@goauthentik/api 2024.10.5-1733854821 → 2024.10.5-1734006367

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (32) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/SourcesApi.d.ts +11 -0
  3. package/dist/apis/SourcesApi.js +13 -1
  4. package/dist/esm/apis/SourcesApi.d.ts +11 -0
  5. package/dist/esm/apis/SourcesApi.js +12 -0
  6. package/dist/esm/models/KadminTypeEnum.d.ts +25 -0
  7. package/dist/esm/models/KadminTypeEnum.js +32 -0
  8. package/dist/esm/models/KerberosSource.d.ts +7 -0
  9. package/dist/esm/models/KerberosSource.js +3 -0
  10. package/dist/esm/models/KerberosSourceRequest.d.ts +7 -0
  11. package/dist/esm/models/KerberosSourceRequest.js +3 -0
  12. package/dist/esm/models/PatchedKerberosSourceRequest.d.ts +7 -0
  13. package/dist/esm/models/PatchedKerberosSourceRequest.js +3 -0
  14. package/dist/esm/models/index.d.ts +1 -0
  15. package/dist/esm/models/index.js +1 -0
  16. package/dist/models/KadminTypeEnum.d.ts +25 -0
  17. package/dist/models/KadminTypeEnum.js +38 -0
  18. package/dist/models/KerberosSource.d.ts +7 -0
  19. package/dist/models/KerberosSource.js +3 -0
  20. package/dist/models/KerberosSourceRequest.d.ts +7 -0
  21. package/dist/models/KerberosSourceRequest.js +3 -0
  22. package/dist/models/PatchedKerberosSourceRequest.d.ts +7 -0
  23. package/dist/models/PatchedKerberosSourceRequest.js +3 -0
  24. package/dist/models/index.d.ts +1 -0
  25. package/dist/models/index.js +1 -0
  26. package/package.json +1 -1
  27. package/src/apis/SourcesApi.ts +15 -0
  28. package/src/models/KadminTypeEnum.ts +40 -0
  29. package/src/models/KerberosSource.ts +14 -0
  30. package/src/models/KerberosSourceRequest.ts +14 -0
  31. package/src/models/PatchedKerberosSourceRequest.ts +14 -0
  32. package/src/models/index.ts +1 -0
@@ -209,6 +209,7 @@ src/models/InvitationRequest.ts
209
209
  src/models/InvitationStage.ts
210
210
  src/models/InvitationStageRequest.ts
211
211
  src/models/IssuerModeEnum.ts
212
+ src/models/KadminTypeEnum.ts
212
213
  src/models/KerberosSource.ts
213
214
  src/models/KerberosSourcePropertyMapping.ts
214
215
  src/models/KerberosSourcePropertyMappingRequest.ts
@@ -138,6 +138,7 @@ export interface SourcesKerberosDestroyRequest {
138
138
  }
139
139
  export interface SourcesKerberosListRequest {
140
140
  enabled?: boolean;
141
+ kadminType?: SourcesKerberosListKadminTypeEnum;
141
142
  name?: string;
142
143
  ordering?: string;
143
144
  page?: number;
@@ -1634,6 +1635,16 @@ export declare class SourcesApi extends runtime.BaseAPI {
1634
1635
  */
1635
1636
  sourcesUserConnectionsSamlUsedByList(requestParameters: SourcesUserConnectionsSamlUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
1636
1637
  }
1638
+ /**
1639
+ * @export
1640
+ */
1641
+ export declare const SourcesKerberosListKadminTypeEnum: {
1642
+ readonly Heimdal: "Heimdal";
1643
+ readonly Mit: "MIT";
1644
+ readonly Other: "other";
1645
+ readonly UnknownDefaultOpenApi: "11184809";
1646
+ };
1647
+ export type SourcesKerberosListKadminTypeEnum = typeof SourcesKerberosListKadminTypeEnum[keyof typeof SourcesKerberosListKadminTypeEnum];
1637
1648
  /**
1638
1649
  * @export
1639
1650
  */
@@ -22,7 +22,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
22
22
  });
23
23
  };
24
24
  Object.defineProperty(exports, "__esModule", { value: true });
25
- exports.SourcesSamlListUserMatchingModeEnum = exports.SourcesSamlListSignatureAlgorithmEnum = exports.SourcesSamlListPolicyEngineModeEnum = exports.SourcesSamlListNameIdPolicyEnum = exports.SourcesSamlListDigestAlgorithmEnum = exports.SourcesSamlListBindingTypeEnum = exports.SourcesPlexListUserMatchingModeEnum = exports.SourcesPlexListPolicyEngineModeEnum = exports.SourcesPlexListGroupMatchingModeEnum = exports.SourcesOauthListUserMatchingModeEnum = exports.SourcesOauthListPolicyEngineModeEnum = exports.SourcesOauthListGroupMatchingModeEnum = exports.SourcesApi = void 0;
25
