@goauthentik/api 2024.6.3-1723468407 → 2024.6.3-1723645891
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +1 -0
- package/dist/apis/OutpostsApi.d.ts +16 -4
- package/dist/apis/OutpostsApi.js +42 -4
- package/dist/apis/ProvidersApi.d.ts +0 -2
- package/dist/apis/ProvidersApi.js +0 -6
- package/dist/esm/apis/OutpostsApi.d.ts +16 -4
- package/dist/esm/apis/OutpostsApi.js +43 -5
- package/dist/esm/apis/ProvidersApi.d.ts +0 -2
- package/dist/esm/apis/ProvidersApi.js +0 -6
- package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
- package/dist/esm/models/LDAPCheckAccess.js +47 -0
- package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
- package/dist/esm/models/LDAPOutpostConfig.js +0 -2
- package/dist/esm/models/LDAPProvider.d.ts +0 -6
- package/dist/esm/models/LDAPProvider.js +0 -2
- package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
- package/dist/esm/models/LDAPProviderRequest.js +0 -2
- package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
- package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
- package/dist/esm/models/Version.d.ts +6 -0
- package/dist/esm/models/Version.js +2 -0
- package/dist/esm/models/index.d.ts +1 -0
- package/dist/esm/models/index.js +1 -0
- package/dist/models/LDAPCheckAccess.d.ts +38 -0
- package/dist/models/LDAPCheckAccess.js +54 -0
- package/dist/models/LDAPOutpostConfig.d.ts +0 -6
- package/dist/models/LDAPOutpostConfig.js +0 -2
- package/dist/models/LDAPProvider.d.ts +0 -6
- package/dist/models/LDAPProvider.js +0 -2
- package/dist/models/LDAPProviderRequest.d.ts +0 -6
- package/dist/models/LDAPProviderRequest.js +0 -2
- package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
- package/dist/models/PatchedLDAPProviderRequest.js +0 -2
- package/dist/models/Version.d.ts +6 -0
- package/dist/models/Version.js +2 -0
- package/dist/models/index.d.ts +1 -0
- package/dist/models/index.js +1 -0
- package/package.json +1 -1
- package/src/apis/OutpostsApi.ts +55 -5
- package/src/apis/ProvidersApi.ts +0 -10
- package/src/models/LDAPCheckAccess.ts +81 -0
- package/src/models/LDAPOutpostConfig.ts +0 -8
- package/src/models/LDAPProvider.ts +0 -8
- package/src/models/LDAPProviderRequest.ts +0 -8
- package/src/models/PatchedLDAPProviderRequest.ts +0 -8
- package/src/models/Version.ts +8 -0
- package/src/models/index.ts +1 -0
package/.openapi-generator/FILES
CHANGED
|
@@ -204,6 +204,7 @@ src/models/IssuerModeEnum.ts
|
|
|
204
204
|
src/models/KubernetesServiceConnection.ts
|
|
205
205
|
src/models/KubernetesServiceConnectionRequest.ts
|
|
206
206
|
src/models/LDAPAPIAccessMode.ts
|
|
207
|
+
src/models/LDAPCheckAccess.ts
|
|
207
208
|
src/models/LDAPDebug.ts
|
|
208
209
|
src/models/LDAPOutpostConfig.ts
|
|
209
210
|
src/models/LDAPProvider.ts
|
|
@@ -10,7 +10,7 @@
|
|
|
10
10
|
* Do not edit the class manually.
|
|
11
11
|
*/
|
|
12
12
|
import * as runtime from '../runtime';
|
|
13
|
-
import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
|
|
13
|
+
import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
|
|
14
14
|
export interface OutpostsInstancesCreateRequest {
|
|
15
15
|
outpostRequest: OutpostRequest;
|
|
16
16
|
}
|
|
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
|
|
|
58
58
|
export interface OutpostsInstancesUsedByListRequest {
|
|
59
59
|
uuid: string;
|
|
60
60
|
}
|
|
61
|
+
export interface OutpostsLdapAccessCheckRequest {
|
|
62
|
+
id: number;
|
|
63
|
+
appSlug?: string;
|
|
64
|
+
}
|
|
61
65
|
export interface OutpostsLdapListRequest {
|
|
62
66
|
name?: string;
|
|
63
67
|
ordering?: string;
|
|
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
|
|
|
72
76
|
pageSize?: number;
|
|
73
77
|
search?: string;
|
|
74
78
|
}
|
|
75
|
-
export interface
|
|
79
|
+
export interface OutpostsRadiusAccessCheckRequest {
|
|
76
80
|
id: number;
|
|
77
81
|
appSlug?: string;
|
|
78
82
|
}
|
|
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
|
|
|
237
241
|
* Get a list of all objects that use this object
|
|
238
242
|
*/
|
|
239
243
|
outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
|
|
244
|
+
/**
|
|
245
|
+
* Check access to a single application by slug
|
|
246
|
+
*/
|
|
247
|
+
outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
|
|
248
|
+
/**
|
|
249
|
+
* Check access to a single application by slug
|
|
250
|
+
*/
|
|
251
|
+
outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
|
|
240
252
|
/**
|
|
241
253
|
* LDAPProvider Viewset
|
|
242
254
|
*/
|
|
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
|
|
|
256
268
|
/**
|
|
257
269
|
* Check access to a single application by slug
|
|
258
270
|
*/
|
|
259
|
-
|
|
271
|
+
outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
|
|
260
272
|
/**
|
|
261
273
|
* Check access to a single application by slug
|
|
262
274
|
*/
|
|
263
|
-
|
|
275
|
+
outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
|
|
264
276
|
/**
|
|
265
277
|
* RadiusProvider Viewset
|
|
266
278
|
*/
|
package/dist/apis/OutpostsApi.js
CHANGED
|
@@ -412,6 +412,44 @@ class OutpostsApi extends runtime.BaseAPI {
|
|
|
412
412
|
return yield response.value();
|
|
413
413
|
});
|
|
414
414
|
}
|
|
415
|
+
/**
|
|
416
|
+
* Check access to a single application by slug
|
|
417
|
+
*/
|
|
418
|
+
outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
|
|
419
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
420
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
421
|
+
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
|
|
422
|
+
}
|
|
423
|
+
const queryParameters = {};
|
|
424
|
+
if (requestParameters.appSlug !== undefined) {
|
|
425
|
+
queryParameters['app_slug'] = requestParameters.appSlug;
|
|
426
|
+
}
|
|
427
|
+
const headerParameters = {};
|
|
428
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
429
|
+
const token = this.configuration.accessToken;
|
|
430
|
+
const tokenString = yield token("authentik", []);
|
|
431
|
+
if (tokenString) {
|
|
432
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
433
|
+
}
|
|
434
|
+
}
|
|
435
|
+
const response = yield this.request({
|
|
436
|
+
path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
437
|
+
method: 'GET',
|
|
438
|
+
headers: headerParameters,
|
|
439
|
+
query: queryParameters,
|
|
440
|
+
}, initOverrides);
|
|
441
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.LDAPCheckAccessFromJSON)(jsonValue));
|
|
442
|
+
});
|
|
443
|
+
}
|
|
444
|
+
/**
|
|
445
|
+
* Check access to a single application by slug
|
|
446
|
+
*/
|
|
447
|
+
outpostsLdapAccessCheck(requestParameters, initOverrides) {
|
|
448
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
449
|
+
const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
|
|
450
|
+
return yield response.value();
|
|
451
|
+
});
|
|
452
|
+
}
|
|
415
453
|
/**
|
|
416
454
|
* LDAPProvider Viewset
|
|
417
455
|
*/
|
|
@@ -509,10 +547,10 @@ class OutpostsApi extends runtime.BaseAPI {
|
|
|
509
547
|
/**
|
|
510
548
|
* Check access to a single application by slug
|
|
511
549
|
*/
|
|
512
|
-
|
|
550
|
+
outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
|
|
513
551
|
return __awaiter(this, void 0, void 0, function* () {
|
|
514
552
|
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
515
|
-
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling
|
|
553
|
+
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
|
|
516
554
|
}
|
|
517
555
|
const queryParameters = {};
|
|
518
556
|
if (requestParameters.appSlug !== undefined) {
|
|
@@ -538,9 +576,9 @@ class OutpostsApi extends runtime.BaseAPI {
|
|
|
538
576
|
/**
|
|
539
577
|
* Check access to a single application by slug
|
|
540
578
|
*/
|
|
541
|
-
|
|
579
|
+
outpostsRadiusAccessCheck(requestParameters, initOverrides) {
|
|
542
580
|
return __awaiter(this, void 0, void 0, function* () {
|
|
543
|
-
const response = yield this.
