@goauthentik/api 2024.6.3-1723497462 → 2024.6.3-1723645891

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/OutpostsApi.d.ts +16 -4
  3. package/dist/apis/OutpostsApi.js +42 -4
  4. package/dist/apis/ProvidersApi.d.ts +0 -2
  5. package/dist/apis/ProvidersApi.js +0 -6
  6. package/dist/esm/apis/OutpostsApi.d.ts +16 -4
  7. package/dist/esm/apis/OutpostsApi.js +43 -5
  8. package/dist/esm/apis/ProvidersApi.d.ts +0 -2
  9. package/dist/esm/apis/ProvidersApi.js +0 -6
  10. package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
  11. package/dist/esm/models/LDAPCheckAccess.js +47 -0
  12. package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
  13. package/dist/esm/models/LDAPOutpostConfig.js +0 -2
  14. package/dist/esm/models/LDAPProvider.d.ts +0 -6
  15. package/dist/esm/models/LDAPProvider.js +0 -2
  16. package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
  17. package/dist/esm/models/LDAPProviderRequest.js +0 -2
  18. package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
  19. package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
  20. package/dist/esm/models/index.d.ts +1 -0
  21. package/dist/esm/models/index.js +1 -0
  22. package/dist/models/LDAPCheckAccess.d.ts +38 -0
  23. package/dist/models/LDAPCheckAccess.js +54 -0
  24. package/dist/models/LDAPOutpostConfig.d.ts +0 -6
  25. package/dist/models/LDAPOutpostConfig.js +0 -2
  26. package/dist/models/LDAPProvider.d.ts +0 -6
  27. package/dist/models/LDAPProvider.js +0 -2
  28. package/dist/models/LDAPProviderRequest.d.ts +0 -6
  29. package/dist/models/LDAPProviderRequest.js +0 -2
  30. package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
  31. package/dist/models/PatchedLDAPProviderRequest.js +0 -2
  32. package/dist/models/index.d.ts +1 -0
  33. package/dist/models/index.js +1 -0
  34. package/package.json +1 -1
  35. package/src/apis/OutpostsApi.ts +55 -5
  36. package/src/apis/ProvidersApi.ts +0 -10
  37. package/src/models/LDAPCheckAccess.ts +81 -0
  38. package/src/models/LDAPOutpostConfig.ts +0 -8
  39. package/src/models/LDAPProvider.ts +0 -8
  40. package/src/models/LDAPProviderRequest.ts +0 -8
  41. package/src/models/PatchedLDAPProviderRequest.ts +0 -8
  42. package/src/models/index.ts +1 -0
@@ -204,6 +204,7 @@ src/models/IssuerModeEnum.ts
204
204
  src/models/KubernetesServiceConnection.ts
205
205
  src/models/KubernetesServiceConnectionRequest.ts
206
206
  src/models/LDAPAPIAccessMode.ts
207
+ src/models/LDAPCheckAccess.ts
207
208
  src/models/LDAPDebug.ts
208
209
  src/models/LDAPOutpostConfig.ts
209
210
  src/models/LDAPProvider.ts
@@ -10,7 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
13
+ import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
14
14
  export interface OutpostsInstancesCreateRequest {
15
15
  outpostRequest: OutpostRequest;
16
16
  }
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
58
58
  export interface OutpostsInstancesUsedByListRequest {
59
59
  uuid: string;
60
60
  }
61
+ export interface OutpostsLdapAccessCheckRequest {
62
+ id: number;
63
+ appSlug?: string;
64
+ }
61
65
  export interface OutpostsLdapListRequest {
62
66
  name?: string;
63
67
  ordering?: string;
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
72
76
  pageSize?: number;
73
77
  search?: string;
74
78
  }
75
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
79
+ export interface OutpostsRadiusAccessCheckRequest {
76
80
  id: number;
77
81
  appSlug?: string;
78
82
  }
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
237
241
  * Get a list of all objects that use this object
238
242
  */
239
243
  outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
244
+ /**
245
+ * Check access to a single application by slug
246
+ */
247
+ outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
248
+ /**
249
+ * Check access to a single application by slug
250
+ */
251
+ outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
240
252
  /**
241
253
  * LDAPProvider Viewset
242
254
  */
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
256
268
  /**
257
269
  * Check access to a single application by slug
258
270
  */
259
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
271
+ outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
260
272
  /**
261
273
  * Check access to a single application by slug
262
274
  */
263
- outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
275
+ outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
264
276
  /**
265
277
  * RadiusProvider Viewset
266
278
  */
@@ -412,6 +412,44 @@ class OutpostsApi extends runtime.BaseAPI {
412
412
  return yield response.value();
413
413
  });
414
414
  }
415
+ /**
416
+ * Check access to a single application by slug
417
+ */
418
+ outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
419
+ return __awaiter(this, void 0, void 0, function* () {
420
+ if (requestParameters.id === null || requestParameters.id === undefined) {
421
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
422
+ }
423
+ const queryParameters = {};