+ exports.SourcesSamlListUserMatchingModeEnum = exports.SourcesSamlListSignatureAlgorithmEnum = exports.SourcesSamlListPolicyEngineModeEnum = exports.SourcesSamlListNameIdPolicyEnum = exports.SourcesSamlListDigestAlgorithmEnum = exports.SourcesSamlListBindingTypeEnum = exports.SourcesPlexListUserMatchingModeEnum = exports.SourcesPlexListPolicyEngineModeEnum = exports.SourcesPlexListGroupMatchingModeEnum = exports.SourcesOauthListUserMatchingModeEnum = exports.SourcesOauthListPolicyEngineModeEnum = exports.SourcesOauthListGroupMatchingModeEnum = exports.SourcesKerberosListKadminTypeEnum = exports.SourcesApi = void 0;
26
26
  const runtime = require("../runtime");
27
27
  const models_1 = require("../models");
28
28
  /**
@@ -1385,6 +1385,9 @@ class SourcesApi extends runtime.BaseAPI {
1385
1385
  if (requestParameters.enabled !== undefined) {
1386
1386
  queryParameters['enabled'] = requestParameters.enabled;
1387
1387
  }
1388
+ if (requestParameters.kadminType !== undefined) {
1389
+ queryParameters['kadmin_type'] = requestParameters.kadminType;
1390
+ }
1388
1391
  if (requestParameters.name !== undefined) {
1389
1392
  queryParameters['name'] = requestParameters.name;
1390
1393
  }
@@ -5208,6 +5211,15 @@ class SourcesApi extends runtime.BaseAPI {
5208
5211
  }
5209
5212
  }
5210
5213
  exports.SourcesApi = SourcesApi;
5214
+ /**
5215
+ * @export
5216
+ */
5217
+ exports.SourcesKerberosListKadminTypeEnum = {
5218
+ Heimdal: 'Heimdal',
5219
+ Mit: 'MIT',
5220
+ Other: 'other',
5221
+ UnknownDefaultOpenApi: '11184809'
5222
+ };
5211
5223
  /**
5212
5224
  * @export
5213
5225
  */
@@ -138,6 +138,7 @@ export interface SourcesKerberosDestroyRequest {
138
138
  }
139
139
  export interface SourcesKerberosListRequest {
140
140
  enabled?: boolean;
141
+ kadminType?: SourcesKerberosListKadminTypeEnum;
141
142
  name?: string;
142
143
  ordering?: string;
143
144
  page?: number;
@@ -1634,6 +1635,16 @@ export declare class SourcesApi extends runtime.BaseAPI {
1634
1635
  */
1635
1636
  sourcesUserConnectionsSamlUsedByList(requestParameters: SourcesUserConnectionsSamlUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
1636
1637
  }
1638
+ /**
1639
+ * @export
1640
+ */
1641
+ export declare const SourcesKerberosListKadminTypeEnum: {
1642
+ readonly Heimdal: "Heimdal";
1643
+ readonly Mit: "MIT";
1644
+ readonly Other: "other";
1645
+ readonly UnknownDefaultOpenApi: "11184809";
1646
+ };
1647
+ export type SourcesKerberosListKadminTypeEnum = typeof SourcesKerberosListKadminTypeEnum[keyof typeof SourcesKerberosListKadminTypeEnum];
1637
1648
  /**
1638
1649
  * @export
1639
1650
  */
@@ -1382,6 +1382,9 @@ export class SourcesApi extends runtime.BaseAPI {
1382
1382
  if (requestParameters.enabled !== undefined) {
1383
1383
  queryParameters['enabled'] = requestParameters.enabled;
1384
1384
  }
1385
+ if (requestParameters.kadminType !== undefined) {
1386
+ queryParameters['kadmin_type'] = requestParameters.kadminType;
1387
+ }
1385
1388
  if (requestParameters.name !== undefined) {
1386
1389
  queryParameters['name'] = requestParameters.name;
1387
1390
  }
@@ -5204,6 +5207,15 @@ export class SourcesApi extends runtime.BaseAPI {
5204
5207
  });
5205
5208
  }
5206
5209
  }
5210
+ /**
5211
+ * @export
5212
+ */
5213
+ export const SourcesKerberosListKadminTypeEnum = {
5214
+ Heimdal: 'Heimdal',
5215
+ Mit: 'MIT',
5216
+ Other: 'other',
5217
+ UnknownDefaultOpenApi: '11184809'
5218
+ };
5207
5219
  /**
5208
5220
  * @export
5209
5221
  */
@@ -0,0 +1,25 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.10.5
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ *
14
+ * @export
15
+ */
16
+ export declare const KadminTypeEnum: {
17
+ readonly Mit: "MIT";
18
+ readonly Heimdal: "Heimdal";
19
+ readonly Other: "other";
20
+ readonly UnknownDefaultOpenApi: "11184809";
21
+ };
22
+ export type KadminTypeEnum = typeof KadminTypeEnum[keyof typeof KadminTypeEnum];
23
+ export declare function KadminTypeEnumFromJSON(json: any): KadminTypeEnum;
24
+ export declare function KadminTypeEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): KadminTypeEnum;