|
|
581
|
+
const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
|
|
544
582
|
return yield response.value();
|
|
545
583
|
});
|
|
546
584
|
}
|
|
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
|
|
|
121
121
|
page?: number;
|
|
122
122
|
pageSize?: number;
|
|
123
123
|
search?: string;
|
|
124
|
-
searchGroupGroupUuidIexact?: string;
|
|
125
|
-
searchGroupNameIexact?: string;
|
|
126
124
|
tlsServerNameIexact?: string;
|
|
127
125
|
uidStartNumberIexact?: number;
|
|
128
126
|
}
|
|
@@ -1022,12 +1022,6 @@ class ProvidersApi extends runtime.BaseAPI {
|
|
|
1022
1022
|
if (requestParameters.search !== undefined) {
|
|
1023
1023
|
queryParameters['search'] = requestParameters.search;
|
|
1024
1024
|
}
|
|
1025
|
-
if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
|
|
1026
|
-
queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
|
|
1027
|
-
}
|
|
1028
|
-
if (requestParameters.searchGroupNameIexact !== undefined) {
|
|
1029
|
-
queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
|
|
1030
|
-
}
|
|
1031
1025
|
if (requestParameters.tlsServerNameIexact !== undefined) {
|
|
1032
1026
|
queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
|
|
1033
1027
|
}
|
|
@@ -10,7 +10,7 @@
|
|
|
10
10
|
* Do not edit the class manually.
|
|
11
11
|
*/
|
|
12
12
|
import * as runtime from '../runtime';
|
|
13
|
-
import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
|
|
13
|
+
import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
|
|
14
14
|
export interface OutpostsInstancesCreateRequest {
|
|
15
15
|
outpostRequest: OutpostRequest;
|
|
16
16
|
}
|
|
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
|
|
|
58
58
|
export interface OutpostsInstancesUsedByListRequest {
|
|
59
59
|
uuid: string;
|
|
60
60
|
}
|
|
61
|
+
export interface OutpostsLdapAccessCheckRequest {
|
|
62
|
+
id: number;
|
|
63
|
+
appSlug?: string;
|
|
64
|
+
}
|
|
61
65
|
export interface OutpostsLdapListRequest {
|
|
62
66
|
name?: string;
|
|
63
67
|
ordering?: string;
|
|
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
|
|
|
72
76
|
pageSize?: number;
|
|
73
77
|
search?: string;
|
|
74
78
|
}
|
|
75
|
-
export interface
|
|
79
|
+
export interface OutpostsRadiusAccessCheckRequest {
|
|
76
80
|
id: number;
|
|
77
81
|
appSlug?: string;
|
|
78
82
|
}
|
|
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
|
|
|
237
241
|
* Get a list of all objects that use this object
|
|
238
242
|
*/
|
|
239
243
|
outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
|
|
244
|
+
/**
|
|
245
|
+
* Check access to a single application by slug
|
|
246
|
+
*/
|
|
247
|
+
outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
|
|
248
|
+
/**
|
|
249
|
+
* Check access to a single application by slug
|
|
250
|
+
*/
|
|
251
|
+
outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
|
|
240
252
|
/**
|
|
241
253
|
* LDAPProvider Viewset
|
|
242
254
|
*/
|
|
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
|
|
|
256
268
|
/**
|
|
257
269
|
* Check access to a single application by slug
|
|
258
270
|
*/
|
|
259
|
-
|
|
271
|
+
outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
|
|
260
272
|
/**
|
|
261
273
|
* Check access to a single application by slug
|
|
262
274
|
*/
|
|
263
|
-
|
|
275
|
+
outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
|
|
264
276
|
/**
|
|
265
277
|
* RadiusProvider Viewset
|
|
266
278
|
*/
|
|
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|
|
21
21
|
});
|
|
22
22
|
};
|
|
23
23
|
import * as runtime from '../runtime';
|
|
24
|
-
import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
|
|
24
|
+
import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, LDAPCheckAccessFromJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
|
|
25
25
|
/**
|
|
26
26
|
*
|
|
27
27
|
*/
|
|
@@ -409,6 +409,44 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
409
409
|
return yield response.value();
|
|
410
410
|
});
|
|
411
411
|
}
|
|
412
|
+
/**
|
|
413
|
+
* Check access to a single application by slug
|
|
414
|
+
*/
|
|
415
|
+
outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
|
|
416
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
417
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
418
|
+
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
|
|
419
|
+
}
|
|
420
|
+
const queryParameters = {};
|
|
421
|
+
if (requestParameters.appSlug !== undefined) {
|
|
422
|
+
queryParameters['app_slug'] = requestParameters.appSlug;
|
|
423
|
+
}
|
|
424
|
+
const headerParameters = {};
|
|
425
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
426
|
+
const token = this.configuration.accessToken;
|
|
427
|
+
const tokenString = yield token("authentik", []);
|
|
428
|
+
if (tokenString) {
|
|
429
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
430
|
+
}
|
|
431
|
+
}
|
|
432
|
+
const response = yield this.request({
|
|
433
|
+
path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
434
|
+
method: 'GET',
|
|
435
|
+
headers: headerParameters,
|
|
436
|
+
query: queryParameters,
|
|
437
|
+
}, initOverrides);
|
|
438
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
|
|
439
|
+
});
|
|
440
|
+
}
|
|
441
|
+
/**
|
|
442
|
+
* Check access to a single application by slug
|
|
443
|
+
*/
|
|
444
|
+
outpostsLdapAccessCheck(requestParameters, initOverrides) {
|
|
445
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
446
|
+
const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
|
|
447
|
+
return yield response.value();
|
|
448
|
+
});
|
|
449
|
+
}
|
|
412
450
|
/**
|
|
413
451
|
* LDAPProvider Viewset
|
|
414
452
|
*/
|
|
@@ -506,10 +544,10 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
506
544
|
/**
|
|
507
545
|
* Check access to a single application by slug
|
|
508
546
|
*/
|
|
509
|
-
|
|
547
|
+
outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
|
|
510
548
|
return __awaiter(this, void 0, void 0, function* () {
|
|
511
549
|
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
512
|
-
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling
|
|
550
|
+
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
|
|
513
551
|
}
|
|
514
552
|
const queryParameters = {};
|
|
515
553
|
if (requestParameters.appSlug !== undefined) {
|
|
@@ -535,9 +573,9 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
535
573
|
/**
|
|
536
574
|
* Check access to a single application by slug
|
|
537
575
|
*/
|
|
538
|
-
|
|
576
|
+
outpostsRadiusAccessCheck(requestParameters, initOverrides) {
|
|
539
577
|
return __awaiter(this, void 0, void 0, function* () {
|
|
540
|
-
const response = yield this.
