@goauthentik/api 2024.10.5-1733854821 → 2024.10.5-1734006367

Sign up to get free protection for your applications and to get access to all the features.
Files changed (32) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/SourcesApi.d.ts +11 -0
  3. package/dist/apis/SourcesApi.js +13 -1
  4. package/dist/esm/apis/SourcesApi.d.ts +11 -0
  5. package/dist/esm/apis/SourcesApi.js +12 -0
  6. package/dist/esm/models/KadminTypeEnum.d.ts +25 -0
  7. package/dist/esm/models/KadminTypeEnum.js +32 -0
  8. package/dist/esm/models/KerberosSource.d.ts +7 -0
  9. package/dist/esm/models/KerberosSource.js +3 -0
  10. package/dist/esm/models/KerberosSourceRequest.d.ts +7 -0
  11. package/dist/esm/models/KerberosSourceRequest.js +3 -0
  12. package/dist/esm/models/PatchedKerberosSourceRequest.d.ts +7 -0
  13. package/dist/esm/models/PatchedKerberosSourceRequest.js +3 -0
  14. package/dist/esm/models/index.d.ts +1 -0
  15. package/dist/esm/models/index.js +1 -0
  16. package/dist/models/KadminTypeEnum.d.ts +25 -0
  17. package/dist/models/KadminTypeEnum.js +38 -0
  18. package/dist/models/KerberosSource.d.ts +7 -0
  19. package/dist/models/KerberosSource.js +3 -0
  20. package/dist/models/KerberosSourceRequest.d.ts +7 -0
  21. package/dist/models/KerberosSourceRequest.js +3 -0
  22. package/dist/models/PatchedKerberosSourceRequest.d.ts +7 -0
  23. package/dist/models/PatchedKerberosSourceRequest.js +3 -0
  24. package/dist/models/index.d.ts +1 -0
  25. package/dist/models/index.js +1 -0
  26. package/package.json +1 -1
  27. package/src/apis/SourcesApi.ts +15 -0
  28. package/src/models/KadminTypeEnum.ts +40 -0
  29. package/src/models/KerberosSource.ts +14 -0
  30. package/src/models/KerberosSourceRequest.ts +14 -0
  31. package/src/models/PatchedKerberosSourceRequest.ts +14 -0
  32. package/src/models/index.ts +1 -0
@@ -209,6 +209,7 @@ src/models/InvitationRequest.ts
209
209
  src/models/InvitationStage.ts
210
210
  src/models/InvitationStageRequest.ts
211
211
  src/models/IssuerModeEnum.ts
212
+ src/models/KadminTypeEnum.ts
212
213
  src/models/KerberosSource.ts
213
214
  src/models/KerberosSourcePropertyMapping.ts
214
215
  src/models/KerberosSourcePropertyMappingRequest.ts
@@ -138,6 +138,7 @@ export interface SourcesKerberosDestroyRequest {
138
138
  }
139
139
  export interface SourcesKerberosListRequest {
140
140
  enabled?: boolean;
141
+ kadminType?: SourcesKerberosListKadminTypeEnum;
141
142
  name?: string;
142
143
  ordering?: string;
143
144
  page?: number;
@@ -1634,6 +1635,16 @@ export declare class SourcesApi extends runtime.BaseAPI {
1634
1635
  */
1635
1636
  sourcesUserConnectionsSamlUsedByList(requestParameters: SourcesUserConnectionsSamlUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
1636
1637
  }
1638
+ /**
1639
+ * @export
1640
+ */
1641
+ export declare const SourcesKerberosListKadminTypeEnum: {
1642
+ readonly Heimdal: "Heimdal";
1643
+ readonly Mit: "MIT";
1644
+ readonly Other: "other";
1645
+ readonly UnknownDefaultOpenApi: "11184809";
1646
+ };
1647
+ export type SourcesKerberosListKadminTypeEnum = typeof SourcesKerberosListKadminTypeEnum[keyof typeof SourcesKerberosListKadminTypeEnum];
1637
1648
  /**
1638
1649
  * @export
1639
1650
  */
@@ -22,7 +22,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
22
22
  });
23
23
  };
24
24
  Object.defineProperty(exports, "__esModule", { value: true });
25
- exports.SourcesSamlListUserMatchingModeEnum = exports.SourcesSamlListSignatureAlgorithmEnum = exports.SourcesSamlListPolicyEngineModeEnum = exports.SourcesSamlListNameIdPolicyEnum = exports.SourcesSamlListDigestAlgorithmEnum = exports.SourcesSamlListBindingTypeEnum = exports.SourcesPlexListUserMatchingModeEnum = exports.SourcesPlexListPolicyEngineModeEnum = exports.SourcesPlexListGroupMatchingModeEnum = exports.SourcesOauthListUserMatchingModeEnum = exports.SourcesOauthListPolicyEngineModeEnum = exports.SourcesOauthListGroupMatchingModeEnum = exports.SourcesApi = void 0;
25