25
+ export declare function KadminTypeEnumToJSON(value?: KadminTypeEnum | null): any;
@@ -0,0 +1,32 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.10.5
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ /**
15
+ *
16
+ * @export
17
+ */
18
+ export const KadminTypeEnum = {
19
+ Mit: 'MIT',
20
+ Heimdal: 'Heimdal',
21
+ Other: 'other',
22
+ UnknownDefaultOpenApi: '11184809'
23
+ };
24
+ export function KadminTypeEnumFromJSON(json) {
25
+ return KadminTypeEnumFromJSONTyped(json, false);
26
+ }
27
+ export function KadminTypeEnumFromJSONTyped(json, ignoreDiscriminator) {
28
+ return json;
29
+ }
30
+ export function KadminTypeEnumToJSON(value) {
31
+ return value;
32
+ }
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -138,6 +139,12 @@ export interface KerberosSource {
138
139
  * @memberof KerberosSource
139
140
  */
140
141
  krb5Conf?: string;
142
+ /**
143
+ *
144
+ * @type {KadminTypeEnum}
145
+ * @memberof KerberosSource
146
+ */
147
+ kadminType?: KadminTypeEnum;
141
148
  /**
142
149
  * Sync users from Kerberos into authentik
143
150
  * @type {boolean}
@@ -13,6 +13,7 @@
13
13
  */
14
14
  import { exists } from '../runtime';
15
15
  import { GroupMatchingModeEnumFromJSON, GroupMatchingModeEnumToJSON, } from './GroupMatchingModeEnum';
16
+ import { KadminTypeEnumFromJSON, KadminTypeEnumToJSON, } from './KadminTypeEnum';
16
17
  import { PolicyEngineModeFromJSON, PolicyEngineModeToJSON, } from './PolicyEngineMode';
17
18
  import { UserMatchingModeEnumFromJSON, UserMatchingModeEnumToJSON, } from './UserMatchingModeEnum';
18
19
  /**
@@ -61,6 +62,7 @@ export function KerberosSourceFromJSONTyped(json, ignoreDiscriminator) {
61
62
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
62
63
  'realm': json['realm'],
63
64
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
65
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
64
66
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
65
67
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
66
68
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -92,6 +94,7 @@ export function KerberosSourceToJSON(value) {
92
94
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
93
95
  'realm': value.realm,
94
96
  'krb5_conf': value.krb5Conf,
97
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
95
98
  'sync_users': value.syncUsers,
96
99
  'sync_users_password': value.syncUsersPassword,
97
100
  'sync_principal': value.syncPrincipal,
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -96,6 +97,12 @@ export interface KerberosSourceRequest {
96
97
  * @memberof KerberosSourceRequest
97
98
  */
98
99
  krb5Conf?: string;
100
+ /**
101
+ *
102
+ * @type {KadminTypeEnum}
103
+ * @memberof KerberosSourceRequest
104
+ */
105
+ kadminType?: KadminTypeEnum;
99
106
  /**
100
107
  * Sync users from Kerberos into authentik
101
108
  * @type {boolean}
@@ -13,6 +13,7 @@
13
13
  */
14
14
  import { exists } from '../runtime';
15
15
  import { GroupMatchingModeEnumFromJSON, GroupMatchingModeEnumToJSON, } from './GroupMatchingModeEnum';
16
+ import { KadminTypeEnumFromJSON, KadminTypeEnumToJSON, } from './KadminTypeEnum';
16
17
  import { PolicyEngineModeFromJSON, PolicyEngineModeToJSON, } from './PolicyEngineMode';
17
18
  import { UserMatchingModeEnumFromJSON, UserMatchingModeEnumToJSON, } from './UserMatchingModeEnum';
18
19
  /**
@@ -46,6 +47,7 @@ export function KerberosSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
46
47
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
47
48
  'realm': json['realm'],
48
49
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
50
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
49
51
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
50
52
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
51
53
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -79,6 +81,7 @@ export function KerberosSourceRequestToJSON(value) {
79
81
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
80
82