424
+ if (requestParameters.appSlug !== undefined) {
425
+ queryParameters['app_slug'] = requestParameters.appSlug;
426
+ }
427
+ const headerParameters = {};
428
+ if (this.configuration && this.configuration.accessToken) {
429
+ const token = this.configuration.accessToken;
430
+ const tokenString = yield token("authentik", []);
431
+ if (tokenString) {
432
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
433
+ }
434
+ }
435
+ const response = yield this.request({
436
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
437
+ method: 'GET',
438
+ headers: headerParameters,
439
+ query: queryParameters,
440
+ }, initOverrides);
441
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.LDAPCheckAccessFromJSON)(jsonValue));
442
+ });
443
+ }
444
+ /**
445
+ * Check access to a single application by slug
446
+ */
447
+ outpostsLdapAccessCheck(requestParameters, initOverrides) {
448
+ return __awaiter(this, void 0, void 0, function* () {
449
+ const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
450
+ return yield response.value();
451
+ });
452
+ }
415
453
  /**
416
454
  * LDAPProvider Viewset
417
455
  */
@@ -509,10 +547,10 @@ class OutpostsApi extends runtime.BaseAPI {
509
547
  /**
510
548
  * Check access to a single application by slug
511
549
  */
512
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides) {
550
+ outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
513
551
  return __awaiter(this, void 0, void 0, function* () {
514
552
  if (requestParameters.id === null || requestParameters.id === undefined) {
515
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
553
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
516
554
  }
517
555
  const queryParameters = {};
518
556
  if (requestParameters.appSlug !== undefined) {
@@ -538,9 +576,9 @@ class OutpostsApi extends runtime.BaseAPI {
538
576
  /**
539
577
  * Check access to a single application by slug
540
578
  */
541
- outpostsRadiusCheckAccessRetrieve(requestParameters, initOverrides) {
579
+ outpostsRadiusAccessCheck(requestParameters, initOverrides) {
542
580
  return __awaiter(this, void 0, void 0, function* () {
543
- const response = yield this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
581
+ const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
544
582
  return yield response.value();
545
583
  });
546
584
  }
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
121
121
  page?: number;
122
122
  pageSize?: number;
123
123
  search?: string;
124
- searchGroupGroupUuidIexact?: string;
125
- searchGroupNameIexact?: string;
126
124
  tlsServerNameIexact?: string;
127
125
  uidStartNumberIexact?: number;
128
126
  }
@@ -1022,12 +1022,6 @@ class ProvidersApi extends runtime.BaseAPI {
1022
1022
  if (requestParameters.search !== undefined) {
1023
1023
  queryParameters['search'] = requestParameters.search;
1024
1024
  }
1025
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1026
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1027
- }
1028
- if (requestParameters.searchGroupNameIexact !== undefined) {
1029
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1030
- }
1031
1025
  if (requestParameters.tlsServerNameIexact !== undefined) {
1032
1026
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1033
1027
  }
@@ -10,7 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
13
+ import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
14
14
  export interface OutpostsInstancesCreateRequest {
15
15
  outpostRequest: OutpostRequest;
16
16
  }
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
58
58
  export interface OutpostsInstancesUsedByListRequest {
59
59
  uuid: string;
60
60
  }
61
+ export interface OutpostsLdapAccessCheckRequest {
62
+ id: number;
63
+ appSlug?: string;
64
+ }
61
65
  export interface OutpostsLdapListRequest {
62
66
  name?: string;
63
67
  ordering?: string;
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
72
76
  pageSize?: number;
73
77
  search?: string;
74
78
  }
75
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
79
+ export interface OutpostsRadiusAccessCheckRequest {
76
80
  id: number;
77
81
  appSlug?: string;
78
82
  }
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
237
241
  * Get a list of all objects that use this object
238
242
  */
239
243
  outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
244
+ /**
245
+ * Check access to a single application by slug
246
+ */
247
+ outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
248
+ /**
249
+ * Check access to a single application by slug
250
+ */
251
+ outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
240
252
  /**
241
253
  * LDAPProvider Viewset
242
254
  */
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
256
268
  /**
257
269
  * Check access to a single application by slug
258
270
  */
259
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
271
+ outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
260
272
  /**
261
273
  * Check access to a single application by slug
262
274