|
|
578
|
+
const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
|
|
541
579
|
return yield response.value();
|
|
542
580
|
});
|
|
543
581
|
}
|
|
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
|
|
|
121
121
|
page?: number;
|
|
122
122
|
pageSize?: number;
|
|
123
123
|
search?: string;
|
|
124
|
-
searchGroupGroupUuidIexact?: string;
|
|
125
|
-
searchGroupNameIexact?: string;
|
|
126
124
|
tlsServerNameIexact?: string;
|
|
127
125
|
uidStartNumberIexact?: number;
|
|
128
126
|
}
|
|
@@ -1019,12 +1019,6 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
1019
1019
|
if (requestParameters.search !== undefined) {
|
|
1020
1020
|
queryParameters['search'] = requestParameters.search;
|
|
1021
1021
|
}
|
|
1022
|
-
if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
|
|
1023
|
-
queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
|
|
1024
|
-
}
|
|
1025
|
-
if (requestParameters.searchGroupNameIexact !== undefined) {
|
|
1026
|
-
queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
|
|
1027
|
-
}
|
|
1028
1022
|
if (requestParameters.tlsServerNameIexact !== undefined) {
|
|
1029
1023
|
queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
|
|
1030
1024
|
}
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2024.6.3
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import type { PolicyTestResult } from './PolicyTestResult';
|
|
13
|
+
/**
|
|
14
|
+
* Base serializer class which doesn't implement create/update methods
|
|
15
|
+
* @export
|
|
16
|
+
* @interface LDAPCheckAccess
|
|
17
|
+
*/
|
|
18
|
+
export interface LDAPCheckAccess {
|
|
19
|
+
/**
|
|
20
|
+
*
|
|
21
|
+
* @type {boolean}
|
|
22
|
+
* @memberof LDAPCheckAccess
|
|
23
|
+
*/
|
|
24
|
+
hasSearchPermission?: boolean;
|
|
25
|
+
/**
|
|
26
|
+
*
|
|
27
|
+
* @type {PolicyTestResult}
|
|
28
|
+
* @memberof LDAPCheckAccess
|
|
29
|
+
*/
|
|
30
|
+
access: PolicyTestResult;
|
|
31
|
+
}
|
|
32
|
+
/**
|
|
33
|
+
* Check if a given object implements the LDAPCheckAccess interface.
|
|
34
|
+
*/
|
|
35
|
+
export declare function instanceOfLDAPCheckAccess(value: object): boolean;
|
|
36
|
+
export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
|
|
37
|
+
export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
|
|
38
|
+
export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* authentik
|
|
5
|
+
* Making authentication simple.
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 2024.6.3
|
|
8
|
+
* Contact: hello@goauthentik.io
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
import { exists } from '../runtime';
|
|
15
|
+
import { PolicyTestResultFromJSON, PolicyTestResultToJSON, } from './PolicyTestResult';
|
|
16
|
+
/**
|
|
17
|
+
* Check if a given object implements the LDAPCheckAccess interface.
|
|
18
|
+
*/
|
|
19
|
+
export function instanceOfLDAPCheckAccess(value) {
|
|
20
|
+
let isInstance = true;
|
|
21
|
+
isInstance = isInstance && "access" in value;
|
|
22
|
+
return isInstance;
|
|
23
|
+
}
|
|
24
|
+
export function LDAPCheckAccessFromJSON(json) {
|
|
25
|
+
return LDAPCheckAccessFromJSONTyped(json, false);
|
|
26
|
+
}
|
|
27
|
+
export function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
|
|
28
|
+
if ((json === undefined) || (json === null)) {
|
|
29
|
+
return json;
|
|
30
|
+
}
|
|
31
|
+
return {
|
|
32
|
+
'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
|
|
33
|
+
'access': PolicyTestResultFromJSON(json['access']),
|
|
34
|
+
};
|
|
35
|
+
}
|
|
36
|
+
export function LDAPCheckAccessToJSON(value) {
|
|
37
|
+
if (value === undefined) {
|
|
38
|
+
return undefined;
|
|
39
|
+
}
|
|
40
|
+
if (value === null) {
|
|
41
|
+
return null;
|
|
42
|
+
}
|
|
43
|
+
return {
|
|
44
|
+
'has_search_permission': value.hasSearchPermission,
|
|
45
|
+
'access': PolicyTestResultToJSON(value.access),
|
|
46
|
+
};
|
|
47
|
+
}
|
|
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
|
|
|
46
46
|
* @memberof LDAPOutpostConfig
|
|
47
47
|
*/
|
|
48
48
|
readonly applicationSlug: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof LDAPOutpostConfig
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -37,7 +37,6 @@ export function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
37
37
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
38
38
|
'bindFlowSlug': json['bind_flow_slug'],
|
|
39
39
|
'applicationSlug': json['application_slug'],
|
|
40
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
41
40
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
42
41
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
43
42
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -58,7 +57,6 @@ export function LDAPOutpostConfigToJSON(value) {
|
|
|
58
57
|
'name': value.name,
|
|
59
58
|
'base_dn': value.baseDn,
|
|
60
59
|
'bind_flow_slug': value.bindFlowSlug,
|
|
61
|
-
'search_group': value.searchGroup,
|
|
62
60
|
'certificate': value.certificate,
|
|
63
61
|
'tls_server_name': value.tlsServerName,
|
|
64
62
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -100,12 +100,6 @@ export interface LDAPProvider {
|
|
|
100
100
|
* @memberof LDAPProvider
|
|
101
101
|
*/
|
|
102
102
|
baseDn?: string;
|
|
103
|
-
/**
|
|
104
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
105
|
-
* @type {string}
|
|
106
|
-
* @memberof LDAPProvider
|
|
107
|
-
*/
|
|
108
|
-
searchGroup?: string | null;
|
|
109
103
|
/**
|
|
110
104
|
*
|
|
111
105
|
* @type {string}
|
|
@@ -54,7 +54,6 @@ export function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
54
54
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
55
55
|
'metaModelName': json['meta_model_name'],
|
|
56
56
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
57
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
58
57
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
