationStageRequest.ts
|
211
211
|
src/models/IssuerModeEnum.ts
|
212
|
+
src/models/KadminTypeEnum.ts
|
212
213
|
src/models/KerberosSource.ts
|
213
214
|
src/models/KerberosSourcePropertyMapping.ts
|
214
215
|
src/models/KerberosSourcePropertyMappingRequest.ts
|
@@ -138,6 +138,7 @@ export interface SourcesKerberosDestroyRequest {
|
|
138
138
|
}
|
139
139
|
export interface SourcesKerberosListRequest {
|
140
140
|
enabled?: boolean;
|
141
|
+
kadminType?: SourcesKerberosListKadminTypeEnum;
|
141
142
|
name?: string;
|
142
143
|
ordering?: string;
|
143
144
|
page?: number;
|
@@ -1634,6 +1635,16 @@ export declare class SourcesApi extends runtime.BaseAPI {
|
|
1634
1635
|
*/
|
1635
1636
|
sourcesUserConnectionsSamlUsedByList(requestParameters: SourcesUserConnectionsSamlUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
|
1636
1637
|
}
|
1638
|
+
/**
|
1639
|
+
* @export
|
1640
|
+
*/
|
1641
|
+
export declare const SourcesKerberosListKadminTypeEnum: {
|
1642
|
+
readonly Heimdal: "Heimdal";
|
1643
|
+
readonly Mit: "MIT";
|
1644
|
+
readonly Other: "other";
|
1645
|
+
readonly UnknownDefaultOpenApi: "11184809";
|
1646
|
+
};
|
1647
|
+
export type SourcesKerberosListKadminTypeEnum = typeof SourcesKerberosListKadminTypeEnum[keyof typeof SourcesKerberosListKadminTypeEnum];
|
1637
1648
|
/**
|
1638
1649
|
* @export
|
1639
1650
|
*/
|
package/dist/apis/SourcesApi.js
CHANGED
@@ -22,7 +22,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|
22
22
|
});
|
23
23
|
};
|
24
24
|
Object.defineProperty(exports, "__esModule", { value: true });
|
25
|
-
exports.SourcesSamlListUserMatchingModeEnum = exports.SourcesSamlListSignatureAlgorithmEnum = exports.SourcesSamlListPolicyEngineModeEnum = exports.SourcesSamlListNameIdPolicyEnum = exports.SourcesSamlListDigestAlgorithmEnum = exports.SourcesSamlListBindingTypeEnum = exports.SourcesPlexListUserMatchingModeEnum = exports.SourcesPlexListPolicyEngineModeEnum = exports.SourcesPlexListGroupMatchingModeEnum = exports.SourcesOauthListUserMatchingModeEnum = exports.SourcesOauthListPolicyEngineModeEnum = exports.SourcesOauthListGroupMatchingModeEnum = exports.SourcesApi = void 0;
|
25
|
+
exports.SourcesSamlListUserMatchingModeEnum = exports.SourcesSamlListSignatureAlgorithmEnum = exports.SourcesSamlListPolicyEngineModeEnum = exports.SourcesSamlListNameIdPolicyEnum = exports.SourcesSamlListDigestAlgorithmEnum = exports.SourcesSamlListBindingTypeEnum = exports.SourcesPlexListUserMatchingModeEnum = exports.SourcesPlexListPolicyEngineModeEnum = exports.SourcesPlexListGroupMatchingModeEnum = exports.SourcesOauthListUserMatchingModeEnum = exports.SourcesOauthListPolicyEngineModeEnum = exports.SourcesOauthListGroupMatchingModeEnum = exports.SourcesKerberosListKadminTypeEnum = exports.SourcesApi = void 0;
|
26
26
|
const runtime = require("../runtime");
|
27
27
|
const models_1 = require("../models");
|
28
28
|
/**
|
@@ -1385,6 +1385,9 @@ class SourcesApi extends runtime.BaseAPI {
|
|
1385
1385
|
if (requestParameters.enabled !== undefined) {
|
1386
1386
|
queryParameters['enabled'] = requestParameters.enabled;
|
1387
1387
|
}
|
1388
|
+
if (requestParameters.kadminType !== undefined) {
|
1389
|
+
queryParameters['kadmin_type'] = requestParameters.kadminType;
|
1390
|
+
}
|
1388
1391
|
if (requestParameters.name !== undefined) {
|
1389
1392
|
queryParameters['name'] = requestParameters.name;
|
1390
1393
|
}
|
@@ -5208,6 +5211,15 @@ class SourcesApi extends runtime.BaseAPI {
|
|
5208
5211
|
}
|
5209
5212
|
}
|
5210
5213
|
exports.SourcesApi = SourcesApi;
|
5214
|
+
/**
|
5215
|
+
* @export
|
5216
|
+
*/
|
5217
|
+
exports.SourcesKerberosListKadminTypeEnum = {
|
5218
|
+
Heimdal: 'Heimdal',
|
5219
|
+
Mit: 'MIT',
|
5220
|
+
Other: 'other',
|
5221
|
+
UnknownDefaultOpenApi: '11184809'
|
5222
|
+
};
|
5211
5223
|
/**
|
5212
5224
|
* @export
|
5213
5225
|
*/
|
@@ -138,6 +138,7 @@ export interface SourcesKerberosDestroyRequest {
|
|
138
138
|
}
|
139
139
|