  */
263
- outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
275
+ outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
264
276
  /**
265
277
  * RadiusProvider Viewset
266
278
  */
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
21
21
  });
22
22
  };
23
23
  import * as runtime from '../runtime';
24
- import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
24
+ import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, LDAPCheckAccessFromJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
25
25
  /**
26
26
  *
27
27
  */
@@ -409,6 +409,44 @@ export class OutpostsApi extends runtime.BaseAPI {
409
409
  return yield response.value();
410
410
  });
411
411
  }
412
+ /**
413
+ * Check access to a single application by slug
414
+ */
415
+ outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
416
+ return __awaiter(this, void 0, void 0, function* () {
417
+ if (requestParameters.id === null || requestParameters.id === undefined) {
418
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
419
+ }
420
+ const queryParameters = {};
421
+ if (requestParameters.appSlug !== undefined) {
422
+ queryParameters['app_slug'] = requestParameters.appSlug;
423
+ }
424
+ const headerParameters = {};
425
+ if (this.configuration && this.configuration.accessToken) {
426
+ const token = this.configuration.accessToken;
427
+ const tokenString = yield token("authentik", []);
428
+ if (tokenString) {
429
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
430
+ }
431
+ }
432
+ const response = yield this.request({
433
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
434
+ method: 'GET',
435
+ headers: headerParameters,
436
+ query: queryParameters,
437
+ }, initOverrides);
438
+ return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
439
+ });
440
+ }
441
+ /**
442
+ * Check access to a single application by slug
443
+ */
444
+ outpostsLdapAccessCheck(requestParameters, initOverrides) {
445
+ return __awaiter(this, void 0, void 0, function* () {
446
+ const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
447
+ return yield response.value();
448
+ });
449
+ }
412
450
  /**
413
451
  * LDAPProvider Viewset
414
452
  */
@@ -506,10 +544,10 @@ export class OutpostsApi extends runtime.BaseAPI {
506
544
  /**
507
545
  * Check access to a single application by slug
508
546
  */
509
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides) {
547
+ outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
510
548
  return __awaiter(this, void 0, void 0, function* () {
511
549
  if (requestParameters.id === null || requestParameters.id === undefined) {
512
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
550
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
513
551
  }
514
552
  const queryParameters = {};
515
553
  if (requestParameters.appSlug !== undefined) {
@@ -535,9 +573,9 @@ export class OutpostsApi extends runtime.BaseAPI {
535
573
  /**
536
574
  * Check access to a single application by slug
537
575
  */
538
- outpostsRadiusCheckAccessRetrieve(requestParameters, initOverrides) {
576
+ outpostsRadiusAccessCheck(requestParameters, initOverrides) {
539
577
  return __awaiter(this, void 0, void 0, function* () {
540
- const response = yield this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
578
+ const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
541
579
  return yield response.value();
542
580
  });
543
581
  }
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
121
121
  page?: number;
122
122
  pageSize?: number;
123
123
  search?: string;
124
- searchGroupGroupUuidIexact?: string;
125
- searchGroupNameIexact?: string;
126
124
  tlsServerNameIexact?: string;
127
125
  uidStartNumberIexact?: number;
128
126
  }
@@ -1019,12 +1019,6 @@ export class ProvidersApi extends runtime.BaseAPI {
1019
1019
  if (requestParameters.search !== undefined) {
1020
1020
  queryParameters['search'] = requestParameters.search;
1021
1021
  }
1022
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1023
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1024
- }
1025
- if (requestParameters.searchGroupNameIexact !== undefined) {
1026
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1027
- }
1028
1022
  if (requestParameters.tlsServerNameIexact !== undefined) {
1029
1023
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1030
1024
  }
@@ -0,0 +1,38 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.6.3
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { PolicyTestResult } from './PolicyTestResult';
13
+ /**
14
+ * Base serializer class which doesn't implement create/update methods
15
+ * @export
16
+ * @interface LDAPCheckAccess
17
+ */
18
+ export interface LDAPCheckAccess {
19
+ /**
20
+ *
21
+ * @type {boolean}
22
+ * @memberof LDAPCheckAccess
23
+ */
24
+ hasSearchPermission?: boolean;
25
+ /**
26
+ *
27
+ * @type {PolicyTestResult}
28
+ * @memberof LDAPCheckAccess
29
+ */
30
+ access: PolicyTestResult;
31
+ }
32
+ /**
33
+ * Check if a given object implements the LDAPCheckAccess interface.