+ exports.SourcesSamlListUserMatchingModeEnum = exports.SourcesSamlListSignatureAlgorithmEnum = exports.SourcesSamlListPolicyEngineModeEnum = exports.SourcesSamlListNameIdPolicyEnum = exports.SourcesSamlListDigestAlgorithmEnum = exports.SourcesSamlListBindingTypeEnum = exports.SourcesPlexListUserMatchingModeEnum = exports.SourcesPlexListPolicyEngineModeEnum = exports.SourcesPlexListGroupMatchingModeEnum = exports.SourcesOauthListUserMatchingModeEnum = exports.SourcesOauthListPolicyEngineModeEnum = exports.SourcesOauthListGroupMatchingModeEnum = exports.SourcesKerberosListKadminTypeEnum = exports.SourcesApi = void 0;
26
26
  const runtime = require("../runtime");
27
27
  const models_1 = require("../models");
28
28
  /**
@@ -1385,6 +1385,9 @@ class SourcesApi extends runtime.BaseAPI {
1385
1385
  if (requestParameters.enabled !== undefined) {
1386
1386
  queryParameters['enabled'] = requestParameters.enabled;
1387
1387
  }
1388
+ if (requestParameters.kadminType !== undefined) {
1389
+ queryParameters['kadmin_type'] = requestParameters.kadminType;
1390
+ }
1388
1391
  if (requestParameters.name !== undefined) {
1389
1392
  queryParameters['name'] = requestParameters.name;
1390
1393
  }
@@ -5208,6 +5211,15 @@ class SourcesApi extends runtime.BaseAPI {
5208
5211
  }
5209
5212
  }
5210
5213
  exports.SourcesApi = SourcesApi;
5214
+ /**
5215
+ * @export
5216
+ */
5217
+ exports.SourcesKerberosListKadminTypeEnum = {
5218
+ Heimdal: 'Heimdal',
5219
+ Mit: 'MIT',
5220
+ Other: 'other',
5221
+ UnknownDefaultOpenApi: '11184809'
5222
+ };
5211
5223
  /**
5212
5224
  * @export
5213
5225
  */
@@ -138,6 +138,7 @@ export interface SourcesKerberosDestroyRequest {
138
138
  }
139
139
  export interface SourcesKerberosListRequest {
140
140
  enabled?: boolean;
141
+ kadminType?: SourcesKerberosListKadminTypeEnum;
141
142
  name?: string;
142
143
  ordering?: string;
143
144
  page?: number;
@@ -1634,6 +1635,16 @@ export declare class SourcesApi extends runtime.BaseAPI {
1634
1635
  */
1635
1636
  sourcesUserConnectionsSamlUsedByList(requestParameters: SourcesUserConnectionsSamlUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
1636
1637
  }
1638
+ /**
1639
+ * @export
1640
+ */
1641
+ export declare const SourcesKerberosListKadminTypeEnum: {
1642
+ readonly Heimdal: "Heimdal";
1643
+ readonly Mit: "MIT";
1644
+ readonly Other: "other";
1645
+ readonly UnknownDefaultOpenApi: "11184809";
1646
+ };
1647
+ export type SourcesKerberosListKadminTypeEnum = typeof SourcesKerberosListKadminTypeEnum[keyof typeof SourcesKerberosListKadminTypeEnum];
1637
1648
  /**
1638
1649
  * @export
1639
1650
  */
@@ -1382,6 +1382,9 @@ export class SourcesApi extends runtime.BaseAPI {
1382
1382
  if (requestParameters.enabled !== undefined) {
1383
1383
  queryParameters['enabled'] = requestParameters.enabled;
1384
1384
  }
1385
+ if (requestParameters.kadminType !== undefined) {
1386
+ queryParameters['kadmin_type'] = requestParameters.kadminType;
1387
+ }
1385
1388
  if (requestParameters.name !== undefined) {
1386
1389
  queryParameters['name'] = requestParameters.name;
1387
1390
  }
@@ -5204,6 +5207,15 @@ export class SourcesApi extends runtime.BaseAPI {
5204
5207
  });
5205
5208
  }
5206
5209
  }
5210
+ /**
5211
+ * @export
5212
+ */
5213
+ export const SourcesKerberosListKadminTypeEnum = {
5214
+ Heimdal: 'Heimdal',
5215
+ Mit: 'MIT',
5216
+ Other: 'other',
5217
+ UnknownDefaultOpenApi: '11184809'
5218
+ };
5207
5219
  /**
5208
5220
  * @export
5209
5221
  */
@@ -0,0 +1,25 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.10.5
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ *
14
+ * @export
15
+ */
16
+ export declare const KadminTypeEnum: {
17
+ readonly Mit: "MIT";
18
+ readonly Heimdal: "Heimdal";
19
+ readonly Other: "other";
20
+ readonly UnknownDefaultOpenApi: "11184809";
21
+ };
22
+ export type KadminTypeEnum = typeof KadminTypeEnum[keyof typeof KadminTypeEnum];
23
+ export declare function KadminTypeEnumFromJSON(json: any): KadminTypeEnum;
24
+ export declare function KadminTypeEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): KadminTypeEnum;