export interface SourcesKerberosListRequest {
|
140
140
|
enabled?: boolean;
|
141
|
+
kadminType?: SourcesKerberosListKadminTypeEnum;
|
141
142
|
name?: string;
|
142
143
|
ordering?: string;
|
143
144
|
page?: number;
|
@@ -1634,6 +1635,16 @@ export declare class SourcesApi extends runtime.BaseAPI {
|
|
1634
1635
|
*/
|
1635
1636
|
sourcesUserConnectionsSamlUsedByList(requestParameters: SourcesUserConnectionsSamlUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
|
1636
1637
|
}
|
1638
|
+
/**
|
1639
|
+
* @export
|
1640
|
+
*/
|
1641
|
+
export declare const SourcesKerberosListKadminTypeEnum: {
|
1642
|
+
readonly Heimdal: "Heimdal";
|
1643
|
+
readonly Mit: "MIT";
|
1644
|
+
readonly Other: "other";
|
1645
|
+
readonly UnknownDefaultOpenApi: "11184809";
|
1646
|
+
};
|
1647
|
+
export type SourcesKerberosListKadminTypeEnum = typeof SourcesKerberosListKadminTypeEnum[keyof typeof SourcesKerberosListKadminTypeEnum];
|
1637
1648
|
/**
|
1638
1649
|
* @export
|
1639
1650
|
*/
|
@@ -1382,6 +1382,9 @@ export class SourcesApi extends runtime.BaseAPI {
|
|
1382
1382
|
if (requestParameters.enabled !== undefined) {
|
1383
1383
|
queryParameters['enabled'] = requestParameters.enabled;
|
1384
1384
|
}
|
1385
|
+
if (requestParameters.kadminType !== undefined) {
|
1386
|
+
queryParameters['kadmin_type'] = requestParameters.kadminType;
|
1387
|
+
}
|
1385
1388
|
if (requestParameters.name !== undefined) {
|
1386
1389
|
queryParameters['name'] = requestParameters.name;
|
1387
1390
|
}
|
@@ -5204,6 +5207,15 @@ export class SourcesApi extends runtime.BaseAPI {
|
|
5204
5207
|
});
|
5205
5208
|
}
|
5206
5209
|
}
|
5210
|
+
/**
|
5211
|
+
* @export
|
5212
|
+
*/
|
5213
|
+
export const SourcesKerberosListKadminTypeEnum = {
|
5214
|
+
Heimdal: 'Heimdal',
|
5215
|
+
Mit: 'MIT',
|
5216
|
+
Other: 'other',
|
5217
|
+
UnknownDefaultOpenApi: '11184809'
|
5218
|
+
};
|
5207
5219
|
/**
|
5208
5220
|
* @export
|
5209
5221
|
*/
|
@@ -0,0 +1,25 @@
|
|
1
|
+
/**
|
2
|
+
* authentik
|
3
|
+
* Making authentication simple.
|
4
|
+
*
|
5
|
+
* The version of the OpenAPI document: 2024.10.5
|
6
|
+
* Contact: hello@goauthentik.io
|
7
|
+
*
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
9
|
+
* https://openapi-generator.tech
|
10
|
+
* Do not edit the class manually.
|
11
|
+
*/
|
12
|
+
/**
|
13
|
+
*
|
14
|
+
* @export
|
15
|
+
*/
|
16
|
+
export declare const KadminTypeEnum: {
|
17
|
+
readonly Mit: "MIT";
|
18
|
+
readonly Heimdal: "Heimdal";
|
19
|
+
readonly Other: "other";
|
20
|
+
readonly UnknownDefaultOpenApi: "11184809";
|
21
|
+
};
|
22
|
+
export type KadminTypeEnum = typeof KadminTypeEnum[keyof typeof KadminTypeEnum];
|
23
|
+
export declare function KadminTypeEnumFromJSON(json: any): KadminTypeEnum;
|
24
|
+
export declare function KadminTypeEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): KadminTypeEnum;
|
25
|
+
export declare function KadminTypeEnumToJSON(value?: KadminTypeEnum | null): any;
|
@@ -0,0 +1,32 @@
|
|
1
|
+
/* tslint:disable */
|
2
|
+
/* eslint-disable */
|
3
|
+
/**
|
4
|
+
* authentik
|
5
|
+
* Making authentication simple.
|
6
|
+
*
|
7
|
+
* The version of the OpenAPI document: 2024.10.5
|
8
|
+
* Contact: hello@goauthentik.io
|
9
|
+
*
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
11
|
+
* https://openapi-generator.tech
|
12
|
+
* Do not edit the class manually.
|
13
|
+
*/
|
14
|
+
/**
|
15
|
+
*
|
16
|
+
* @export
|
17
|
+
*/
|
18
|
+
export const KadminTypeEnum = {
|
19
|
+
Mit: 'MIT',
|
20
|
+
Heimdal: 'Heimdal',
|
21
|
+
Other: 'other',
|
22
|
+
UnknownDefaultOpenApi: '11184809'
|
23
|
+
};
|
24
|
+
export function KadminTypeEnumFromJSON(json) {
|
25
|
+
return KadminTypeEnumFromJSONTyped(json, false);
|
26
|
+
}
|
27
|
+
export function KadminTypeEnumFromJSONTyped(json, ignoreDiscriminator) {
|
28
|
+
return json;
|
29
|
+
}
|
30
|
+
export function KadminTypeEnumToJSON(value) {
|
31
|
+
return value;
|
32
|
+
}
|
@@ -10,6 +10,7 @@
|
|
10
10
|
* Do not edit the class manually.