59
58
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
60
59
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -78,7 +77,6 @@ export function LDAPProviderToJSON(value) {
|
|
|
78
77
|
'authorization_flow': value.authorizationFlow,
|
|
79
78
|
'property_mappings': value.propertyMappings,
|
|
80
79
|
'base_dn': value.baseDn,
|
|
81
|
-
'search_group': value.searchGroup,
|
|
82
80
|
'certificate': value.certificate,
|
|
83
81
|
'tls_server_name': value.tlsServerName,
|
|
84
82
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
|
|
|
46
46
|
* @memberof LDAPProviderRequest
|
|
47
47
|
*/
|
|
48
48
|
baseDn?: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof LDAPProviderRequest
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -35,7 +35,6 @@ export function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
35
35
|
'authorizationFlow': json['authorization_flow'],
|
|
36
36
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
37
37
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
38
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
39
38
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
40
39
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
41
40
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -58,7 +57,6 @@ export function LDAPProviderRequestToJSON(value) {
|
|
|
58
57
|
'authorization_flow': value.authorizationFlow,
|
|
59
58
|
'property_mappings': value.propertyMappings,
|
|
60
59
|
'base_dn': value.baseDn,
|
|
61
|
-
'search_group': value.searchGroup,
|
|
62
60
|
'certificate': value.certificate,
|
|
63
61
|
'tls_server_name': value.tlsServerName,
|
|
64
62
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
|
|
|
46
46
|
* @memberof PatchedLDAPProviderRequest
|
|
47
47
|
*/
|
|
48
48
|
baseDn?: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof PatchedLDAPProviderRequest
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -33,7 +33,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminato
|
|
|
33
33
|
'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
|
|
34
34
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
35
35
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
36
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
37
36
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
38
37
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
39
38
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -56,7 +55,6 @@ export function PatchedLDAPProviderRequestToJSON(value) {
|
|
|
56
55
|
'authorization_flow': value.authorizationFlow,
|
|
57
56
|
'property_mappings': value.propertyMappings,
|
|
58
57
|
'base_dn': value.baseDn,
|
|
59
|
-
'search_group': value.searchGroup,
|
|
60
58
|
'certificate': value.certificate,
|
|
61
59
|
'tls_server_name': value.tlsServerName,
|
|
62
60
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -45,6 +45,12 @@ export interface Version {
|
|
|
45
45
|
* @memberof Version
|
|
46
46
|
*/
|
|
47
47
|
readonly outdated: boolean;
|
|
48
|
+
/**
|
|
49
|
+
* Check if any outpost is outdated/has a version mismatch
|
|
50
|
+
* @type {boolean}
|
|
51
|
+
* @memberof Version
|
|
52
|
+
*/
|
|
53
|
+
readonly outpostOutdated: boolean;
|
|
48
54
|
}
|
|
49
55
|
/**
|
|
50
56
|
* Check if a given object implements the Version interface.
|
|
@@ -21,6 +21,7 @@ export function instanceOfVersion(value) {
|
|
|
21
21
|
isInstance = isInstance && "versionLatestValid" in value;
|
|
22
22
|
isInstance = isInstance && "buildHash" in value;
|
|
23
23
|
isInstance = isInstance && "outdated" in value;
|
|
24
|
+
isInstance = isInstance && "outpostOutdated" in value;
|
|
24
25
|
return isInstance;
|
|
25
26
|
}
|
|
26
27
|
export function VersionFromJSON(json) {
|
|
@@ -36,6 +37,7 @@ export function VersionFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
36
37
|
'versionLatestValid': json['version_latest_valid'],
|
|
37
38
|
'buildHash': json['build_hash'],
|
|
38
39
|
'outdated': json['outdated'],
|
|
40
|
+
'outpostOutdated': json['outpost_outdated'],
|
|
39
41
|
};
|
|
40
42
|
}
|
|
41
43
|
export function VersionToJSON(value) {
|
|
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
|
|
|
177
177
|
export * from './KubernetesServiceConnection';
|
|
178
178
|
export * from './KubernetesServiceConnectionRequest';
|
|
179
179
|
export * from './LDAPAPIAccessMode';
|
|
180
|
+
export * from './LDAPCheckAccess';
|
|
180
181
|
export * from './LDAPDebug';
|
|
181
182
|
export * from './LDAPOutpostConfig';
|
|
182
183
|
export * from './LDAPProvider';
|
package/dist/esm/models/index.js
CHANGED
|
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
|
|
|
179
179
|
export * from './KubernetesServiceConnection';
|
|
180
180
|
export * from './KubernetesServiceConnectionRequest';
|
|
181
181
|
export * from './LDAPAPIAccessMode';
|
|
182
|
+
export * from './LDAPCheckAccess';
|
|
182
183
|
export * from './LDAPDebug';
|
|
183
184
|
export * from './LDAPOutpostConfig';
|
|
184
185
|
export * from './LDAPProvider';
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2024.6.3
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import type { PolicyTestResult } from './PolicyTestResult';
|
|
13
|
+
/**
|
|
14
|
+
* Base serializer class which doesn't implement create/update methods
|
|
15
|
+
* @export
|
|
16
|
+
* @interface LDAPCheckAccess
|
|
17
|
+
*/
|
|
18
|
+
export interface LDAPCheckAccess {
|
|
19
|
+
/**
|
|
20
|
+
*
|
|
21
|
+
* @type {boolean}
|
|
22
|
+
* @memberof LDAPCheckAccess
|
|
23
|
+
*/
|
|
24
|
+
hasSearchPermission?: boolean;
|
|
25
|
+
/**
|
|
26
|
+
*
|
|
27
|
+
* @type {PolicyTestResult}
|
|
28
|
+
* @memberof LDAPCheckAccess
|
|
29
|
+
*/
|
|
30
|
+
access: PolicyTestResult;
|
|
31
|
+
}
|
|
32
|
+
/**
|
|
33
|
+
* Check if a given object implements the LDAPCheckAccess interface.