25
+ export declare function KadminTypeEnumToJSON(value?: KadminTypeEnum | null): any;
@@ -0,0 +1,32 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.10.5
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ /**
15
+ *
16
+ * @export
17
+ */
18
+ export const KadminTypeEnum = {
19
+ Mit: 'MIT',
20
+ Heimdal: 'Heimdal',
21
+ Other: 'other',
22
+ UnknownDefaultOpenApi: '11184809'
23
+ };
24
+ export function KadminTypeEnumFromJSON(json) {
25
+ return KadminTypeEnumFromJSONTyped(json, false);
26
+ }
27
+ export function KadminTypeEnumFromJSONTyped(json, ignoreDiscriminator) {
28
+ return json;
29
+ }
30
+ export function KadminTypeEnumToJSON(value) {
31
+ return value;
32
+ }
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -138,6 +139,12 @@ export interface KerberosSource {
138
139
  * @memberof KerberosSource
139
140
  */
140
141
  krb5Conf?: string;
142
+ /**
143
+ *
144
+ * @type {KadminTypeEnum}
145
+ * @memberof KerberosSource
146
+ */
147
+ kadminType?: KadminTypeEnum;
141
148
  /**
142
149
  * Sync users from Kerberos into authentik
143
150
  * @type {boolean}
@@ -13,6 +13,7 @@
13
13
  */
14
14
  import { exists } from '../runtime';
15
15
  import { GroupMatchingModeEnumFromJSON, GroupMatchingModeEnumToJSON, } from './GroupMatchingModeEnum';
16
+ import { KadminTypeEnumFromJSON, KadminTypeEnumToJSON, } from './KadminTypeEnum';
16
17
  import { PolicyEngineModeFromJSON, PolicyEngineModeToJSON, } from './PolicyEngineMode';
17
18
  import { UserMatchingModeEnumFromJSON, UserMatchingModeEnumToJSON, } from './UserMatchingModeEnum';
18
19
  /**
@@ -61,6 +62,7 @@ export function KerberosSourceFromJSONTyped(json, ignoreDiscriminator) {
61
62
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
62
63
  'realm': json['realm'],
63
64
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
65
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
64
66
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
65
67
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
66
68
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -92,6 +94,7 @@ export function KerberosSourceToJSON(value) {
92
94
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
93
95
  'realm': value.realm,
94
96
  'krb5_conf': value.krb5Conf,
97
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
95
98
  'sync_users': value.syncUsers,
96
99
  'sync_users_password': value.syncUsersPassword,
97
100
  'sync_principal': value.syncPrincipal,
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -96,6 +97,12 @@ export interface KerberosSourceRequest {
96
97
  * @memberof KerberosSourceRequest
97
98
  */
98
99
  krb5Conf?: string;
100
+ /**
101
+ *
102
+ * @type {KadminTypeEnum}
103
+ * @memberof KerberosSourceRequest
104
+ */
105
+ kadminType?: KadminTypeEnum;
99
106
  /**
100
107
  * Sync users from Kerberos into authentik
101
108
  * @type {boolean}
@@ -13,6 +13,7 @@
13
13
  */
14
14
  import { exists } from '../runtime';
15
15
  import { GroupMatchingModeEnumFromJSON, GroupMatchingModeEnumToJSON, } from './GroupMatchingModeEnum';
16
+ import { KadminTypeEnumFromJSON, KadminTypeEnumToJSON, } from './KadminTypeEnum';
16
17
  import { PolicyEngineModeFromJSON, PolicyEngineModeToJSON, } from './PolicyEngineMode';
17
18
  import { UserMatchingModeEnumFromJSON, UserMatchingModeEnumToJSON, } from './UserMatchingModeEnum';
18
19
  /**
@@ -46,6 +47,7 @@ export function KerberosSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
46
47
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
47
48
  'realm': json['realm'],
48
49
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
50
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
49
51
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
50
52
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
51
53
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -79,6 +81,7 @@ export function KerberosSourceRequestToJSON(value) {
79
81
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
80