34
+ */
35
+ export declare function instanceOfLDAPCheckAccess(value: object): boolean;
36
+ export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
37
+ export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
38
+ export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
@@ -0,0 +1,47 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.6.3
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ import { exists } from '../runtime';
15
+ import { PolicyTestResultFromJSON, PolicyTestResultToJSON, } from './PolicyTestResult';
16
+ /**
17
+ * Check if a given object implements the LDAPCheckAccess interface.
18
+ */
19
+ export function instanceOfLDAPCheckAccess(value) {
20
+ let isInstance = true;
21
+ isInstance = isInstance && "access" in value;
22
+ return isInstance;
23
+ }
24
+ export function LDAPCheckAccessFromJSON(json) {
25
+ return LDAPCheckAccessFromJSONTyped(json, false);
26
+ }
27
+ export function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
28
+ if ((json === undefined) || (json === null)) {
29
+ return json;
30
+ }
31
+ return {
32
+ 'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
33
+ 'access': PolicyTestResultFromJSON(json['access']),
34
+ };
35
+ }
36
+ export function LDAPCheckAccessToJSON(value) {
37
+ if (value === undefined) {
38
+ return undefined;
39
+ }
40
+ if (value === null) {
41
+ return null;
42
+ }
43
+ return {
44
+ 'has_search_permission': value.hasSearchPermission,
45
+ 'access': PolicyTestResultToJSON(value.access),
46
+ };
47
+ }
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
46
46
  * @memberof LDAPOutpostConfig
47
47
  */
48
48
  readonly applicationSlug: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPOutpostConfig
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -37,7 +37,6 @@ export function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
37
37
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
38
38
  'bindFlowSlug': json['bind_flow_slug'],
39
39
  'applicationSlug': json['application_slug'],
40
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
41
40
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
42
41
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
43
42
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -58,7 +57,6 @@ export function LDAPOutpostConfigToJSON(value) {
58
57
  'name': value.name,
59
58
  'base_dn': value.baseDn,
60
59
  'bind_flow_slug': value.bindFlowSlug,
61
- 'search_group': value.searchGroup,
62
60
  'certificate': value.certificate,
63
61
  'tls_server_name': value.tlsServerName,
64
62
  'uid_start_number': value.uidStartNumber,
@@ -100,12 +100,6 @@ export interface LDAPProvider {
100
100
  * @memberof LDAPProvider
101
101
  */
102
102
  baseDn?: string;
103
- /**
104
- * Users in this group can do search queries. If not set, every user can execute search queries.