|
11
11
|
*/
|
12
12
|
import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
|
13
|
+
import type { KadminTypeEnum } from './KadminTypeEnum';
|
13
14
|
import type { PolicyEngineMode } from './PolicyEngineMode';
|
14
15
|
import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
|
15
16
|
/**
|
@@ -138,6 +139,12 @@ export interface KerberosSource {
|
|
138
139
|
* @memberof KerberosSource
|
139
140
|
*/
|
140
141
|
krb5Conf?: string;
|
142
|
+
/**
|
143
|
+
*
|
144
|
+
* @type {KadminTypeEnum}
|
145
|
+
* @memberof KerberosSource
|
146
|
+
*/
|
147
|
+
kadminType?: KadminTypeEnum;
|
141
148
|
/**
|
142
149
|
* Sync users from Kerberos into authentik
|
143
150
|
* @type {boolean}
|
@@ -13,6 +13,7 @@
|
|
13
13
|
*/
|
14
14
|
import { exists } from '../runtime';
|
15
15
|
import { GroupMatchingModeEnumFromJSON, GroupMatchingModeEnumToJSON, } from './GroupMatchingModeEnum';
|
16
|
+
import { KadminTypeEnumFromJSON, KadminTypeEnumToJSON, } from './KadminTypeEnum';
|
16
17
|
import { PolicyEngineModeFromJSON, PolicyEngineModeToJSON, } from './PolicyEngineMode';
|
17
18
|
import { UserMatchingModeEnumFromJSON, UserMatchingModeEnumToJSON, } from './UserMatchingModeEnum';
|
18
19
|
/**
|
@@ -61,6 +62,7 @@ export function KerberosSourceFromJSONTyped(json, ignoreDiscriminator) {
|
|
61
62
|
'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
|
62
63
|
'realm': json['realm'],
|
63
64
|
'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
|
65
|
+
'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
|
64
66
|
'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
|
65
67
|
'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
|
66
68
|
'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
|
@@ -92,6 +94,7 @@ export function KerberosSourceToJSON(value) {
|
|
92
94
|
'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
|
93
95
|
'realm': value.realm,
|
94
96
|
'krb5_conf': value.krb5Conf,
|
97
|
+
'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
|
95
98
|
'sync_users': value.syncUsers,
|
96
99
|
'sync_users_password': value.syncUsersPassword,
|
97
100
|
'sync_principal': value.syncPrincipal,
|
@@ -10,6 +10,7 @@
|
|
10
10
|
* Do not edit the class manually.
|
11
11
|
*/
|
12
12
|
import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
|
13
|
+
import type { KadminTypeEnum } from './KadminTypeEnum';
|
13
14
|
import type { PolicyEngineMode } from './PolicyEngineMode';
|
14
15
|
import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
|
15
16
|
/**
|
@@ -96,6 +97,12 @@ export interface KerberosSourceRequest {
|
|
96
97
|
* @memberof KerberosSourceRequest
|
97
98
|
*/
|
98
99
|
krb5Conf?: string;
|
100
|
+
/**
|
101
|
+
*
|
102
|
+
* @type {KadminTypeEnum}
|
103
|
+
* @memberof KerberosSourceRequest
|
104
|
+
*/
|
105
|
+
kadminType?: KadminTypeEnum;
|
99
106
|
/**
|
100
107
|
* Sync users from Kerberos into authentik
|
101
108
|
* @type {boolean}
|
@@ -13,6 +13,7 @@
|
|
13
13
|
*/
|
14
14
|
import { exists } from '../runtime';
|
15
15
|
import { GroupMatchingModeEnumFromJSON, GroupMatchingModeEnumToJSON, } from './GroupMatchingModeEnum';
|
16
|
+
import { KadminTypeEnumFromJSON, KadminTypeEnumToJSON, } from './KadminTypeEnum';
|
16
17
|
import { PolicyEngineModeFromJSON, PolicyEngineModeToJSON, } from './PolicyEngineMode';
|
17
18
|
import { UserMatchingModeEnumFromJSON, UserMatchingModeEnumToJSON, } from './UserMatchingModeEnum';
|
18
19
|
/**
|
@@ -46,6 +47,7 @@ export function KerberosSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
46
47
|
'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
|
47
48
|
'realm': json['realm'],
|
48
49
|
'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
|
50
|
+
'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
|
49
51
|
'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
|
50
52
|
'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
|
51
53
|
'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
|
@@ -79,6 +81,7 @@ export function KerberosSourceRequestToJSON(value) {
|
|
79
81
|
'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
|
80
82
|
'realm': value.realm,
|
81
83
|
'krb5_conf': value.krb5Conf,
|
84
|
+
'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
|
82
85
|
'sync_users': value.syncUsers,
|
83
86
|
'sync_users_password': value.syncUsersPassword,
|
84
87
|
'sync_principal': value.syncPrincipal,
|
@@ -10,6 +10,7 @@
|
|
10
10
|
* Do not edit the class manually.