82
  'realm': value.realm,
81
83
  'krb5_conf': value.krb5Conf,
84
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
82
85
  'sync_users': value.syncUsers,
83
86
  'sync_users_password': value.syncUsersPassword,
84
87
  'sync_principal': value.syncPrincipal,
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -96,6 +97,12 @@ export interface PatchedKerberosSourceRequest {
96
97
  * @memberof PatchedKerberosSourceRequest
97
98
  */
98
99
  krb5Conf?: string;
100
+ /**
101
+ *
102
+ * @type {KadminTypeEnum}
103
+ * @memberof PatchedKerberosSourceRequest
104
+ */
105
+ kadminType?: KadminTypeEnum;
99
106
  /**
100
107
  * Sync users from Kerberos into authentik
101
108
  * @type {boolean}
@@ -13,6 +13,7 @@
13
13
  */
14
14
  import { exists } from '../runtime';
15
15
  import { GroupMatchingModeEnumFromJSON, GroupMatchingModeEnumToJSON, } from './GroupMatchingModeEnum';
16
+ import { KadminTypeEnumFromJSON, KadminTypeEnumToJSON, } from './KadminTypeEnum';
16
17
  import { PolicyEngineModeFromJSON, PolicyEngineModeToJSON, } from './PolicyEngineMode';
17
18
  import { UserMatchingModeEnumFromJSON, UserMatchingModeEnumToJSON, } from './UserMatchingModeEnum';
18
19
  /**
@@ -43,6 +44,7 @@ export function PatchedKerberosSourceRequestFromJSONTyped(json, ignoreDiscrimina
43
44
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
44
45
  'realm': !exists(json, 'realm') ? undefined : json['realm'],
45
46
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
47
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
46
48
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
47
49
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
48
50
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -76,6 +78,7 @@ export function PatchedKerberosSourceRequestToJSON(value) {
76
78
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
77
79
  'realm': value.realm,
78
80
  'krb5_conf': value.krb5Conf,
81
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
79
82
  'sync_users': value.syncUsers,
80
83
  'sync_users_password': value.syncUsersPassword,
81
84
  'sync_principal': value.syncPrincipal,
@@ -182,6 +182,7 @@ export * from './InvitationRequest';
182
182
  export * from './InvitationStage';
183
183
  export * from './InvitationStageRequest';
184
184
  export * from './IssuerModeEnum';
185
+ export * from './KadminTypeEnum';
185
186
  export * from './KerberosSource';
186
187
  export * from './KerberosSourcePropertyMapping';
187
188
  export * from './KerberosSourcePropertyMappingRequest';
@@ -184,6 +184,7 @@ export * from './InvitationRequest';
184
184
  export * from './InvitationStage';
185
185
  export * from './InvitationStageRequest';
186
186
  export * from './IssuerModeEnum';
187
+ export * from './KadminTypeEnum';
187
188
  export * from './KerberosSource';
188
189
  export * from './KerberosSourcePropertyMapping';
189
190
  export * from './KerberosSourcePropertyMappingRequest';
@@ -0,0 +1,25 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.10.5
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ *
14
+ * @export
15
+ */
16
+ export declare const KadminTypeEnum: {
17
+ readonly Mit: "MIT";
18
+ readonly Heimdal: "Heimdal";
19
+ readonly Other: "other";
20
+ readonly UnknownDefaultOpenApi: "11184809";
21
+ };
22
+ export type KadminTypeEnum = typeof KadminTypeEnum[keyof typeof KadminTypeEnum];
23
+ export declare function KadminTypeEnumFromJSON(json: any): KadminTypeEnum;
24
+ export declare function KadminTypeEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): KadminTypeEnum;
25
+ export declare function KadminTypeEnumToJSON(value?: KadminTypeEnum | null): any;
@@ -0,0 +1,38 @@
1
+ "use strict";
2
+ /* tslint:disable */
3
+ /* eslint-disable */
4
+ /**
5
+ * authentik
6
+ * Making authentication simple.
7
+ *
8
+ * The version of the OpenAPI document: 2024.10.5
9
+ * Contact: hello@goauthentik.io
10
+ *
11
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
12
+ * https://openapi-generator.tech
13
+ * Do not edit the class manually.