|
|
34
|
+
*/
|
|
35
|
+
export declare function instanceOfLDAPCheckAccess(value: object): boolean;
|
|
36
|
+
export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
|
|
37
|
+
export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
|
|
38
|
+
export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
|
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/* tslint:disable */
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
/**
|
|
5
|
+
* authentik
|
|
6
|
+
* Making authentication simple.
|
|
7
|
+
*
|
|
8
|
+
* The version of the OpenAPI document: 2024.6.3
|
|
9
|
+
* Contact: hello@goauthentik.io
|
|
10
|
+
*
|
|
11
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
12
|
+
* https://openapi-generator.tech
|
|
13
|
+
* Do not edit the class manually.
|
|
14
|
+
*/
|
|
15
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
+
exports.LDAPCheckAccessToJSON = exports.LDAPCheckAccessFromJSONTyped = exports.LDAPCheckAccessFromJSON = exports.instanceOfLDAPCheckAccess = void 0;
|
|
17
|
+
const runtime_1 = require("../runtime");
|
|
18
|
+
const PolicyTestResult_1 = require("./PolicyTestResult");
|
|
19
|
+
/**
|
|
20
|
+
* Check if a given object implements the LDAPCheckAccess interface.
|
|
21
|
+
*/
|
|
22
|
+
function instanceOfLDAPCheckAccess(value) {
|
|
23
|
+
let isInstance = true;
|
|
24
|
+
isInstance = isInstance && "access" in value;
|
|
25
|
+
return isInstance;
|
|
26
|
+
}
|
|
27
|
+
exports.instanceOfLDAPCheckAccess = instanceOfLDAPCheckAccess;
|
|
28
|
+
function LDAPCheckAccessFromJSON(json) {
|
|
29
|
+
return LDAPCheckAccessFromJSONTyped(json, false);
|
|
30
|
+
}
|
|
31
|
+
exports.LDAPCheckAccessFromJSON = LDAPCheckAccessFromJSON;
|
|
32
|
+
function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
|
|
33
|
+
if ((json === undefined) || (json === null)) {
|
|
34
|
+
return json;
|
|
35
|
+
}
|
|
36
|
+
return {
|
|
37
|
+
'hasSearchPermission': !(0, runtime_1.exists)(json, 'has_search_permission') ? undefined : json['has_search_permission'],
|
|
38
|
+
'access': (0, PolicyTestResult_1.PolicyTestResultFromJSON)(json['access']),
|
|
39
|
+
};
|
|
40
|
+
}
|
|
41
|
+
exports.LDAPCheckAccessFromJSONTyped = LDAPCheckAccessFromJSONTyped;
|
|
42
|
+
function LDAPCheckAccessToJSON(value) {
|
|
43
|
+
if (value === undefined) {
|
|
44
|
+
return undefined;
|
|
45
|
+
}
|
|
46
|
+
if (value === null) {
|
|
47
|
+
return null;
|
|
48
|
+
}
|
|
49
|
+
return {
|
|
50
|
+
'has_search_permission': value.hasSearchPermission,
|
|
51
|
+
'access': (0, PolicyTestResult_1.PolicyTestResultToJSON)(value.access),
|
|
52
|
+
};
|
|
53
|
+
}
|
|
54
|
+
exports.LDAPCheckAccessToJSON = LDAPCheckAccessToJSON;
|
|
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
|
|
|
46
46
|
* @memberof LDAPOutpostConfig
|
|
47
47
|
*/
|
|
48
48
|
readonly applicationSlug: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof LDAPOutpostConfig
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -42,7 +42,6 @@ function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
42
42
|
'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
|
|
43
43
|
'bindFlowSlug': json['bind_flow_slug'],
|
|
44
44
|
'applicationSlug': json['application_slug'],
|
|
45
|
-
'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
|
|
46
45
|
'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
|
|
47
46
|
'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
48
47
|
'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -64,7 +63,6 @@ function LDAPOutpostConfigToJSON(value) {
|
|
|
64
63
|
'name': value.name,
|
|
65
64
|
'base_dn': value.baseDn,
|
|
66
65
|
'bind_flow_slug': value.bindFlowSlug,
|
|
67
|
-
'search_group': value.searchGroup,
|
|
68
66
|
'certificate': value.certificate,
|
|
69
67
|
'tls_server_name': value.tlsServerName,
|
|
70
68
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -100,12 +100,6 @@ export interface LDAPProvider {
|
|
|
100
100
|
* @memberof LDAPProvider
|
|
101
101
|
*/
|
|
102
102
|
baseDn?: string;
|
|
103
|
-
/**
|
|
104
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
105
|
-
* @type {string}
|
|
106
|
-
* @memberof LDAPProvider
|
|
107
|
-
*/
|
|
108
|
-
searchGroup?: string | null;
|
|
109
103
|
/**
|
|
110
104
|
*
|
|
111
105
|
* @type {string}
|
|
@@ -59,7 +59,6 @@ function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
59
59
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
60
60
|
'metaModelName': json['meta_model_name'],
|
|
61
61
|
'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
|
|
62
|
-
'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
|
|
63
62
|
'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
|
|
64
63
|
'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
65
64
|
'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -84,7 +83,6 @@ function LDAPProviderToJSON(value) {
|
|
|
84
83
|
'authorization_flow': value.authorizationFlow,
|
|
85
84
|
'property_mappings': value.propertyMappings,
|
|
86
85
|
'base_dn': value.baseDn,
|
|
87
|
-
'search_group': value.searchGroup,
|
|
88
86
|
'certificate': value.certificate,
|
|
89
87
|
'tls_server_name': value.tlsServerName,
|
|
90
88
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
|
|
|
46
46
|
* @memberof LDAPProviderRequest
|
|
47
47
|
*/
|
|
48
48
|
baseDn?: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof LDAPProviderRequest
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -40,7 +40,6 @@ function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
40
40
|
'authorizationFlow': json['authorization_flow'],
|
|
41
41
|
'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
42
42
|
'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
|
|
43
|
-
'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
|
|
44
43
|
'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
|
|
45
44
|
'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
46
45
|
'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -64,7 +63,6 @@ function LDAPProviderRequestToJSON(value) {
|
|
|
64
63
|
'authorization_flow': value.authorizationFlow,
|
|
65
64
|
'property_mappings': value.propertyMappings,
|
|
66
65
|
'base_dn': value.baseDn,
|
|
67
|
-
'search_group': value.searchGroup,
|
|
68
66
|
'certificate': value.certificate,
|
|
69
67
|
'tls_server_name': value.tlsServerName,
|
|
70
68
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
|
|
|
46
46
|
* @memberof PatchedLDAPProviderRequest
|
|
47
47
|
*/
|
|
48
48
|
baseDn?: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof PatchedLDAPProviderRequest
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -38,7 +38,6 @@ function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
38
38
|
'authorizationFlow': !(0, runtime_1.exists)(json, 'authorization_flow') ? undefined : json['authorization_flow'],
|
|
39
39
|
'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
40
40
|
'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
|
|
41
|
-
'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
|
|
42
41
|
'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
|
|
43
42
|
'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
44
43
|
'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -62,7 +61,6 @@ function PatchedLDAPProviderRequestToJSON(value) {
|
|
|
62
61
|
'authorization_flow': value.authorizationFlow,
|
|
63
62
|
'property_mappings': value.propertyMappings,
|
|
64
63
|
'base_dn': value.baseDn,
|
|
65
|
-
'search_group': value.searchGroup,
|
|
66
64
|
'certificate': value.certificate,
|
|
67
65
|
'tls_server_name': value.tlsServerName,
|
|
68
66
|
'uid_start_number': value.uidStartNumber,
|
package/dist/models/Version.d.ts
CHANGED
|
@@ -45,6 +45,12 @@ export interface Version {
|
|
|
45
45
|
* @memberof Version
|
|
46
46
|
*/
|
|
47
47
|
readonly outdated: boolean;
|
|
48
|
+
/**
|
|
49
|
+
* Check if any outpost is outdated/has a version mismatch
|
|
50
|
+
* @type {boolean}
|
|
51
|
+
* @memberof Version
|
|
52
|
+
*/
|
|
53
|
+
readonly outpostOutdated: boolean;
|
|
48
54
|
}
|
|
49
55
|
/**
|
|
50
56
|
* Check if a given object implements the Version interface.