|
11
11
|
*/
|
12
12
|
import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
|
13
|
+
import type { KadminTypeEnum } from './KadminTypeEnum';
|
13
14
|
import type { PolicyEngineMode } from './PolicyEngineMode';
|
14
15
|
import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
|
15
16
|
/**
|
@@ -96,6 +97,12 @@ export interface PatchedKerberosSourceRequest {
|
|
96
97
|
* @memberof PatchedKerberosSourceRequest
|
97
98
|
*/
|
98
99
|
krb5Conf?: string;
|
100
|
+
/**
|
101
|
+
*
|
102
|
+
* @type {KadminTypeEnum}
|
103
|
+
* @memberof PatchedKerberosSourceRequest
|
104
|
+
*/
|
105
|
+
kadminType?: KadminTypeEnum;
|
99
106
|
/**
|
100
107
|
* Sync users from Kerberos into authentik
|
101
108
|
* @type {boolean}
|
@@ -13,6 +13,7 @@
|
|
13
13
|
*/
|
14
14
|
import { exists } from '../runtime';
|
15
15
|
import { GroupMatchingModeEnumFromJSON, GroupMatchingModeEnumToJSON, } from './GroupMatchingModeEnum';
|
16
|
+
import { KadminTypeEnumFromJSON, KadminTypeEnumToJSON, } from './KadminTypeEnum';
|
16
17
|
import { PolicyEngineModeFromJSON, PolicyEngineModeToJSON, } from './PolicyEngineMode';
|
17
18
|
import { UserMatchingModeEnumFromJSON, UserMatchingModeEnumToJSON, } from './UserMatchingModeEnum';
|
18
19
|
/**
|
@@ -43,6 +44,7 @@ export function PatchedKerberosSourceRequestFromJSONTyped(json, ignoreDiscrimina
|
|
43
44
|
'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
|
44
45
|
'realm': !exists(json, 'realm') ? undefined : json['realm'],
|
45
46
|
'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
|
47
|
+
'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
|
46
48
|
'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
|
47
49
|
'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
|
48
50
|
'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
|
@@ -76,6 +78,7 @@ export function PatchedKerberosSourceRequestToJSON(value) {
|
|
76
78
|
'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
|
77
79
|
'realm': value.realm,
|
78
80
|
'krb5_conf': value.krb5Conf,
|
81
|
+
'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
|
79
82
|
'sync_users': value.syncUsers,
|
80
83
|
'sync_users_password': value.syncUsersPassword,
|
81
84
|
'sync_principal': value.syncPrincipal,
|
@@ -182,6 +182,7 @@ export * from './InvitationRequest';
|
|
182
182
|
export * from './InvitationStage';
|
183
183
|
export * from './InvitationStageRequest';
|
184
184
|
export * from './IssuerModeEnum';
|
185
|
+
export * from './KadminTypeEnum';
|
185
186
|
export * from './KerberosSource';
|
186
187
|
export * from './KerberosSourcePropertyMapping';
|
187
188
|
export * from './KerberosSourcePropertyMappingRequest';
|
package/dist/esm/models/index.js
CHANGED
@@ -184,6 +184,7 @@ export * from './InvitationRequest';
|
|
184
184
|
export * from './InvitationStage';
|
185
185
|
export * from './InvitationStageRequest';
|
186
186
|
export * from './IssuerModeEnum';
|
187
|
+
export * from './KadminTypeEnum';
|
187
188
|
export * from './KerberosSource';
|
188
189
|
export * from './KerberosSourcePropertyMapping';
|
189
190
|
export * from './KerberosSourcePropertyMappingRequest';
|
@@ -0,0 +1,25 @@
|
|
1
|
+
/**
|
2
|
+
* authentik
|
3
|
+
* Making authentication simple.
|
4
|
+
*
|
5
|
+
* The version of the OpenAPI document: 2024.10.5
|
6
|
+
* Contact: hello@goauthentik.io
|
7
|
+
*
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
9
|
+
* https://openapi-generator.tech
|
10
|
+
* Do not edit the class manually.
|
11
|
+
*/
|
12
|
+
/**
|
13
|
+
*
|
14
|
+
* @export
|
15
|
+
*/
|
16
|
+
export declare const KadminTypeEnum: {
|
17
|
+
readonly Mit: "MIT";
|
18
|
+
readonly Heimdal: "Heimdal";
|
19
|
+
readonly Other: "other";
|
20
|
+
readonly UnknownDefaultOpenApi: "11184809";
|
21
|
+
};
|
22
|
+
export type KadminTypeEnum = typeof KadminTypeEnum[keyof typeof KadminTypeEnum];
|
23
|
+
export declare function KadminTypeEnumFromJSON(json: any): KadminTypeEnum;
|
24
|
+
export declare function KadminTypeEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): KadminTypeEnum;
|
25
|
+
export declare function KadminTypeEnumToJSON(value?: KadminTypeEnum | null): any;
|
@@ -0,0 +1,38 @@
|
|
1
|
+
"use strict";
|
2
|
+
/* tslint:disable */
|
3
|
+
/* eslint-disable */
|
4
|
+
/**
|
5
|
+
* authentik
|
6
|
+
* Making authentication simple.
|
7
|
+
*
|
8
|
+
* The version of the OpenAPI document: 2024.10.5
|
9
|
+
* Contact: hello@goauthentik.io
|
10
|
+
*
|
11
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
12
|
+
* https://openapi-generator.tech
|
13
|
+
* Do not edit the class manually.
|
14
|
+
*/
|
15
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
16
|
+
exports.KadminTypeEnumToJSON = exports.KadminTypeEnumFromJSONTyped = exports.KadminTypeEnumFromJSON = exports.KadminTypeEnum = void 0;
|
17
|
+
/**
|
18
|
+
*
|
19
|
+
* @export
|
20
|
+
*/
|
21
|
+
exports.KadminTypeEnum = {
|
22
|
+
Mit: 'MIT',
|
23
|
+
Heimdal: 'Heimdal',
|
24
|
+
Other: 'other',
|
25
|
+
UnknownDefaultOpenApi: '11184809'
|
26
|
+
};
|
27
|
+
function KadminTypeEnumFromJSON(json) {
|
28
|
+
return KadminTypeEnumFromJSONTyped(json, false);
|
29
|
+
}
|
30
|
+
exports.KadminTypeEnumFromJSON = KadminTypeEnumFromJSON;
|
31
|
+
function KadminTypeEnumFromJSONTyped(json, ignoreDiscriminator) {
|
32
|
+
return json;
|
33
|
+
}
|
34
|
+
exports.KadminTypeEnumFromJSONTyped = KadminTypeEnumFromJSONTyped;
|
35
|
+
function KadminTypeEnumToJSON(value) {
|
36
|
+
return value;
|
37
|
+
}
|
38
|
+
exports.KadminTypeEnumToJSON = KadminTypeEnumToJSON;
|
@@ -10,6 +10,7 @@
|
|
10
10
|
* Do not edit the class manually.