14
+ */
15
+ Object.defineProperty(exports, "__esModule", { value: true });
16
+ exports.KadminTypeEnumToJSON = exports.KadminTypeEnumFromJSONTyped = exports.KadminTypeEnumFromJSON = exports.KadminTypeEnum = void 0;
17
+ /**
18
+ *
19
+ * @export
20
+ */
21
+ exports.KadminTypeEnum = {
22
+ Mit: 'MIT',
23
+ Heimdal: 'Heimdal',
24
+ Other: 'other',
25
+ UnknownDefaultOpenApi: '11184809'
26
+ };
27
+ function KadminTypeEnumFromJSON(json) {
28
+ return KadminTypeEnumFromJSONTyped(json, false);
29
+ }
30
+ exports.KadminTypeEnumFromJSON = KadminTypeEnumFromJSON;
31
+ function KadminTypeEnumFromJSONTyped(json, ignoreDiscriminator) {
32
+ return json;
33
+ }
34
+ exports.KadminTypeEnumFromJSONTyped = KadminTypeEnumFromJSONTyped;
35
+ function KadminTypeEnumToJSON(value) {
36
+ return value;
37
+ }
38
+ exports.KadminTypeEnumToJSON = KadminTypeEnumToJSON;
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -138,6 +139,12 @@ export interface KerberosSource {
138
139
  * @memberof KerberosSource
139
140
  */
140
141
  krb5Conf?: string;
142
+ /**
143
+ *
144
+ * @type {KadminTypeEnum}
145
+ * @memberof KerberosSource
146
+ */
147
+ kadminType?: KadminTypeEnum;
141
148
  /**
142
149
  * Sync users from Kerberos into authentik
143
150
  * @type {boolean}
@@ -16,6 +16,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
16
16
  exports.KerberosSourceToJSON = exports.KerberosSourceFromJSONTyped = exports.KerberosSourceFromJSON = exports.instanceOfKerberosSource = void 0;
17
17
  const runtime_1 = require("../runtime");
18
18
  const GroupMatchingModeEnum_1 = require("./GroupMatchingModeEnum");
19
+ const KadminTypeEnum_1 = require("./KadminTypeEnum");
19
20
  const PolicyEngineMode_1 = require("./PolicyEngineMode");
20
21
  const UserMatchingModeEnum_1 = require("./UserMatchingModeEnum");
21
22
  /**
@@ -66,6 +67,7 @@ function KerberosSourceFromJSONTyped(json, ignoreDiscriminator) {
66
67
  'groupMatchingMode': !(0, runtime_1.exists)(json, 'group_matching_mode') ? undefined : (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumFromJSON)(json['group_matching_mode']),
67
68
  'realm': json['realm'],
68
69
  'krb5Conf': !(0, runtime_1.exists)(json, 'krb5_conf') ? undefined : json['krb5_conf'],
70
+ 'kadminType': !(0, runtime_1.exists)(json, 'kadmin_type') ? undefined : (0, KadminTypeEnum_1.KadminTypeEnumFromJSON)(json['kadmin_type']),
69
71
  'syncUsers': !(0, runtime_1.exists)(json, 'sync_users') ? undefined : json['sync_users'],
70
72
  'syncUsersPassword': !(0, runtime_1.exists)(json, 'sync_users_password') ? undefined : json['sync_users_password'],
71
73
  'syncPrincipal': !(0, runtime_1.exists)(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -98,6 +100,7 @@ function KerberosSourceToJSON(value) {
98
100
  'group_matching_mode': (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumToJSON)(value.groupMatchingMode),
99
101
  'realm': value.realm,
100
102
  'krb5_conf': value.krb5Conf,
103
+ 'kadmin_type': (0, KadminTypeEnum_1.KadminTypeEnumToJSON)(value.kadminType),
101
104
  'sync_users': value.syncUsers,
102
105
  'sync_users_password': value.syncUsersPassword,
103
106
  'sync_principal': value.syncPrincipal,
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -96,6 +97,12 @@ export interface KerberosSourceRequest {
96
97
  * @memberof KerberosSourceRequest
97
98
  */
98
99
  krb5Conf?: string;
100
+ /**
101
+ *
102
+ * @type {KadminTypeEnum}
103
+ * @memberof KerberosSourceRequest
104
+ */
105
+ kadminType?: KadminTypeEnum;
99
106
  /**
100
107
  * Sync users from Kerberos into authentik
101
108
  * @type {boolean}
@@ -16,6 +16,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
16
16
  exports.KerberosSourceRequestToJSON = exports.KerberosSourceRequestFromJSONTyped = exports.KerberosSourceRequestFromJSON = exports.instanceOfKerberosSourceRequest = void 0;
17
17
  const runtime_1 = require("../runtime");
18
18
  const GroupMatchingModeEnum_1 = require("./GroupMatchingModeEnum");
19
+ const KadminTypeEnum_1 = require("./KadminTypeEnum");
19
20
  const PolicyEngineMode_1 = require("./PolicyEngineMode");
20
21
  const UserMatchingModeEnum_1 = require("./UserMatchingModeEnum");
21
22
  /**
@@ -51,6 +52,7 @@ function KerberosSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