105
- * @type {string}
106
- * @memberof LDAPProvider
107
- */
108
- searchGroup?: string | null;
109
103
  /**
110
104
  *
111
105
  * @type {string}
@@ -54,7 +54,6 @@ export function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
54
54
  'verboseNamePlural': json['verbose_name_plural'],
55
55
  'metaModelName': json['meta_model_name'],
56
56
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
57
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
58
57
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
59
58
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
60
59
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -78,7 +77,6 @@ export function LDAPProviderToJSON(value) {
78
77
  'authorization_flow': value.authorizationFlow,
79
78
  'property_mappings': value.propertyMappings,
80
79
  'base_dn': value.baseDn,
81
- 'search_group': value.searchGroup,
82
80
  'certificate': value.certificate,
83
81
  'tls_server_name': value.tlsServerName,
84
82
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
46
46
  * @memberof LDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -35,7 +35,6 @@ export function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
35
35
  'authorizationFlow': json['authorization_flow'],
36
36
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
37
37
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
38
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
39
38
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
40
39
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
41
40
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -58,7 +57,6 @@ export function LDAPProviderRequestToJSON(value) {
58
57
  'authorization_flow': value.authorizationFlow,
59
58
  'property_mappings': value.propertyMappings,
60
59
  'base_dn': value.baseDn,
61
- 'search_group': value.searchGroup,
62
60
  'certificate': value.certificate,
63
61
  'tls_server_name': value.tlsServerName,
64
62
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
46
46
  * @memberof PatchedLDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof PatchedLDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -33,7 +33,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminato
33
33
  'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
34
34
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
35
35
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
36
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
37
36
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
38
37
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
39
38
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -56,7 +55,6 @@ export function PatchedLDAPProviderRequestToJSON(value) {
56
55
  'authorization_flow': value.authorizationFlow,
57
56
  'property_mappings': value.propertyMappings,
58
57
  'base_dn': value.baseDn,
59
- 'search_group': value.searchGroup,
60
58
  'certificate': value.certificate,
61
59
  'tls_server_name': value.tlsServerName,
62
60
  'uid_start_number': value.uidStartNumber,
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
177
177
  export * from './KubernetesServiceConnection';
178
178
  export * from './KubernetesServiceConnectionRequest';
179
179
  export * from './LDAPAPIAccessMode';
180
+ export * from './LDAPCheckAccess';
180
181
  export * from './LDAPDebug';
181
182
  export * from './LDAPOutpostConfig';
182
183
  export * from './LDAPProvider';
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
179
179
  export * from './KubernetesServiceConnection';
180
180
  export * from './KubernetesServiceConnectionRequest';
181
181
  export * from './LDAPAPIAccessMode';
182
+ export * from './LDAPCheckAccess';
182
183
  export * from './LDAPDebug';
183
184
  export * from './LDAPOutpostConfig';
184
185
  export * from './LDAPProvider';
@@ -0,0 +1,38 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.6.3
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { PolicyTestResult } from './PolicyTestResult';
13
+ /**
14
+ * Base serializer class which doesn't implement create/update methods
15
+ * @export
16
+ * @interface LDAPCheckAccess
17
+ */
18
+ export interface LDAPCheckAccess {
19
+ /**
20
+ *
21
+ * @type {boolean}
22
+ * @memberof LDAPCheckAccess
23
+ */
24
+ hasSearchPermission?: boolean;
25
+ /**
26
+ *
27
+ * @type {PolicyTestResult}
28
+ * @memberof LDAPCheckAccess
29
+ */
30
+ access: PolicyTestResult;
31
+ }
32
+ /**
33
+ * Check if a given object implements the LDAPCheckAccess interface.
34
+ */
35
+ export declare function instanceOfLDAPCheckAccess(value: object): boolean;
36
+ export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
37
+ export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
38
+ export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
@@ -0,0 +1,54 @@
1
+ "use strict";
2
+ /* tslint:disable */
3
+ /* eslint-disable */
4
+ /**
5
+ * authentik
6
+ * Making authentication simple.
7
+ *
8
+ * The version of the OpenAPI document: 2024.6.3
9
+ * Contact: hello@goauthentik.io
10
+ *
11
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
12
+ * https://openapi-generator.tech
13
+ * Do not edit the class manually.
14
+ */
15
+ Object.defineProperty(exports, "__esModule", { value: true });
16
+ exports.LDAPCheckAccessToJSON = exports.LDAPCheckAccessFromJSONTyped = exports.LDAPCheckAccessFromJSON = exports.instanceOfLDAPCheckAccess = void 0;
17
+ const runtime_1 = require("../runtime");
18
+ const PolicyTestResult_1 = require("./PolicyTestResult");
19
+ /**
20
+ * Check if a given object implements the LDAPCheckAccess interface.