|
11
11
|
*/
|
12
12
|
import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
|
13
|
+
import type { KadminTypeEnum } from './KadminTypeEnum';
|
13
14
|
import type { PolicyEngineMode } from './PolicyEngineMode';
|
14
15
|
import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
|
15
16
|
/**
|
@@ -138,6 +139,12 @@ export interface KerberosSource {
|
|
138
139
|
* @memberof KerberosSource
|
139
140
|
*/
|
140
141
|
krb5Conf?: string;
|
142
|
+
/**
|
143
|
+
*
|
144
|
+
* @type {KadminTypeEnum}
|
145
|
+
* @memberof KerberosSource
|
146
|
+
*/
|
147
|
+
kadminType?: KadminTypeEnum;
|
141
148
|
/**
|
142
149
|
* Sync users from Kerberos into authentik
|
143
150
|
* @type {boolean}
|
@@ -16,6 +16,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
16
|
exports.KerberosSourceToJSON = exports.KerberosSourceFromJSONTyped = exports.KerberosSourceFromJSON = exports.instanceOfKerberosSource = void 0;
|
17
17
|
const runtime_1 = require("../runtime");
|
18
18
|
const GroupMatchingModeEnum_1 = require("./GroupMatchingModeEnum");
|
19
|
+
const KadminTypeEnum_1 = require("./KadminTypeEnum");
|
19
20
|
const PolicyEngineMode_1 = require("./PolicyEngineMode");
|
20
21
|
const UserMatchingModeEnum_1 = require("./UserMatchingModeEnum");
|
21
22
|
/**
|
@@ -66,6 +67,7 @@ function KerberosSourceFromJSONTyped(json, ignoreDiscriminator) {
|
|
66
67
|
'groupMatchingMode': !(0, runtime_1.exists)(json, 'group_matching_mode') ? undefined : (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumFromJSON)(json['group_matching_mode']),
|
67
68
|
'realm': json['realm'],
|
68
69
|
'krb5Conf': !(0, runtime_1.exists)(json, 'krb5_conf') ? undefined : json['krb5_conf'],
|
70
|
+
'kadminType': !(0, runtime_1.exists)(json, 'kadmin_type') ? undefined : (0, KadminTypeEnum_1.KadminTypeEnumFromJSON)(json['kadmin_type']),
|
69
71
|
'syncUsers': !(0, runtime_1.exists)(json, 'sync_users') ? undefined : json['sync_users'],
|
70
72
|
'syncUsersPassword': !(0, runtime_1.exists)(json, 'sync_users_password') ? undefined : json['sync_users_password'],
|
71
73
|
'syncPrincipal': !(0, runtime_1.exists)(json, 'sync_principal') ? undefined : json['sync_principal'],
|
@@ -98,6 +100,7 @@ function KerberosSourceToJSON(value) {
|
|
98
100
|
'group_matching_mode': (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumToJSON)(value.groupMatchingMode),
|
99
101
|
'realm': value.realm,
|
100
102
|
'krb5_conf': value.krb5Conf,
|
103
|
+
'kadmin_type': (0, KadminTypeEnum_1.KadminTypeEnumToJSON)(value.kadminType),
|
101
104
|
'sync_users': value.syncUsers,
|
102
105
|
'sync_users_password': value.syncUsersPassword,
|
103
106
|
'sync_principal': value.syncPrincipal,
|
@@ -10,6 +10,7 @@
|
|
10
10
|
* Do not edit the class manually.
|
11
11
|
*/
|
12
12
|
import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
|
13
|
+
import type { KadminTypeEnum } from './KadminTypeEnum';
|
13
14
|
import type { PolicyEngineMode } from './PolicyEngineMode';
|
14
15
|
import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
|
15
16
|
/**
|
@@ -96,6 +97,12 @@ export interface KerberosSourceRequest {
|
|
96
97
|
* @memberof KerberosSourceRequest
|
97
98
|
*/
|
98
99
|
krb5Conf?: string;
|
100
|
+
/**
|
101
|
+
*
|
102
|
+
* @type {KadminTypeEnum}
|
103
|
+
* @memberof KerberosSourceRequest
|
104
|
+
*/
|
105
|
+
kadminType?: KadminTypeEnum;
|
99
106
|
/**
|
100
107
|
* Sync users from Kerberos into authentik
|
101
108
|
* @type {boolean}
|
@@ -16,6 +16,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
16
|
exports.KerberosSourceRequestToJSON = exports.KerberosSourceRequestFromJSONTyped = exports.KerberosSourceRequestFromJSON = exports.instanceOfKerberosSourceRequest = void 0;
|
17
17
|
const runtime_1 = require("../runtime");
|
18
18
|
const GroupMatchingModeEnum_1 = require("./GroupMatchingModeEnum");
|
19
|
+
const KadminTypeEnum_1 = require("./KadminTypeEnum");
|
19
20
|
const PolicyEngineMode_1 = require("./PolicyEngineMode");
|
20
21
|
const UserMatchingModeEnum_1 = require("./UserMatchingModeEnum");
|
21
22
|
/**
|
@@ -51,6 +52,7 @@ function KerberosSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
51
52
|
'groupMatchingMode': !(0, runtime_1.exists)(json, 'group_matching_mode') ? undefined : (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumFromJSON)(json['group_matching_mode']),
|
52
53
|
'realm': json['realm'],
|
53
54
|
'krb5Conf': !(0, runtime_1.exists)(json, 'krb5_conf') ? undefined : json['krb5_conf'],
|
55
|
+
'kadminType': !(0, runtime_1.exists)(json, 'kadmin_type') ? undefined : (0, KadminTypeEnum_1.KadminTypeEnumFromJSON)(json['kadmin_type']),
|
54
56
|
'syncUsers': !(0, runtime_1.exists)(json, 'sync_users') ? undefined : json['sync_users'],
|
55
57
|
'syncUsersPassword': !(0, runtime_1.exists)(json, 'sync_users_password') ? undefined : json['sync_users_password'],
|
56
58
|
'syncPrincipal': !(0, runtime_1.exists)(json, 'sync_principal') ? undefined : json['sync_principal'],
|
@@ -85,6 +87,7 @@ function KerberosSourceRequestToJSON(value) {
|
|
85
87
|
'group_matching_mode': (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumToJSON)(value.groupMatchingMode),
|
86
88
|
'realm': value.realm,
|
87
89
|
'krb5_conf': value.krb5Conf,
|
90
|
+
'kadmin_type': (0, KadminTypeEnum_1.KadminTypeEnumToJSON)(value.kadminType),
|
88
91
|
'sync_users': value.syncUsers,
|
89
92
|
'sync_users_password': value.syncUsersPassword,
|
90
93
|
'sync_principal': value.syncPrincipal,
|
@@ -10,6 +10,7 @@
|
|
10
10
|
* Do not edit the class manually.