  'realm': value.realm,
81
83
  'krb5_conf': value.krb5Conf,
84
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
82
85
  'sync_users': value.syncUsers,
83
86
  'sync_users_password': value.syncUsersPassword,
84
87
  'sync_principal': value.syncPrincipal,
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -96,6 +97,12 @@ export interface PatchedKerberosSourceRequest {
96
97
  * @memberof PatchedKerberosSourceRequest
97
98
  */
98
99
  krb5Conf?: string;
100
+ /**
101
+ *
102
+ * @type {KadminTypeEnum}
103
+ * @memberof PatchedKerberosSourceRequest
104
+ */
105
+ kadminType?: KadminTypeEnum;
99
106
  /**
100
107
  * Sync users from Kerberos into authentik
101
108
  * @type {boolean}
@@ -13,6 +13,7 @@
13
13
  */
14
14
  import { exists } from '../runtime';
15
15
  import { GroupMatchingModeEnumFromJSON, GroupMatchingModeEnumToJSON, } from './GroupMatchingModeEnum';
16
+ import { KadminTypeEnumFromJSON, KadminTypeEnumToJSON, } from './KadminTypeEnum';
16
17
  import { PolicyEngineModeFromJSON, PolicyEngineModeToJSON, } from './PolicyEngineMode';
17
18
  import { UserMatchingModeEnumFromJSON, UserMatchingModeEnumToJSON, } from './UserMatchingModeEnum';
18
19
  /**
@@ -43,6 +44,7 @@ export function PatchedKerberosSourceRequestFromJSONTyped(json, ignoreDiscrimina
43
44
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
44
45
  'realm': !exists(json, 'realm') ? undefined : json['realm'],
45
46
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
47
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
46
48
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
47
49
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
48
50
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -76,6 +78,7 @@ export function PatchedKerberosSourceRequestToJSON(value) {
76
78
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
77
79
  'realm': value.realm,
78
80
  'krb5_conf': value.krb5Conf,
81
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
79
82
  'sync_users': value.syncUsers,
80
83
  'sync_users_password': value.syncUsersPassword,
81
84
  'sync_principal': value.syncPrincipal,
@@ -182,6 +182,7 @@ export * from './InvitationRequest';
182
182
  export * from './InvitationStage';
183
183
  export * from './InvitationStageRequest';
184
184
  export * from './IssuerModeEnum';
185
+ export * from './KadminTypeEnum';
185
186
  export * from './KerberosSource';
186
187
  export * from './KerberosSourcePropertyMapping';
187
188
  export * from './KerberosSourcePropertyMappingRequest';
@@ -184,6 +184,7 @@ export * from './InvitationRequest';
184
184
  export * from './InvitationStage';
185
185
  export * from './InvitationStageRequest';
186
186
  export * from './IssuerModeEnum';
187
+ export * from './KadminTypeEnum';
187
188
  export * from './KerberosSource';
188
189
  export * from './KerberosSourcePropertyMapping';
189
190
  export * from './KerberosSourcePropertyMappingRequest';
@@ -0,0 +1,25 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.10.5
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ *
14
+ * @export
15
+ */
16
+ export declare const KadminTypeEnum: {
17
+ readonly Mit: "MIT";
18
+ readonly Heimdal: "Heimdal";
19
+ readonly Other: "other";
20
+ readonly UnknownDefaultOpenApi: "11184809";
21
+ };
22
+ export type KadminTypeEnum = typeof KadminTypeEnum[keyof typeof KadminTypeEnum];
23
+ export declare function KadminTypeEnumFromJSON(json: any): KadminTypeEnum;
24
+ export declare function KadminTypeEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): KadminTypeEnum;
25
+ export declare function KadminTypeEnumToJSON(value?: KadminTypeEnum | null): any;
@@ -0,0 +1,38 @@
1
+ "use strict";
2
+ /* tslint:disable */
3
+ /* eslint-disable */
4
+ /**
5
+ * authentik
6
+ * Making authentication simple.
7
+ *
8
+ * The version of the OpenAPI document: 2024.10.5
9
+ * Contact: hello@goauthentik.io
10
+ *
11
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
12
+ * https://openapi-generator.tech
13
+ * Do not edit the class manually.