21
+ */
22
+ function instanceOfLDAPCheckAccess(value) {
23
+ let isInstance = true;
24
+ isInstance = isInstance && "access" in value;
25
+ return isInstance;
26
+ }
27
+ exports.instanceOfLDAPCheckAccess = instanceOfLDAPCheckAccess;
28
+ function LDAPCheckAccessFromJSON(json) {
29
+ return LDAPCheckAccessFromJSONTyped(json, false);
30
+ }
31
+ exports.LDAPCheckAccessFromJSON = LDAPCheckAccessFromJSON;
32
+ function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
33
+ if ((json === undefined) || (json === null)) {
34
+ return json;
35
+ }
36
+ return {
37
+ 'hasSearchPermission': !(0, runtime_1.exists)(json, 'has_search_permission') ? undefined : json['has_search_permission'],
38
+ 'access': (0, PolicyTestResult_1.PolicyTestResultFromJSON)(json['access']),
39
+ };
40
+ }
41
+ exports.LDAPCheckAccessFromJSONTyped = LDAPCheckAccessFromJSONTyped;
42
+ function LDAPCheckAccessToJSON(value) {
43
+ if (value === undefined) {
44
+ return undefined;
45
+ }
46
+ if (value === null) {
47
+ return null;
48
+ }
49
+ return {
50
+ 'has_search_permission': value.hasSearchPermission,
51
+ 'access': (0, PolicyTestResult_1.PolicyTestResultToJSON)(value.access),
52
+ };
53
+ }
54
+ exports.LDAPCheckAccessToJSON = LDAPCheckAccessToJSON;
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
46
46
  * @memberof LDAPOutpostConfig
47
47
  */
48
48
  readonly applicationSlug: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPOutpostConfig
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -42,7 +42,6 @@ function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
42
42
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
43
43
  'bindFlowSlug': json['bind_flow_slug'],
44
44
  'applicationSlug': json['application_slug'],
45
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
46
45
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
47
46
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
48
47
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -64,7 +63,6 @@ function LDAPOutpostConfigToJSON(value) {
64
63
  'name': value.name,
65
64
  'base_dn': value.baseDn,
66
65
  'bind_flow_slug': value.bindFlowSlug,
67
- 'search_group': value.searchGroup,
68
66
  'certificate': value.certificate,
69
67
  'tls_server_name': value.tlsServerName,
70
68
  'uid_start_number': value.uidStartNumber,
@@ -100,12 +100,6 @@ export interface LDAPProvider {
100
100
  * @memberof LDAPProvider
101
101
  */
102
102
  baseDn?: string;
103
- /**
104
- * Users in this group can do search queries. If not set, every user can execute search queries.
105
- * @type {string}
106
- * @memberof LDAPProvider
107
- */
108
- searchGroup?: string | null;
109
103
  /**
110
104
  *
111
105
  * @type {string}
@@ -59,7 +59,6 @@ function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
59
59
  'verboseNamePlural': json['verbose_name_plural'],
60
60
  'metaModelName': json['meta_model_name'],
61
61
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
62
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
63
62
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
64
63
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
65
64
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -84,7 +83,6 @@ function LDAPProviderToJSON(value) {
84
83
  'authorization_flow': value.authorizationFlow,
85
84
  'property_mappings': value.propertyMappings,
86
85
  'base_dn': value.baseDn,
87
- 'search_group': value.searchGroup,
88
86
  'certificate': value.certificate,
89
87
  'tls_server_name': value.tlsServerName,
90
88
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
46
46
  * @memberof LDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -40,7 +40,6 @@ function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
40
40
  'authorizationFlow': json['authorization_flow'],
41
41
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
42
42
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
43
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
44
43
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
45
44
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
46
45
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -64,7 +63,6 @@ function LDAPProviderRequestToJSON(value) {
64
63
  'authorization_flow': value.authorizationFlow,
65
64
  'property_mappings': value.propertyMappings,
66
65
  'base_dn': value.baseDn,
67
- 'search_group': value.searchGroup,
68
66