|
11
11
|
*/
|
12
12
|
import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
|
13
|
+
import type { KadminTypeEnum } from './KadminTypeEnum';
|
13
14
|
import type { PolicyEngineMode } from './PolicyEngineMode';
|
14
15
|
import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
|
15
16
|
/**
|
@@ -96,6 +97,12 @@ export interface PatchedKerberosSourceRequest {
|
|
96
97
|
* @memberof PatchedKerberosSourceRequest
|
97
98
|
*/
|
98
99
|
krb5Conf?: string;
|
100
|
+
/**
|
101
|
+
*
|
102
|
+
* @type {KadminTypeEnum}
|
103
|
+
* @memberof PatchedKerberosSourceRequest
|
104
|
+
*/
|
105
|
+
kadminType?: KadminTypeEnum;
|
99
106
|
/**
|
100
107
|
* Sync users from Kerberos into authentik
|
101
108
|
* @type {boolean}
|
@@ -16,6 +16,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
16
|
exports.PatchedKerberosSourceRequestToJSON = exports.PatchedKerberosSourceRequestFromJSONTyped = exports.PatchedKerberosSourceRequestFromJSON = exports.instanceOfPatchedKerberosSourceRequest = void 0;
|
17
17
|
const runtime_1 = require("../runtime");
|
18
18
|
const GroupMatchingModeEnum_1 = require("./GroupMatchingModeEnum");
|
19
|
+
const KadminTypeEnum_1 = require("./KadminTypeEnum");
|
19
20
|
const PolicyEngineMode_1 = require("./PolicyEngineMode");
|
20
21
|
const UserMatchingModeEnum_1 = require("./UserMatchingModeEnum");
|
21
22
|
/**
|
@@ -48,6 +49,7 @@ function PatchedKerberosSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
48
49
|
'groupMatchingMode': !(0, runtime_1.exists)(json, 'group_matching_mode') ? undefined : (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumFromJSON)(json['group_matching_mode']),
|
49
50
|
'realm': !(0, runtime_1.exists)(json, 'realm') ? undefined : json['realm'],
|
50
51
|
'krb5Conf': !(0, runtime_1.exists)(json, 'krb5_conf') ? undefined : json['krb5_conf'],
|
52
|
+
'kadminType': !(0, runtime_1.exists)(json, 'kadmin_type') ? undefined : (0, KadminTypeEnum_1.KadminTypeEnumFromJSON)(json['kadmin_type']),
|
51
53
|
'syncUsers': !(0, runtime_1.exists)(json, 'sync_users') ? undefined : json['sync_users'],
|
52
54
|
'syncUsersPassword': !(0, runtime_1.exists)(json, 'sync_users_password') ? undefined : json['sync_users_password'],
|
53
55
|
'syncPrincipal': !(0, runtime_1.exists)(json, 'sync_principal') ? undefined : json['sync_principal'],
|
@@ -82,6 +84,7 @@ function PatchedKerberosSourceRequestToJSON(value) {
|
|
82
84
|
'group_matching_mode': (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumToJSON)(value.groupMatchingMode),
|
83
85
|
'realm': value.realm,
|
84
86
|
'krb5_conf': value.krb5Conf,
|
87
|
+
'kadmin_type': (0, KadminTypeEnum_1.KadminTypeEnumToJSON)(value.kadminType),
|
85
88
|
'sync_users': value.syncUsers,
|
86
89
|
'sync_users_password': value.syncUsersPassword,
|
87
90
|
'sync_principal': value.syncPrincipal,
|
package/dist/models/index.d.ts
CHANGED
@@ -182,6 +182,7 @@ export * from './InvitationRequest';
|
|
182
182
|
export * from './InvitationStage';
|
183
183
|
export * from './InvitationStageRequest';
|
184
184
|
export * from './IssuerModeEnum';
|
185
|
+
export * from './KadminTypeEnum';
|
185
186
|
export * from './KerberosSource';
|
186
187
|
export * from './KerberosSourcePropertyMapping';
|
187
188
|
export * from './KerberosSourcePropertyMappingRequest';
|
package/dist/models/index.js
CHANGED
@@ -200,6 +200,7 @@ __exportStar(require("./InvitationRequest"), exports);
|
|
200
200
|
__exportStar(require("./InvitationStage"), exports);
|
201
201
|
__exportStar(require("./InvitationStageRequest"), exports);
|
202
202
|
__exportStar(require("./IssuerModeEnum"), exports);
|
203
|
+
__exportStar(require("./KadminTypeEnum"), exports);
|
203
204
|
__exportStar(require("./KerberosSource"), exports);
|
204
205
|
__exportStar(require("./KerberosSourcePropertyMapping"), exports);
|
205
206
|
__exportStar(require("./KerberosSourcePropertyMappingRequest"), exports);
|
package/package.json
CHANGED
package/src/apis/SourcesApi.ts
CHANGED
@@ -397,6 +397,7 @@ export interface SourcesKerberosDestroyRequest {
|
|
397
397
|
|
398
398
|
export interface SourcesKerberosListRequest {
|
399
399
|
enabled?: boolean;
|
400
|
+
kadminType?: SourcesKerberosListKadminTypeEnum;
|
400
401
|
name?: string;
|
401
402
|
ordering?: string;
|
402
403
|
page?: number;
|