14
+ */
15
+ Object.defineProperty(exports, "__esModule", { value: true });
16
+ exports.KadminTypeEnumToJSON = exports.KadminTypeEnumFromJSONTyped = exports.KadminTypeEnumFromJSON = exports.KadminTypeEnum = void 0;
17
+ /**
18
+ *
19
+ * @export
20
+ */
21
+ exports.KadminTypeEnum = {
22
+ Mit: 'MIT',
23
+ Heimdal: 'Heimdal',
24
+ Other: 'other',
25
+ UnknownDefaultOpenApi: '11184809'
26
+ };
27
+ function KadminTypeEnumFromJSON(json) {
28
+ return KadminTypeEnumFromJSONTyped(json, false);
29
+ }
30
+ exports.KadminTypeEnumFromJSON = KadminTypeEnumFromJSON;
31
+ function KadminTypeEnumFromJSONTyped(json, ignoreDiscriminator) {
32
+ return json;
33
+ }
34
+ exports.KadminTypeEnumFromJSONTyped = KadminTypeEnumFromJSONTyped;
35
+ function KadminTypeEnumToJSON(value) {
36
+ return value;
37
+ }
38
+ exports.KadminTypeEnumToJSON = KadminTypeEnumToJSON;
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -138,6 +139,12 @@ export interface KerberosSource {
138
139
  * @memberof KerberosSource
139
140
  */
140
141
  krb5Conf?: string;
142
+ /**
143
+ *
144
+ * @type {KadminTypeEnum}
145
+ * @memberof KerberosSource
146
+ */
147
+ kadminType?: KadminTypeEnum;
141
148
  /**
142
149
  * Sync users from Kerberos into authentik
143
150
  * @type {boolean}
@@ -16,6 +16,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
16
16
  exports.KerberosSourceToJSON = exports.KerberosSourceFromJSONTyped = exports.KerberosSourceFromJSON = exports.instanceOfKerberosSource = void 0;
17
17
  const runtime_1 = require("../runtime");
18
18
  const GroupMatchingModeEnum_1 = require("./GroupMatchingModeEnum");
19
+ const KadminTypeEnum_1 = require("./KadminTypeEnum");
19
20
  const PolicyEngineMode_1 = require("./PolicyEngineMode");
20
21
  const UserMatchingModeEnum_1 = require("./UserMatchingModeEnum");
21
22
  /**
@@ -66,6 +67,7 @@ function KerberosSourceFromJSONTyped(json, ignoreDiscriminator) {
66
67
  'groupMatchingMode': !(0, runtime_1.exists)(json, 'group_matching_mode') ? undefined : (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumFromJSON)(json['group_matching_mode']),
67
68
  'realm': json['realm'],
68
69
  'krb5Conf': !(0, runtime_1.exists)(json, 'krb5_conf') ? undefined : json['krb5_conf'],
70
+ 'kadminType': !(0, runtime_1.exists)(json, 'kadmin_type') ? undefined : (0, KadminTypeEnum_1.KadminTypeEnumFromJSON)(json['kadmin_type']),
69
71
  'syncUsers': !(0, runtime_1.exists)(json, 'sync_users') ? undefined : json['sync_users'],
70
72
  'syncUsersPassword': !(0, runtime_1.exists)(json, 'sync_users_password') ? undefined : json['sync_users_password'],
71
73
  'syncPrincipal': !(0, runtime_1.exists)(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -98,6 +100,7 @@ function KerberosSourceToJSON(value) {
98
100
  'group_matching_mode': (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumToJSON)(value.groupMatchingMode),
99
101
  'realm': value.realm,
100
102
  'krb5_conf': value.krb5Conf,
103
+ 'kadmin_type': (0, KadminTypeEnum_1.KadminTypeEnumToJSON)(value.kadminType),
101
104
  'sync_users': value.syncUsers,
102
105
  'sync_users_password': value.syncUsersPassword,
103
106
  'sync_principal': value.syncPrincipal,
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -96,6 +97,12 @@ export interface KerberosSourceRequest {
96
97
  * @memberof KerberosSourceRequest
97
98
  */
98
99
  krb5Conf?: string;
100
+ /**
101
+ *
102
+ * @type {KadminTypeEnum}
103
+ * @memberof KerberosSourceRequest
104
+ */
105
+ kadminType?: KadminTypeEnum;
99
106
  /**
100
107
  * Sync users from Kerberos into authentik
101
108
  * @type {boolean}
@@ -16,6 +16,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
16
16
  exports.KerberosSourceRequestToJSON = exports.KerberosSourceRequestFromJSONTyped = exports.KerberosSourceRequestFromJSON = exports.instanceOfKerberosSourceRequest = void 0;
17
17
  const runtime_1 = require("../runtime");
18
18
  const GroupMatchingModeEnum_1 = require("./GroupMatchingModeEnum");
19
+ const KadminTypeEnum_1 = require("./KadminTypeEnum");
19
20
  const PolicyEngineMode_1 = require("./PolicyEngineMode");
20
21
  const UserMatchingModeEnum_1 = require("./UserMatchingModeEnum");
21
22
  /**
@@ -51,6 +52,7 @@ function KerberosSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
51
52
  'groupMatchingMode': !(0, runtime_1.exists)(json, 'group_matching_mode') ? undefined : (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumFromJSON)(json['group_matching_mode']),