|
package/dist/models/Version.js
CHANGED
|
@@ -24,6 +24,7 @@ function instanceOfVersion(value) {
|
|
|
24
24
|
isInstance = isInstance && "versionLatestValid" in value;
|
|
25
25
|
isInstance = isInstance && "buildHash" in value;
|
|
26
26
|
isInstance = isInstance && "outdated" in value;
|
|
27
|
+
isInstance = isInstance && "outpostOutdated" in value;
|
|
27
28
|
return isInstance;
|
|
28
29
|
}
|
|
29
30
|
exports.instanceOfVersion = instanceOfVersion;
|
|
@@ -41,6 +42,7 @@ function VersionFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
41
42
|
'versionLatestValid': json['version_latest_valid'],
|
|
42
43
|
'buildHash': json['build_hash'],
|
|
43
44
|
'outdated': json['outdated'],
|
|
45
|
+
'outpostOutdated': json['outpost_outdated'],
|
|
44
46
|
};
|
|
45
47
|
}
|
|
46
48
|
exports.VersionFromJSONTyped = VersionFromJSONTyped;
|
package/dist/models/index.d.ts
CHANGED
|
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
|
|
|
177
177
|
export * from './KubernetesServiceConnection';
|
|
178
178
|
export * from './KubernetesServiceConnectionRequest';
|
|
179
179
|
export * from './LDAPAPIAccessMode';
|
|
180
|
+
export * from './LDAPCheckAccess';
|
|
180
181
|
export * from './LDAPDebug';
|
|
181
182
|
export * from './LDAPOutpostConfig';
|
|
182
183
|
export * from './LDAPProvider';
|
package/dist/models/index.js
CHANGED
|
@@ -195,6 +195,7 @@ __exportStar(require("./IssuerModeEnum"), exports);
|
|
|
195
195
|
__exportStar(require("./KubernetesServiceConnection"), exports);
|
|
196
196
|
__exportStar(require("./KubernetesServiceConnectionRequest"), exports);
|
|
197
197
|
__exportStar(require("./LDAPAPIAccessMode"), exports);
|
|
198
|
+
__exportStar(require("./LDAPCheckAccess"), exports);
|
|
198
199
|
__exportStar(require("./LDAPDebug"), exports);
|
|
199
200
|
__exportStar(require("./LDAPOutpostConfig"), exports);
|
|
200
201
|
__exportStar(require("./LDAPProvider"), exports);
|
package/package.json
CHANGED
package/src/apis/OutpostsApi.ts
CHANGED
|
@@ -20,6 +20,7 @@ import type {
|
|
|
20
20
|
GenericError,
|
|
21
21
|
KubernetesServiceConnection,
|
|
22
22
|
KubernetesServiceConnectionRequest,
|
|
23
|
+
LDAPCheckAccess,
|
|
23
24
|
Outpost,
|
|
24
25
|
OutpostDefaultConfig,
|
|
25
26
|
OutpostHealth,
|
|
@@ -52,6 +53,8 @@ import {
|
|
|
52
53
|
KubernetesServiceConnectionToJSON,
|
|
53
54
|
KubernetesServiceConnectionRequestFromJSON,
|
|
54
55
|
KubernetesServiceConnectionRequestToJSON,
|
|
56
|
+
LDAPCheckAccessFromJSON,
|
|
57
|
+
LDAPCheckAccessToJSON,
|
|
55
58
|
OutpostFromJSON,
|
|
56
59
|
OutpostToJSON,
|
|
57
60
|
OutpostDefaultConfigFromJSON,
|
|
@@ -149,6 +152,11 @@ export interface OutpostsInstancesUsedByListRequest {
|
|
|
149
152
|
uuid: string;
|
|
150
153
|
}
|
|
151
154
|
|
|
155
|
+
export interface OutpostsLdapAccessCheckRequest {
|
|
156
|
+
id: number;
|
|
157
|
+
appSlug?: string;
|
|
158
|
+
}
|
|
159
|
+
|
|
152
160
|
export interface OutpostsLdapListRequest {
|
|
153
161
|
name?: string;
|
|
154
162
|
ordering?: string;
|
|
@@ -165,7 +173,7 @@ export interface OutpostsProxyListRequest {
|
|
|
165
173
|
search?: string;
|
|
166
174
|
}
|
|
167
175
|
|
|
168
|
-
export interface
|
|
176
|
+
export interface OutpostsRadiusAccessCheckRequest {
|
|
169
177
|
id: number;
|
|
170
178
|
appSlug?: string;
|
|
171
179
|
}
|
|
@@ -714,6 +722,48 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
714
722
|
return await response.value();
|
|
715
723
|
}
|
|
716
724
|
|
|
725
|
+
/**
|
|
726
|
+
* Check access to a single application by slug
|
|
727
|
+
*/
|
|
728
|
+
async outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>> {
|
|
729
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
730
|
+
throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
|
|
731
|
+
}
|
|
732
|
+
|
|
733
|
+
const queryParameters: any = {};
|
|
734
|
+
|
|
735
|
+
if (requestParameters.appSlug !== undefined) {
|
|
736
|
+
queryParameters['app_slug'] = requestParameters.appSlug;
|
|
737
|
+
}
|
|
738
|
+
|
|
739
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
740
|
+
|
|
741
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
742
|
+
const token = this.configuration.accessToken;
|
|
743
|
+
const tokenString = await token("authentik", []);
|
|
744
|
+
|
|
745
|
+
if (tokenString) {
|
|
746
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
747
|
+
}
|
|
748
|
+
}
|
|
749
|
+
const response = await this.request({
|
|
750
|
+
path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
751
|
+
method: 'GET',
|
|
752
|
+
headers: headerParameters,
|
|
753
|
+
query: queryParameters,
|
|
754
|
+
}, initOverrides);
|
|
755
|
+
|
|
756
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
|
|
757
|
+
}
|
|
758
|
+
|
|
759
|
+
/**
|
|
760
|
+
* Check access to a single application by slug
|
|
761
|
+
*/
|
|
762
|
+
async outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess> {
|
|
763
|
+
const response = await this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
|
|
764
|
+
return await response.value();
|
|
765
|
+
}
|
|
766
|
+
|
|
717
767
|
/**
|
|
718
768
|
* LDAPProvider Viewset
|
|
719
769
|
*/
|
|
@@ -825,9 +875,9 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
825
875
|
/**
|
|
826
876
|
* Check access to a single application by slug
|
|
827
877
|
*/
|
|
828
|
-
async
|
|
878
|
+
async outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>> {
|
|
829
879
|
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
830
|
-
throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling
|
|
880
|
+
throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
|
|
831
881
|
}
|
|
832
882
|
|
|
833
883
|
const queryParameters: any = {};
|
|
@@ -859,8 +909,8 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
859
909
|
/**
|
|
860
910
|
* Check access to a single application by slug
|
|
861
911
|
*/
|
|
862
|
-
async
|
|
863
|
-
const response = await this.