51
52
  'groupMatchingMode': !(0, runtime_1.exists)(json, 'group_matching_mode') ? undefined : (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumFromJSON)(json['group_matching_mode']),
52
53
  'realm': json['realm'],
53
54
  'krb5Conf': !(0, runtime_1.exists)(json, 'krb5_conf') ? undefined : json['krb5_conf'],
55
+ 'kadminType': !(0, runtime_1.exists)(json, 'kadmin_type') ? undefined : (0, KadminTypeEnum_1.KadminTypeEnumFromJSON)(json['kadmin_type']),
54
56
  'syncUsers': !(0, runtime_1.exists)(json, 'sync_users') ? undefined : json['sync_users'],
55
57
  'syncUsersPassword': !(0, runtime_1.exists)(json, 'sync_users_password') ? undefined : json['sync_users_password'],
56
58
  'syncPrincipal': !(0, runtime_1.exists)(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -85,6 +87,7 @@ function KerberosSourceRequestToJSON(value) {
85
87
  'group_matching_mode': (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumToJSON)(value.groupMatchingMode),
86
88
  'realm': value.realm,
87
89
  'krb5_conf': value.krb5Conf,
90
+ 'kadmin_type': (0, KadminTypeEnum_1.KadminTypeEnumToJSON)(value.kadminType),
88
91
  'sync_users': value.syncUsers,
89
92
  'sync_users_password': value.syncUsersPassword,
90
93
  'sync_principal': value.syncPrincipal,
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -96,6 +97,12 @@ export interface PatchedKerberosSourceRequest {
96
97
  * @memberof PatchedKerberosSourceRequest
97
98
  */
98
99
  krb5Conf?: string;
100
+ /**
101
+ *
102
+ * @type {KadminTypeEnum}
103
+ * @memberof PatchedKerberosSourceRequest
104
+ */
105
+ kadminType?: KadminTypeEnum;
99
106
  /**
100
107
  * Sync users from Kerberos into authentik
101
108
  * @type {boolean}
@@ -16,6 +16,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
16
16
  exports.PatchedKerberosSourceRequestToJSON = exports.PatchedKerberosSourceRequestFromJSONTyped = exports.PatchedKerberosSourceRequestFromJSON = exports.instanceOfPatchedKerberosSourceRequest = void 0;
17
17
  const runtime_1 = require("../runtime");
18
18
  const GroupMatchingModeEnum_1 = require("./GroupMatchingModeEnum");
19
+ const KadminTypeEnum_1 = require("./KadminTypeEnum");
19
20
  const PolicyEngineMode_1 = require("./PolicyEngineMode");
20
21
  const UserMatchingModeEnum_1 = require("./UserMatchingModeEnum");
21
22
  /**
@@ -48,6 +49,7 @@ function PatchedKerberosSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
48
49
  'groupMatchingMode': !(0, runtime_1.exists)(json, 'group_matching_mode') ? undefined : (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumFromJSON)(json['group_matching_mode']),
49
50
  'realm': !(0, runtime_1.exists)(json, 'realm') ? undefined : json['realm'],
50
51
  'krb5Conf': !(0, runtime_1.exists)(json, 'krb5_conf') ? undefined : json['krb5_conf'],
52
+ 'kadminType': !(0, runtime_1.exists)(json, 'kadmin_type') ? undefined : (0, KadminTypeEnum_1.KadminTypeEnumFromJSON)(json['kadmin_type']),
51
53
  'syncUsers': !(0, runtime_1.exists)(json, 'sync_users') ? undefined : json['sync_users'],
52
54
  'syncUsersPassword': !(0, runtime_1.exists)(json, 'sync_users_password') ? undefined : json['sync_users_password'],
53
55
  'syncPrincipal': !(0, runtime_1.exists)(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -82,6 +84,7 @@ function PatchedKerberosSourceRequestToJSON(value) {
82
84
  'group_matching_mode': (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumToJSON)(value.groupMatchingMode),
83
85
  'realm': value.realm,
84
86
  'krb5_conf': value.krb5Conf,
87
+ 'kadmin_type': (0, KadminTypeEnum_1.KadminTypeEnumToJSON)(value.kadminType),
85
88
  'sync_users': value.syncUsers,
86
89
  'sync_users_password': value.syncUsersPassword,
87
90
  'sync_principal': value.syncPrincipal,
@@ -182,6 +182,7 @@ export * from './InvitationRequest';
182
182
  export * from './InvitationStage';
183
183
  export * from './InvitationStageRequest';
184
184
  export * from './IssuerModeEnum';
185
+ export * from './KadminTypeEnum';
185
186
  export * from './KerberosSource';
186
187
  export * from './KerberosSourcePropertyMapping';
187
188
  export * from './KerberosSourcePropertyMappingRequest';
@@ -200,6 +200,7 @@ __exportStar(require("./InvitationRequest"), exports);
200
200