@@ -2433,6 +2434,10 @@ export class SourcesApi extends runtime.BaseAPI {
|
|
2433
2434
|
queryParameters['enabled'] = requestParameters.enabled;
|
2434
2435
|
}
|
2435
2436
|
|
2437
|
+
if (requestParameters.kadminType !== undefined) {
|
2438
|
+
queryParameters['kadmin_type'] = requestParameters.kadminType;
|
2439
|
+
}
|
2440
|
+
|
2436
2441
|
if (requestParameters.name !== undefined) {
|
2437
2442
|
queryParameters['name'] = requestParameters.name;
|
2438
2443
|
}
|
@@ -6725,6 +6730,16 @@ export class SourcesApi extends runtime.BaseAPI {
|
|
6725
6730
|
|
6726
6731
|
}
|
6727
6732
|
|
6733
|
+
/**
|
6734
|
+
* @export
|
6735
|
+
*/
|
6736
|
+
export const SourcesKerberosListKadminTypeEnum = {
|
6737
|
+
Heimdal: 'Heimdal',
|
6738
|
+
Mit: 'MIT',
|
6739
|
+
Other: 'other',
|
6740
|
+
UnknownDefaultOpenApi: '11184809'
|
6741
|
+
} as const;
|
6742
|
+
export type SourcesKerberosListKadminTypeEnum = typeof SourcesKerberosListKadminTypeEnum[keyof typeof SourcesKerberosListKadminTypeEnum];
|
6728
6743
|
/**
|
6729
6744
|
* @export
|
6730
6745
|
*/
|
@@ -0,0 +1,40 @@
|
|
1
|
+
/* tslint:disable */
|
2
|
+
/* eslint-disable */
|
3
|
+
/**
|
4
|
+
* authentik
|
5
|
+
* Making authentication simple.
|
6
|
+
*
|
7
|
+
* The version of the OpenAPI document: 2024.10.5
|
8
|
+
* Contact: hello@goauthentik.io
|
9
|
+
*
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
11
|
+
* https://openapi-generator.tech
|
12
|
+
* Do not edit the class manually.
|
13
|
+
*/
|
14
|
+
|
15
|
+
|
16
|
+
/**
|
17
|
+
*
|
18
|
+
* @export
|
19
|
+
*/
|
20
|
+
export const KadminTypeEnum = {
|
21
|
+
Mit: 'MIT',
|
22
|
+
Heimdal: 'Heimdal',
|
23
|
+
Other: 'other',
|
24
|
+
UnknownDefaultOpenApi: '11184809'
|
25
|
+
} as const;
|
26
|
+
export type KadminTypeEnum = typeof KadminTypeEnum[keyof typeof KadminTypeEnum];
|
27
|
+
|
28
|
+
|
29
|
+
export function KadminTypeEnumFromJSON(json: any): KadminTypeEnum {
|
30
|
+
return KadminTypeEnumFromJSONTyped(json, false);
|
31
|
+
}
|
32
|
+
|
33
|
+
export function KadminTypeEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): KadminTypeEnum {
|
34
|
+
return json as KadminTypeEnum;
|
35
|
+
}
|
36
|
+
|
37
|
+
export function KadminTypeEnumToJSON(value?: KadminTypeEnum | null): any {
|
38
|
+
return value as any;
|
39
|
+
}
|
40
|
+
|
@@ -19,6 +19,12 @@ import {
|
|
19
19
|
GroupMatchingModeEnumFromJSONTyped,
|
20
20
|
GroupMatchingModeEnumToJSON,
|
21
21
|
} from './GroupMatchingModeEnum';
|
22
|
+
import type { KadminTypeEnum } from './KadminTypeEnum';
|
23
|
+
import {
|
24
|
+
KadminTypeEnumFromJSON,
|
25
|
+
KadminTypeEnumFromJSONTyped,
|
26
|
+
KadminTypeEnumToJSON,
|
27
|
+
} from './KadminTypeEnum';
|
22
28
|
import type { PolicyEngineMode } from './PolicyEngineMode';
|
23
29
|
import {
|
24
30
|
PolicyEngineModeFromJSON,
|
@@ -158,6 +164,12 @@ export interface KerberosSource {
|
|
158
164
|
* @memberof KerberosSource
|
159
165
|
*/
|
160
166
|
krb5Conf?: string;
|
167
|
+
/**
|
168
|
+
*
|
169
|
+
* @type {KadminTypeEnum}
|
170
|
+
* @memberof KerberosSource
|
171
|
+
*/
|
172
|
+
kadminType?: KadminTypeEnum;
|
161
173
|
/**
|
162
174
|
* Sync users from Kerberos into authentik
|
163
175
|
* @type {boolean}
|
@@ -258,6 +270,7 @@ export function KerberosSourceFromJSONTyped(json: any, ignoreDiscriminator: bool
|
|
258
270
|
'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
|
259
271
|
'realm': json['realm'],
|
260
272
|
'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
|
273
|
+
'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
|
261
274
|
'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
|
262
275
|
'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
|
263
276
|
'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
|
@@ -291,6 +304,7 @@ export function KerberosSourceToJSON(value?: KerberosSource | null): any {
|
|
291
304
|
'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
|
292
305
|
'realm': value.realm,
|
293
306
|
'krb5_conf': value.krb5Conf,
|
307
|
+
'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
|
294
308
|
'sync_users': value.syncUsers,
|
295
309
|
'sync_users_password': value.syncUsersPassword,
|
296
310
|
'sync_principal': value.syncPrincipal,
|
@@ -19,6 +19,12 @@ import {
|
|
19
19
|
GroupMatchingModeEnumFromJSONTyped,
|
20
20
|