|
|
912
|
+
async outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess> {
|
|
913
|
+
const response = await this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
|
|
864
914
|
return await response.value();
|
|
865
915
|
}
|
|
866
916
|
|
package/src/apis/ProvidersApi.ts
CHANGED
|
@@ -345,8 +345,6 @@ export interface ProvidersLdapListRequest {
|
|
|
345
345
|
page?: number;
|
|
346
346
|
pageSize?: number;
|
|
347
347
|
search?: string;
|
|
348
|
-
searchGroupGroupUuidIexact?: string;
|
|
349
|
-
searchGroupNameIexact?: string;
|
|
350
348
|
tlsServerNameIexact?: string;
|
|
351
349
|
uidStartNumberIexact?: number;
|
|
352
350
|
}
|
|
@@ -1914,14 +1912,6 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
1914
1912
|
queryParameters['search'] = requestParameters.search;
|
|
1915
1913
|
}
|
|
1916
1914
|
|
|
1917
|
-
if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
|
|
1918
|
-
queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
|
|
1919
|
-
}
|
|
1920
|
-
|
|
1921
|
-
if (requestParameters.searchGroupNameIexact !== undefined) {
|
|
1922
|
-
queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
|
|
1923
|
-
}
|
|
1924
|
-
|
|
1925
1915
|
if (requestParameters.tlsServerNameIexact !== undefined) {
|
|
1926
1916
|
queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
|
|
1927
1917
|
}
|
|
@@ -0,0 +1,81 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* authentik
|
|
5
|
+
* Making authentication simple.
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 2024.6.3
|
|
8
|
+
* Contact: hello@goauthentik.io
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
|
|
15
|
+
import { exists, mapValues } from '../runtime';
|
|
16
|
+
import type { PolicyTestResult } from './PolicyTestResult';
|
|
17
|
+
import {
|
|
18
|
+
PolicyTestResultFromJSON,
|
|
19
|
+
PolicyTestResultFromJSONTyped,
|
|
20
|
+
PolicyTestResultToJSON,
|
|
21
|
+
} from './PolicyTestResult';
|
|
22
|
+
|
|
23
|
+
/**
|
|
24
|
+
* Base serializer class which doesn't implement create/update methods
|
|
25
|
+
* @export
|
|
26
|
+
* @interface LDAPCheckAccess
|
|
27
|
+
*/
|
|
28
|
+
export interface LDAPCheckAccess {
|
|
29
|
+
/**
|
|
30
|
+
*
|
|
31
|
+
* @type {boolean}
|
|
32
|
+
* @memberof LDAPCheckAccess
|
|
33
|
+
*/
|
|
34
|
+
hasSearchPermission?: boolean;
|
|
35
|
+
/**
|
|
36
|
+
*
|
|
37
|
+
* @type {PolicyTestResult}
|
|
38
|
+
* @memberof LDAPCheckAccess
|
|
39
|
+
*/
|
|
40
|
+
access: PolicyTestResult;
|
|
41
|
+
}
|
|
42
|
+
|
|
43
|
+
/**
|
|
44
|
+
* Check if a given object implements the LDAPCheckAccess interface.
|
|
45
|
+
*/
|
|
46
|
+
export function instanceOfLDAPCheckAccess(value: object): boolean {
|
|
47
|
+
let isInstance = true;
|
|
48
|
+
isInstance = isInstance && "access" in value;
|
|
49
|
+
|
|
50
|
+
return isInstance;
|
|
51
|
+
}
|
|
52
|
+
|
|
53
|
+
export function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess {
|
|
54
|
+
return LDAPCheckAccessFromJSONTyped(json, false);
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
export function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess {
|
|
58
|
+
if ((json === undefined) || (json === null)) {
|
|
59
|
+
return json;
|
|
60
|
+
}
|
|
61
|
+
return {
|
|
62
|
+
|
|
63
|
+
'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
|
|
64
|
+
'access': PolicyTestResultFromJSON(json['access']),
|
|
65
|
+
};
|
|
66
|
+
}
|
|
67
|
+
|
|
68
|
+
export function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any {
|
|
69
|
+
if (value === undefined) {
|
|
70
|
+
return undefined;
|
|
71
|
+
}
|
|
72
|
+
if (value === null) {
|
|
73
|
+
return null;
|
|
74
|
+
}
|
|
75
|
+
return {
|
|
76
|
+
|
|
77
|
+
'has_search_permission': value.hasSearchPermission,
|
|
78
|
+
'access': PolicyTestResultToJSON(value.access),
|
|
79
|
+
};
|
|
80
|
+
}
|
|
81
|
+
|
|
@@ -56,12 +56,6 @@ export interface LDAPOutpostConfig {
|
|
|
56
56
|
* @memberof LDAPOutpostConfig
|
|
57
57
|
*/
|
|
58
58
|
readonly applicationSlug: string;
|
|
59
|
-
/**
|
|
60
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
61
|
-
* @type {string}
|
|
62
|
-
* @memberof LDAPOutpostConfig
|
|
63
|
-
*/
|
|
64
|
-
searchGroup?: string | null;
|
|
65
59
|
/**
|
|
66
60
|
*
|
|
67
61
|
* @type {string}
|
|
@@ -134,7 +128,6 @@ export function LDAPOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator: b
|
|
|
134
128
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
135
129
|
'bindFlowSlug': json['bind_flow_slug'],
|
|
136
130
|
'applicationSlug': json['application_slug'],
|
|
137
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
138
131
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
139
132
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
140
133
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -157,7 +150,6 @@ export function LDAPOutpostConfigToJSON(value?: LDAPOutpostConfig | null): any {
|
|
|
157
150
|
'name': value.name,
|
|
158
151
|
'base_dn': value.baseDn,
|
|
159
152
|
'bind_flow_slug': value.bindFlowSlug,
|
|
160
|
-
'search_group': value.searchGroup,
|
|
161
153
|
'certificate': value.certificate,
|
|
162
154
|
'tls_server_name': value.tlsServerName,
|
|
163
155
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -110,12 +110,6 @@ export interface LDAPProvider {
|
|
|
110
110
|
* @memberof LDAPProvider
|
|
111
111
|
*/
|
|
112
112
|
baseDn?: string;
|
|
113
|
-
/**
|
|
114
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
115
|
-
* @type {string}
|
|
116
|
-
* @memberof LDAPProvider
|
|
117
|
-
*/
|
|
118
|
-
searchGroup?: string | null;