52
53
  'realm': json['realm'],
53
54
  'krb5Conf': !(0, runtime_1.exists)(json, 'krb5_conf') ? undefined : json['krb5_conf'],
55
+ 'kadminType': !(0, runtime_1.exists)(json, 'kadmin_type') ? undefined : (0, KadminTypeEnum_1.KadminTypeEnumFromJSON)(json['kadmin_type']),
54
56
  'syncUsers': !(0, runtime_1.exists)(json, 'sync_users') ? undefined : json['sync_users'],
55
57
  'syncUsersPassword': !(0, runtime_1.exists)(json, 'sync_users_password') ? undefined : json['sync_users_password'],
56
58
  'syncPrincipal': !(0, runtime_1.exists)(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -85,6 +87,7 @@ function KerberosSourceRequestToJSON(value) {
85
87
  'group_matching_mode': (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumToJSON)(value.groupMatchingMode),
86
88
  'realm': value.realm,
87
89
  'krb5_conf': value.krb5Conf,
90
+ 'kadmin_type': (0, KadminTypeEnum_1.KadminTypeEnumToJSON)(value.kadminType),
88
91
  'sync_users': value.syncUsers,
89
92
  'sync_users_password': value.syncUsersPassword,
90
93
  'sync_principal': value.syncPrincipal,
@@ -10,6 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import type { GroupMatchingModeEnum } from './GroupMatchingModeEnum';
13
+ import type { KadminTypeEnum } from './KadminTypeEnum';
13
14
  import type { PolicyEngineMode } from './PolicyEngineMode';
14
15
  import type { UserMatchingModeEnum } from './UserMatchingModeEnum';
15
16
  /**
@@ -96,6 +97,12 @@ export interface PatchedKerberosSourceRequest {
96
97
  * @memberof PatchedKerberosSourceRequest
97
98
  */
98
99
  krb5Conf?: string;
100
+ /**
101
+ *
102
+ * @type {KadminTypeEnum}
103
+ * @memberof PatchedKerberosSourceRequest
104
+ */
105
+ kadminType?: KadminTypeEnum;
99
106
  /**
100
107
  * Sync users from Kerberos into authentik
101
108
  * @type {boolean}
@@ -16,6 +16,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
16
16
  exports.PatchedKerberosSourceRequestToJSON = exports.PatchedKerberosSourceRequestFromJSONTyped = exports.PatchedKerberosSourceRequestFromJSON = exports.instanceOfPatchedKerberosSourceRequest = void 0;
17
17
  const runtime_1 = require("../runtime");
18
18
  const GroupMatchingModeEnum_1 = require("./GroupMatchingModeEnum");
19
+ const KadminTypeEnum_1 = require("./KadminTypeEnum");
19
20
  const PolicyEngineMode_1 = require("./PolicyEngineMode");
20
21
  const UserMatchingModeEnum_1 = require("./UserMatchingModeEnum");
21
22
  /**
@@ -48,6 +49,7 @@ function PatchedKerberosSourceRequestFromJSONTyped(json, ignoreDiscriminator) {
48
49
  'groupMatchingMode': !(0, runtime_1.exists)(json, 'group_matching_mode') ? undefined : (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumFromJSON)(json['group_matching_mode']),
49
50
  'realm': !(0, runtime_1.exists)(json, 'realm') ? undefined : json['realm'],
50
51
  'krb5Conf': !(0, runtime_1.exists)(json, 'krb5_conf') ? undefined : json['krb5_conf'],
52
+ 'kadminType': !(0, runtime_1.exists)(json, 'kadmin_type') ? undefined : (0, KadminTypeEnum_1.KadminTypeEnumFromJSON)(json['kadmin_type']),
51
53
  'syncUsers': !(0, runtime_1.exists)(json, 'sync_users') ? undefined : json['sync_users'],
52
54
  'syncUsersPassword': !(0, runtime_1.exists)(json, 'sync_users_password') ? undefined : json['sync_users_password'],
53
55
  'syncPrincipal': !(0, runtime_1.exists)(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -82,6 +84,7 @@ function PatchedKerberosSourceRequestToJSON(value) {
82
84
  'group_matching_mode': (0, GroupMatchingModeEnum_1.GroupMatchingModeEnumToJSON)(value.groupMatchingMode),
83
85
  'realm': value.realm,
84
86
  'krb5_conf': value.krb5Conf,
87
+ 'kadmin_type': (0, KadminTypeEnum_1.KadminTypeEnumToJSON)(value.kadminType),
85
88
  'sync_users': value.syncUsers,
86
89
  'sync_users_password': value.syncUsersPassword,
87
90
  'sync_principal': value.syncPrincipal,
@@ -182,6 +182,7 @@ export * from './InvitationRequest';
182
182
  export * from './InvitationStage';
183
183
  export * from './InvitationStageRequest';
184
184
  export * from './IssuerModeEnum';
185
+ export * from './KadminTypeEnum';
185
186
  export * from './KerberosSource';
186
187
  export * from './KerberosSourcePropertyMapping';
187
188
  export * from './KerberosSourcePropertyMappingRequest';
@@ -200,6 +200,7 @@ __exportStar(require("./InvitationRequest"), exports);
200
200