GroupMatchingModeEnumToJSON,
|
21
21
|
} from './GroupMatchingModeEnum';
|
22
|
+
import type { KadminTypeEnum } from './KadminTypeEnum';
|
23
|
+
import {
|
24
|
+
KadminTypeEnumFromJSON,
|
25
|
+
KadminTypeEnumFromJSONTyped,
|
26
|
+
KadminTypeEnumToJSON,
|
27
|
+
} from './KadminTypeEnum';
|
22
28
|
import type { PolicyEngineMode } from './PolicyEngineMode';
|
23
29
|
import {
|
24
30
|
PolicyEngineModeFromJSON,
|
@@ -116,6 +122,12 @@ export interface KerberosSourceRequest {
|
|
116
122
|
* @memberof KerberosSourceRequest
|
117
123
|
*/
|
118
124
|
krb5Conf?: string;
|
125
|
+
/**
|
126
|
+
*
|
127
|
+
* @type {KadminTypeEnum}
|
128
|
+
* @memberof KerberosSourceRequest
|
129
|
+
*/
|
130
|
+
kadminType?: KadminTypeEnum;
|
119
131
|
/**
|
120
132
|
* Sync users from Kerberos into authentik
|
121
133
|
* @type {boolean}
|
@@ -213,6 +225,7 @@ export function KerberosSourceRequestFromJSONTyped(json: any, ignoreDiscriminato
|
|
213
225
|
'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
|
214
226
|
'realm': json['realm'],
|
215
227
|
'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
|
228
|
+
'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
|
216
229
|
'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
|
217
230
|
'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
|
218
231
|
'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
|
@@ -248,6 +261,7 @@ export function KerberosSourceRequestToJSON(value?: KerberosSourceRequest | null
|
|
248
261
|
'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
|
249
262
|
'realm': value.realm,
|
250
263
|
'krb5_conf': value.krb5Conf,
|
264
|
+
'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
|
251
265
|
'sync_users': value.syncUsers,
|
252
266
|
'sync_users_password': value.syncUsersPassword,
|
253
267
|
'sync_principal': value.syncPrincipal,
|
@@ -19,6 +19,12 @@ import {
|
|
19
19
|
GroupMatchingModeEnumFromJSONTyped,
|
20
20
|
GroupMatchingModeEnumToJSON,
|
21
21
|
} from './GroupMatchingModeEnum';
|
22
|
+
import type { KadminTypeEnum } from './KadminTypeEnum';
|
23
|
+
import {
|
24
|
+
KadminTypeEnumFromJSON,
|
25
|
+
KadminTypeEnumFromJSONTyped,
|
26
|
+
KadminTypeEnumToJSON,
|
27
|
+
} from './KadminTypeEnum';
|
22
28
|
import type { PolicyEngineMode } from './PolicyEngineMode';
|
23
29
|
import {
|
24
30
|
PolicyEngineModeFromJSON,
|
@@ -116,6 +122,12 @@ export interface PatchedKerberosSourceRequest {
|
|
116
122
|
* @memberof PatchedKerberosSourceRequest
|
117
123
|
*/
|
118
124
|
krb5Conf?: string;
|
125
|
+
/**
|
126
|
+
*
|
127
|
+
* @type {KadminTypeEnum}
|
128
|
+
* @memberof PatchedKerberosSourceRequest
|
129
|
+
*/
|
130
|
+
kadminType?: KadminTypeEnum;
|
119
131
|
/**
|
120
132
|
* Sync users from Kerberos into authentik
|
121
133
|
* @type {boolean}
|
@@ -210,6 +222,7 @@ export function PatchedKerberosSourceRequestFromJSONTyped(json: any, ignoreDiscr
|
|
210
222
|
'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
|
211
223
|
'realm': !exists(json, 'realm') ? undefined : json['realm'],
|
212
224
|
'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
|
225
|
+
'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
|
213
226
|
'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
|
214
227
|
'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
|
215
228
|
'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
|
@@ -245,6 +258,7 @@ export function PatchedKerberosSourceRequestToJSON(value?: PatchedKerberosSource
|
|
245
258
|
'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
|
246
259
|
'realm': value.realm,
|
247
260
|
'krb5_conf': value.krb5Conf,
|
261
|
+
'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
|
248
262
|
'sync_users': value.syncUsers,
|
249
263
|
'sync_users_password': value.syncUsersPassword,
|
250
264
|
'sync_principal': value.syncPrincipal,
|
package/src/models/index.ts
CHANGED
@@ -184,6 +184,7 @@ export * from './InvitationRequest';
|
|
184
184
|
export * from './InvitationStage';
|
185
185
|
export * from './InvitationStageRequest';
|
186
186
|
export * from './IssuerModeEnum';
|
187
|
+
export * from './KadminTypeEnum';
|
187
188
|
export * from './KerberosSource';
|
188
189
|
export * from './KerberosSourcePropertyMapping';
|
189
190
|
export * from './KerberosSourcePropertyMappingRequest';
|