  'certificate': value.certificate,
69
67
  'tls_server_name': value.tlsServerName,
70
68
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
46
46
  * @memberof PatchedLDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof PatchedLDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -38,7 +38,6 @@ function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
38
38
  'authorizationFlow': !(0, runtime_1.exists)(json, 'authorization_flow') ? undefined : json['authorization_flow'],
39
39
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
40
40
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
41
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
42
41
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
43
42
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
44
43
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -62,7 +61,6 @@ function PatchedLDAPProviderRequestToJSON(value) {
62
61
  'authorization_flow': value.authorizationFlow,
63
62
  'property_mappings': value.propertyMappings,
64
63
  'base_dn': value.baseDn,
65
- 'search_group': value.searchGroup,
66
64
  'certificate': value.certificate,
67
65
  'tls_server_name': value.tlsServerName,
68
66
  'uid_start_number': value.uidStartNumber,
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
177
177
  export * from './KubernetesServiceConnection';
178
178
  export * from './KubernetesServiceConnectionRequest';
179
179
  export * from './LDAPAPIAccessMode';
180
+ export * from './LDAPCheckAccess';
180
181
  export * from './LDAPDebug';
181
182
  export * from './LDAPOutpostConfig';
182
183
  export * from './LDAPProvider';
@@ -195,6 +195,7 @@ __exportStar(require("./IssuerModeEnum"), exports);
195
195
  __exportStar(require("./KubernetesServiceConnection"), exports);
196
196
  __exportStar(require("./KubernetesServiceConnectionRequest"), exports);
197
197
  __exportStar(require("./LDAPAPIAccessMode"), exports);
198
+ __exportStar(require("./LDAPCheckAccess"), exports);
198
199
  __exportStar(require("./LDAPDebug"), exports);
199
200
  __exportStar(require("./LDAPOutpostConfig"), exports);
200
201
  __exportStar(require("./LDAPProvider"), exports);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.6.3-1723497462",
3
+ "version": "2024.6.3-1723645891",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -20,6 +20,7 @@ import type {
20
20
  GenericError,
21
21
  KubernetesServiceConnection,
22
22
  KubernetesServiceConnectionRequest,
23
+ LDAPCheckAccess,
23
24
  Outpost,
24
25
  OutpostDefaultConfig,
25
26
  OutpostHealth,
@@ -52,6 +53,8 @@ import {
52
53
  KubernetesServiceConnectionToJSON,
53
54
  KubernetesServiceConnectionRequestFromJSON,
54
55
  KubernetesServiceConnectionRequestToJSON,
56
+ LDAPCheckAccessFromJSON,
57
+ LDAPCheckAccessToJSON,
55
58
  OutpostFromJSON,
56
59
  OutpostToJSON,
57
60
  OutpostDefaultConfigFromJSON,
@@ -149,6 +152,11 @@ export interface OutpostsInstancesUsedByListRequest {
149
152
  uuid: string;
150
153
  }
151
154
 
155
+ export interface OutpostsLdapAccessCheckRequest {
156
+ id: number;
157
+ appSlug?: string;
158
+ }
159
+
152
160
  export interface OutpostsLdapListRequest {
153
161
  name?: string;
154
162
  ordering?: string;
@@ -165,7 +173,7 @@ export interface OutpostsProxyListRequest {
165
173
  search?: string;
166
174
  }
167
175
 
168
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
176
+ export interface OutpostsRadiusAccessCheckRequest {
169
177
  id: number;
170
178
  appSlug?: string;
171
179
  }
@@ -714,6 +722,48 @@ export class OutpostsApi extends runtime.BaseAPI {
714
722
  return await response.value();
715
723
  }
716
724
 
725
+ /**
726
+ * Check access to a single application by slug
727
+ */
728
+ async outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>> {
729
+ if (requestParameters.id === null || requestParameters.id === undefined) {
730
+ throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
731
+ }
732
+
733
+ const queryParameters: any = {};
734
+
735
+ if (requestParameters.appSlug !== undefined) {
736
+ queryParameters['app_slug'] = requestParameters.appSlug;
737
+ }
738
+
739
+ const headerParameters: runtime.HTTPHeaders = {};
740
+
741
+ if (this.configuration && this.configuration.accessToken) {
742
+ const token = this.configuration.accessToken;
743
+ const tokenString = await token("authentik", []);
744
+
745
+ if (tokenString) {
746
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