  __exportStar(require("./InvitationStage"), exports);
201
201
  __exportStar(require("./InvitationStageRequest"), exports);
202
202
  __exportStar(require("./IssuerModeEnum"), exports);
203
+ __exportStar(require("./KadminTypeEnum"), exports);
203
204
  __exportStar(require("./KerberosSource"), exports);
204
205
  __exportStar(require("./KerberosSourcePropertyMapping"), exports);
205
206
  __exportStar(require("./KerberosSourcePropertyMappingRequest"), exports);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.10.5-1733854821",
3
+ "version": "2024.10.5-1734006367",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -397,6 +397,7 @@ export interface SourcesKerberosDestroyRequest {
397
397
 
398
398
  export interface SourcesKerberosListRequest {
399
399
  enabled?: boolean;
400
+ kadminType?: SourcesKerberosListKadminTypeEnum;
400
401
  name?: string;
401
402
  ordering?: string;
402
403
  page?: number;
@@ -2433,6 +2434,10 @@ export class SourcesApi extends runtime.BaseAPI {
2433
2434
  queryParameters['enabled'] = requestParameters.enabled;
2434
2435
  }
2435
2436
 
2437
+ if (requestParameters.kadminType !== undefined) {
2438
+ queryParameters['kadmin_type'] = requestParameters.kadminType;
2439
+ }
2440
+
2436
2441
  if (requestParameters.name !== undefined) {
2437
2442
  queryParameters['name'] = requestParameters.name;
2438
2443
  }
@@ -6725,6 +6730,16 @@ export class SourcesApi extends runtime.BaseAPI {
6725
6730
 
6726
6731
  }
6727
6732
 
6733
+ /**
6734
+ * @export
6735
+ */
6736
+ export const SourcesKerberosListKadminTypeEnum = {
6737
+ Heimdal: 'Heimdal',
6738
+ Mit: 'MIT',
6739
+ Other: 'other',
6740
+ UnknownDefaultOpenApi: '11184809'
6741
+ } as const;
6742
+ export type SourcesKerberosListKadminTypeEnum = typeof SourcesKerberosListKadminTypeEnum[keyof typeof SourcesKerberosListKadminTypeEnum];
6728
6743
  /**
6729
6744
  * @export
6730
6745
  */
@@ -0,0 +1,40 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.10.5
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+
15
+
16
+ /**
17
+ *
18
+ * @export
19
+ */
20
+ export const KadminTypeEnum = {
21
+ Mit: 'MIT',
22
+ Heimdal: 'Heimdal',
23
+ Other: 'other',
24
+ UnknownDefaultOpenApi: '11184809'
25
+ } as const;
26
+ export type KadminTypeEnum = typeof KadminTypeEnum[keyof typeof KadminTypeEnum];
27
+
28
+
29
+ export function KadminTypeEnumFromJSON(json: any): KadminTypeEnum {
30
+ return KadminTypeEnumFromJSONTyped(json, false);
31
+ }
32
+
33
+ export function KadminTypeEnumFromJSONTyped(json: any, ignoreDiscriminator: boolean): KadminTypeEnum {
34
+ return json as KadminTypeEnum;
35
+ }
36
+
37
+ export function KadminTypeEnumToJSON(value?: KadminTypeEnum | null): any {
38
+ return value as any;
39
+ }
40
+
@@ -19,6 +19,12 @@ import {
19
19
  GroupMatchingModeEnumFromJSONTyped,
20
20
  GroupMatchingModeEnumToJSON,
21
21
  } from './GroupMatchingModeEnum';
22
+ import type { KadminTypeEnum } from './KadminTypeEnum';
23
+ import {
24
+ KadminTypeEnumFromJSON,
25
+ KadminTypeEnumFromJSONTyped,
26
+ KadminTypeEnumToJSON,
27
+ } from './KadminTypeEnum';
22
28
  import type { PolicyEngineMode } from './PolicyEngineMode';
23
29
  import {
24
30
  PolicyEngineModeFromJSON,
@@ -158,6 +164,12 @@ export interface KerberosSource {
158
164
  * @memberof KerberosSource
159
165
  */
160
166
  krb5Conf?: string;
167
+ /**
168
+ *
169
+ * @type {KadminTypeEnum}
170
+ * @memberof KerberosSource
171
+ */
172
+ kadminType?: KadminTypeEnum;
161
173
  /**
162
174
  * Sync users from Kerberos into authentik
163
175
  * @type {boolean}
@@ -258,6 +270,7 @@ export function KerberosSourceFromJSONTyped(json: any, ignoreDiscriminator: bool
258
270
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
259
271
  'realm': json['realm'],
260
272
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
273
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
261
274
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
262
275
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
263
276
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -291,6 +304,7 @@ export function KerberosSourceToJSON(value?: KerberosSource | null): any {
291
304
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
292
305
  'realm': value.realm,
293
306
  'krb5_conf': value.krb5Conf,
307
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
294
308
  'sync_users': value.syncUsers,
295
309