  __exportStar(require("./InvitationStage"), exports);
201
201
  __exportStar(require("./InvitationStageRequest"), exports);
202
202
  __exportStar(require("./IssuerModeEnum"), exports);
203
+ __exportStar(require("./KadminTypeEnum"), exports);
203
204
  __exportStar(require("./KerberosSource"), exports);
204
205
  __exportStar(require("./KerberosSourcePropertyMapping"), exports);
205
206
  __exportStar(require("./KerberosSourcePropertyMappingRequest"), exports);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.10.5-1733854821",
3
+ "version": "2024.10.5-1734006367",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -397,6 +397,7 @@ export interface SourcesKerberosDestroyRequest {
397
397
 
398
398
  export interface SourcesKerberosListRequest {
399
399
  enabled?: boolean;
400
+ kadminType?: SourcesKerberosListKadminTypeEnum;
400
401
  name?: string;
401
402
  ordering?: string;
402
403
  page?: number;
@@ -2433,6 +2434,10 @@ export class SourcesApi extends runtime.BaseAPI {
2433
2434
  queryParameters['enabled'] = requestParameters.enabled;
2434
2435
  }
2435
2436
 
2437
+ if (requestParameters.kadminType !== undefined) {
2438
+ queryParameters['kadmin_type'] = requestParameters.kadminType;
2439
+ }
2440
+
2436
2441
  if (requestParameters.name !== undefined) {
2437
2442
  queryParameters['name'] = requestParameters.name;
2438
2443
  }
@@ -6725,6 +6730,16 @@ export class SourcesApi extends runtime.BaseAPI {
6725
6730
 
6726
6731
  }
6727
6732
 
6733
+ /**
6734
+ * @export
6735
+ */
6736
+ export const SourcesKerberosListKadminTypeEnum = {
6737
+ Heimdal: 'Heimdal',
6738
+ Mit: 'MIT',
6739
+ Other: 'other',
6740
+ UnknownDefaultOpenApi: '11184809'
6741
+ } as const;
6742
+ export type SourcesKerberosListKadminTypeEnum = typeof SourcesKerberosListKadminTypeEnum[keyof typeof SourcesKerberosListKadminTypeEnum];
6728
6743
  /**
6729
6744
  * @export
6730
6745
  */
@@ -0,0 +1,40 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.10.5
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+
15
+
16
+ /**
17
+ *
18
+ * @export
19
+ */
20
+ export const KadminTypeEnum = {
21
+ Mit: 'MIT',
22
+ Heimdal: 'Heimdal',
23
+ Other: 'other',
24
+ UnknownDefaultOpenApi: '11184809'
25
+ } as const;
26
+ export type KadminTypeEnum = typeof KadminTypeEnum[keyof typeof KadminTypeEnum];
27
+
28
+
29
+ export function KadminTypeEnumFromJSON(json: any): KadminTypeEnum {
30
+ return KadminTypeEnumFromJSONTyped(json, false);
31
+ }
32
+
33
+ export function KadminTypeEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): KadminTypeEnum {
34
+ return json as KadminTypeEnum;
35
+ }
36
+
37
+ export function KadminTypeEnumToJSON(value?: KadminTypeEnum | null): any {
38
+ return value as any;
39
+ }
40
+
@@ -19,6 +19,12 @@ import {
19
19
  GroupMatchingModeEnumFromJSONTyped,
20
20
  GroupMatchingModeEnumToJSON,
21
21
  } from './GroupMatchingModeEnum';
22
+ import type { KadminTypeEnum } from './KadminTypeEnum';
23
+ import {
24
+ KadminTypeEnumFromJSON,
25
+ KadminTypeEnumFromJSONTyped,
26
+ KadminTypeEnumToJSON,
27
+ } from './KadminTypeEnum';
22
28
  import type { PolicyEngineMode } from './PolicyEngineMode';
23
29
  import {
24
30
  PolicyEngineModeFromJSON,
@@ -158,6 +164,12 @@ export interface KerberosSource {
158
164
  * @memberof KerberosSource
159
165
  */
160
166
  krb5Conf?: string;
167
+ /**
168
+ *
169
+ * @type {KadminTypeEnum}
170
+ * @memberof KerberosSource
171
+ */
172
+ kadminType?: KadminTypeEnum;
161
173
  /**
162
174
  * Sync users from Kerberos into authentik
163
175
  * @type {boolean}
@@ -258,6 +270,7 @@ export function KerberosSourceFromJSONTyped(json: any, ignoreDiscriminator: bool
258
270
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
259
271
  'realm': json['realm'],
260
272
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
273
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
261
274
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
262
275
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
263
276
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -291,6 +304,7 @@ export function KerberosSourceToJSON(value?: KerberosSource | null): any {
291
304
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
292
305
  'realm': value.realm,
293
306
  'krb5_conf': value.krb5Conf,