|
|
119
113
|
/**
|
|
120
114
|
*
|
|
121
115
|
* @type {string}
|
|
@@ -211,7 +205,6 @@ export function LDAPProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
|
|
|
211
205
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
212
206
|
'metaModelName': json['meta_model_name'],
|
|
213
207
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
214
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
215
208
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
216
209
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
217
210
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -237,7 +230,6 @@ export function LDAPProviderToJSON(value?: LDAPProvider | null): any {
|
|
|
237
230
|
'authorization_flow': value.authorizationFlow,
|
|
238
231
|
'property_mappings': value.propertyMappings,
|
|
239
232
|
'base_dn': value.baseDn,
|
|
240
|
-
'search_group': value.searchGroup,
|
|
241
233
|
'certificate': value.certificate,
|
|
242
234
|
'tls_server_name': value.tlsServerName,
|
|
243
235
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -56,12 +56,6 @@ export interface LDAPProviderRequest {
|
|
|
56
56
|
* @memberof LDAPProviderRequest
|
|
57
57
|
*/
|
|
58
58
|
baseDn?: string;
|
|
59
|
-
/**
|
|
60
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
61
|
-
* @type {string}
|
|
62
|
-
* @memberof LDAPProviderRequest
|
|
63
|
-
*/
|
|
64
|
-
searchGroup?: string | null;
|
|
65
59
|
/**
|
|
66
60
|
*
|
|
67
61
|
* @type {string}
|
|
@@ -132,7 +126,6 @@ export function LDAPProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
|
|
|
132
126
|
'authorizationFlow': json['authorization_flow'],
|
|
133
127
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
134
128
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
135
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
136
129
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
137
130
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
138
131
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -157,7 +150,6 @@ export function LDAPProviderRequestToJSON(value?: LDAPProviderRequest | null): a
|
|
|
157
150
|
'authorization_flow': value.authorizationFlow,
|
|
158
151
|
'property_mappings': value.propertyMappings,
|
|
159
152
|
'base_dn': value.baseDn,
|
|
160
|
-
'search_group': value.searchGroup,
|
|
161
153
|
'certificate': value.certificate,
|
|
162
154
|
'tls_server_name': value.tlsServerName,
|
|
163
155
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -56,12 +56,6 @@ export interface PatchedLDAPProviderRequest {
|
|
|
56
56
|
* @memberof PatchedLDAPProviderRequest
|
|
57
57
|
*/
|
|
58
58
|
baseDn?: string;
|
|
59
|
-
/**
|
|
60
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
61
|
-
* @type {string}
|
|
62
|
-
* @memberof PatchedLDAPProviderRequest
|
|
63
|
-
*/
|
|
64
|
-
searchGroup?: string | null;
|
|
65
59
|
/**
|
|
66
60
|
*
|
|
67
61
|
* @type {string}
|
|
@@ -130,7 +124,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json: any, ignoreDiscrim
|
|
|
130
124
|
'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
|
|
131
125
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
132
126
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
133
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
134
127
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
135
128
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
136
129
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -155,7 +148,6 @@ export function PatchedLDAPProviderRequestToJSON(value?: PatchedLDAPProviderRequ
|
|
|
155
148
|
'authorization_flow': value.authorizationFlow,
|
|
156
149
|
'property_mappings': value.propertyMappings,
|
|
157
150
|
'base_dn': value.baseDn,
|
|
158
|
-
'search_group': value.searchGroup,
|
|
159
151
|
'certificate': value.certificate,
|
|
160
152
|
'tls_server_name': value.tlsServerName,
|
|
161
153
|
'uid_start_number': value.uidStartNumber,
|
package/src/models/Version.ts
CHANGED
|
@@ -49,6 +49,12 @@ export interface Version {
|
|
|
49
49
|
* @memberof Version
|
|
50
50
|
*/
|
|
51
51
|
readonly outdated: boolean;
|
|
52
|
+
/**
|
|
53
|
+
* Check if any outpost is outdated/has a version mismatch
|
|
54
|
+
* @type {boolean}
|
|
55
|
+
* @memberof Version
|
|
56
|
+
*/
|
|
57
|
+
readonly outpostOutdated: boolean;
|
|
52
58
|
}
|
|
53
59
|
|
|
54
60
|
/**
|
|
@@ -61,6 +67,7 @@ export function instanceOfVersion(value: object): boolean {
|
|
|
61
67
|
isInstance = isInstance && "versionLatestValid" in value;
|
|
62
68
|
isInstance = isInstance && "buildHash" in value;
|
|
63
69
|
isInstance = isInstance && "outdated" in value;
|
|
70
|
+
isInstance = isInstance && "outpostOutdated" in value;
|
|
64
71
|
|
|
65
72
|
return isInstance;
|
|
66
73
|
}
|
|
@@ -80,6 +87,7 @@ export function VersionFromJSONTyped(json: any, ignoreDiscriminator: boolean): V
|
|
|
80
87
|
'versionLatestValid': json['version_latest_valid'],
|
|
81
88
|
'buildHash': json['build_hash'],
|
|
82
89
|
'outdated': json['outdated'],
|
|
90
|
+
'outpostOutdated': json['outpost_outdated'],
|
|
83
91
|
};
|
|
84
92
|
}
|
|
85
93
|
|
package/src/models/index.ts
CHANGED
|
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
|
|
|
179
179
|
export * from './KubernetesServiceConnection';
|
|
180
180
|
export * from './KubernetesServiceConnectionRequest';
|
|
181
181
|
export * from './LDAPAPIAccessMode';
|
|
182
|
+
export * from './LDAPCheckAccess';
|
|
182
183
|
export * from './LDAPDebug';
|
|
183
184
|
export * from './LDAPOutpostConfig';
|
|
184
185
|
export * from './LDAPProvider';
|