  'sync_users_password': value.syncUsersPassword,
296
310
  'sync_principal': value.syncPrincipal,
@@ -19,6 +19,12 @@ import {
19
19
  GroupMatchingModeEnumFromJSONTyped,
20
20
  GroupMatchingModeEnumToJSON,
21
21
  } from './GroupMatchingModeEnum';
22
+ import type { KadminTypeEnum } from './KadminTypeEnum';
23
+ import {
24
+ KadminTypeEnumFromJSON,
25
+ KadminTypeEnumFromJSONTyped,
26
+ KadminTypeEnumToJSON,
27
+ } from './KadminTypeEnum';
22
28
  import type { PolicyEngineMode } from './PolicyEngineMode';
23
29
  import {
24
30
  PolicyEngineModeFromJSON,
@@ -116,6 +122,12 @@ export interface KerberosSourceRequest {
116
122
  * @memberof KerberosSourceRequest
117
123
  */
118
124
  krb5Conf?: string;
125
+ /**
126
+ *
127
+ * @type {KadminTypeEnum}
128
+ * @memberof KerberosSourceRequest
129
+ */
130
+ kadminType?: KadminTypeEnum;
119
131
  /**
120
132
  * Sync users from Kerberos into authentik
121
133
  * @type {boolean}
@@ -213,6 +225,7 @@ export function KerberosSourceRequestFromJSONTyped(json: any, ignoreDiscriminato
213
225
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
214
226
  'realm': json['realm'],
215
227
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
228
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
216
229
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
217
230
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
218
231
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -248,6 +261,7 @@ export function KerberosSourceRequestToJSON(value?: KerberosSourceRequest | null
248
261
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
249
262
  'realm': value.realm,
250
263
  'krb5_conf': value.krb5Conf,
264
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
251
265
  'sync_users': value.syncUsers,
252
266
  'sync_users_password': value.syncUsersPassword,
253
267
  'sync_principal': value.syncPrincipal,
@@ -19,6 +19,12 @@ import {
19
19
  GroupMatchingModeEnumFromJSONTyped,
20
20
  GroupMatchingModeEnumToJSON,
21
21
  } from './GroupMatchingModeEnum';
22
+ import type { KadminTypeEnum } from './KadminTypeEnum';
23
+ import {
24
+ KadminTypeEnumFromJSON,
25
+ KadminTypeEnumFromJSONTyped,
26
+ KadminTypeEnumToJSON,
27
+ } from './KadminTypeEnum';
22
28
  import type { PolicyEngineMode } from './PolicyEngineMode';
23
29
  import {
24
30
  PolicyEngineModeFromJSON,
@@ -116,6 +122,12 @@ export interface PatchedKerberosSourceRequest {
116
122
  * @memberof PatchedKerberosSourceRequest
117
123
  */
118
124
  krb5Conf?: string;
125
+ /**
126
+ *
127
+ * @type {KadminTypeEnum}
128
+ * @memberof PatchedKerberosSourceRequest
129
+ */
130
+ kadminType?: KadminTypeEnum;
119
131
  /**
120
132
  * Sync users from Kerberos into authentik
121
133
  * @type {boolean}
@@ -210,6 +222,7 @@ export function PatchedKerberosSourceRequestFromJSONTyped(json: any, ignoreDiscr
210
222
  'groupMatchingMode': !exists(json, 'group_matching_mode') ? undefined : GroupMatchingModeEnumFromJSON(json['group_matching_mode']),
211
223
  'realm': !exists(json, 'realm') ? undefined : json['realm'],
212
224
  'krb5Conf': !exists(json, 'krb5_conf') ? undefined : json['krb5_conf'],
225
+ 'kadminType': !exists(json, 'kadmin_type') ? undefined : KadminTypeEnumFromJSON(json['kadmin_type']),
213
226
  'syncUsers': !exists(json, 'sync_users') ? undefined : json['sync_users'],
214
227
  'syncUsersPassword': !exists(json, 'sync_users_password') ? undefined : json['sync_users_password'],
215
228
  'syncPrincipal': !exists(json, 'sync_principal') ? undefined : json['sync_principal'],
@@ -245,6 +258,7 @@ export function PatchedKerberosSourceRequestToJSON(value?: PatchedKerberosSource
245
258
  'group_matching_mode': GroupMatchingModeEnumToJSON(value.groupMatchingMode),
246
259
  'realm': value.realm,
247
260
  'krb5_conf': value.krb5Conf,
261
+ 'kadmin_type': KadminTypeEnumToJSON(value.kadminType),
248
262
  'sync_users': value.syncUsers,
249
263
  'sync_users_password': value.syncUsersPassword,
250
264
  'sync_principal': value.syncPrincipal,
@@ -184,6 +184,7 @@ export * from './InvitationRequest';
184
184
  export * from './InvitationStage';
185
185
  export * from './InvitationStageRequest';
186
186
  export * from './IssuerModeEnum';
187
+ export * from './KadminTypeEnum';
187
188
  export * from './KerberosSource';
188
189
  export * from './KerberosSourcePropertyMapping';
189
190
  export * from './KerberosSourcePropertyMappingRequest';