307
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
294
308
  'sync_users': value.syncUsers,
295
309
  'sync_users_password': value.syncUsersPassword,
296
310
  'sync_principal': value.syncPrincipal,
@@ -19,6 +19,12 @@ import {
19
19
  GroupMatchingModeEnumFromJSONTyped,
20
20
  GroupMatchingModeEnumToJSON,
21
21
  } from './GroupMatchingModeEnum';
22
+ import type { KadminTypeEnum } from './KadminTypeEnum';
23
+ import {
24
+ KadminTypeEnumFromJSON,
25
+ KadminTypeEnumFromJSONTyped,
26
+ KadminTypeEnumToJSON,
27
+ } from './KadminTypeEnum';
22
28
  import type { PolicyEngineMode } from './PolicyEngineMode';
23
29
  import {
24
30
  PolicyEngineModeFromJSON,
@@ -116,6 +122,12 @@ export interface KerberosSourceRequest {
116
122
  * @memberof KerberosSourceRequest
117
123
  */
118
124
  krb5Conf?: string;
125
+ /**
126
+ *
127
+ * @type {KadminTypeEnum}
128
+ * @memberof KerberosSourceRequest
129
+ */
130
+ kadminType?: KadminTypeEnum;
119
131
  /**
120
132
  * Sync users from Kerberos into authentik
121
133
  * @type {boolean}
@@ -213,6 +225,7 @@ export function KerberosSourceRequestFromJSONTyped(json: any, ignoreDiscriminato
213
225
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
214
226
  'realm': json['realm'],
215
227
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
228
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
216
229
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
217
230
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
218
231
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -248,6 +261,7 @@ export function KerberosSourceRequestToJSON(value?: KerberosSourceRequest | null
248
261
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
249
262
  'realm': value.realm,
250
263
  'krb5_conf': value.krb5Conf,
264
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
251
265
  'sync_users': value.syncUsers,
252
266
  'sync_users_password': value.syncUsersPassword,
253
267
  'sync_principal': value.syncPrincipal,
@@ -19,6 +19,12 @@ import {
19
19
  GroupMatchingModeEnumFromJSONTyped,
20
20
  GroupMatchingModeEnumToJSON,
21
21
  } from './GroupMatchingModeEnum';
22
+ import type { KadminTypeEnum } from './KadminTypeEnum';
23
+ import {
24
+ KadminTypeEnumFromJSON,
25
+ KadminTypeEnumFromJSONTyped,
26
+ KadminTypeEnumToJSON,
27
+ } from './KadminTypeEnum';
22
28
  import type { PolicyEngineMode } from './PolicyEngineMode';
23
29
  import {
24
30
  PolicyEngineModeFromJSON,
@@ -116,6 +122,12 @@ export interface PatchedKerberosSourceRequest {
116
122
  * @memberof PatchedKerberosSourceRequest
117
123
  */
118
124
  krb5Conf?: string;
125
+ /**
126
+ *
127
+ * @type {KadminTypeEnum}
128
+ * @memberof PatchedKerberosSourceRequest
129
+ */
130
+ kadminType?: KadminTypeEnum;
119
131
  /**
120
132
  * Sync users from Kerberos into authentik
121
133
  * @type {boolean}
@@ -210,6 +222,7 @@ export function PatchedKerberosSourceRequestFromJSONTyped(json: any, ignoreDiscr
210
222
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
211
223
  'realm': !exists(json, 'realm') ? undefined : json['realm'],
212
224
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
225
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
213
226
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
214
227
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
215
228
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -245,6 +258,7 @@ export function PatchedKerberosSourceRequestToJSON(value?: PatchedKerberosSource
245
258
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
246
259
  'realm': value.realm,
247
260
  'krb5_conf': value.krb5Conf,
261
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
248
262
  'sync_users': value.syncUsers,
249
263
  'sync_users_password': value.syncUsersPassword,
250
264
  'sync_principal': value.syncPrincipal,
@@ -184,6 +184,7 @@ export * from './InvitationRequest';
184
184
  export * from './InvitationStage';
185
185
  export * from './InvitationStageRequest';
186
186
  export * from './IssuerModeEnum';
187
+ export * from './KadminTypeEnum';
187
188
  export * from './KerberosSource';
188
189
  export * from './KerberosSourcePropertyMapping';
189
190
  export * from './KerberosSourcePropertyMappingRequest';