747
+ }
748
+ }
749
+ const response = await this.request({
750
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
751
+ method: 'GET',
752
+ headers: headerParameters,
753
+ query: queryParameters,
754
+ }, initOverrides);
755
+
756
+ return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
757
+ }
758
+
759
+ /**
760
+ * Check access to a single application by slug
761
+ */
762
+ async outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess> {
763
+ const response = await this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
764
+ return await response.value();
765
+ }
766
+
717
767
  /**
718
768
  * LDAPProvider Viewset
719
769
  */
@@ -825,9 +875,9 @@ export class OutpostsApi extends runtime.BaseAPI {
825
875
  /**
826
876
  * Check access to a single application by slug
827
877
  */
828
- async outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>> {
878
+ async outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>> {
829
879
  if (requestParameters.id === null || requestParameters.id === undefined) {
830
- throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
880
+ throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
831
881
  }
832
882
 
833
883
  const queryParameters: any = {};
@@ -859,8 +909,8 @@ export class OutpostsApi extends runtime.BaseAPI {
859
909
  /**
860
910
  * Check access to a single application by slug
861
911
  */
862
- async outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess> {
863
- const response = await this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
912
+ async outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess> {
913
+ const response = await this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
864
914
  return await response.value();
865
915
  }
866
916
 
@@ -345,8 +345,6 @@ export interface ProvidersLdapListRequest {
345
345
  page?: number;
346
346
  pageSize?: number;
347
347
  search?: string;
348
- searchGroupGroupUuidIexact?: string;
349
- searchGroupNameIexact?: string;
350
348
  tlsServerNameIexact?: string;
351
349
  uidStartNumberIexact?: number;
352
350
  }
@@ -1914,14 +1912,6 @@ export class ProvidersApi extends runtime.BaseAPI {
1914
1912
  queryParameters['search'] = requestParameters.search;
1915
1913
  }
1916
1914
 
1917
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1918
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1919
- }
1920
-
1921
- if (requestParameters.searchGroupNameIexact !== undefined) {
1922
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1923
- }
1924
-
1925
1915
  if (requestParameters.tlsServerNameIexact !== undefined) {
1926
1916
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1927
1917
  }
@@ -0,0 +1,81 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.6.3
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+
15
+ import { exists, mapValues } from '../runtime';
16
+ import type { PolicyTestResult } from './PolicyTestResult';
17
+ import {
18
+ PolicyTestResultFromJSON,
19
+ PolicyTestResultFromJSONTyped,
20
+ PolicyTestResultToJSON,
21
+ } from './PolicyTestResult';
22
+
23
+ /**
24
+ * Base serializer class which doesn't implement create/update methods
25
+ * @export
26
+ * @interface LDAPCheckAccess
27
+ */
28
+ export interface LDAPCheckAccess {
29
+ /**
30
+ *
31
+ * @type {boolean}
32
+ * @memberof LDAPCheckAccess
33
+ */
34
+ hasSearchPermission?: boolean;
35
+ /**
36
+ *
37
+ * @type {PolicyTestResult}
38
+ * @memberof LDAPCheckAccess
39
+ */
40
+ access: PolicyTestResult;
41
+ }
42
+
43
+ /**
44
+ * Check if a given object implements the LDAPCheckAccess interface.
45
+ */
46
+ export function instanceOfLDAPCheckAccess(value: object): boolean {
47
+ let isInstance = true;
48
+ isInstance = isInstance && "access" in value;
49
+
50
+ return isInstance;
51
+ }
52
+
53
+ export function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess {
54
+ return LDAPCheckAccessFromJSONTyped(json, false);
55
+ }
56
+
57
+ export function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess {
58
+ if ((json === undefined) || (json === null)) {
59
+ return json;
60
+ }
61
+ return {
62
+
63
+ 'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
64
+ 'access': PolicyTestResultFromJSON(json['access']),
65
+ };
66
+ }
67
+
68
+ export function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any {
69
+ if (value === undefined) {
70
+ return undefined;
71
+ }
72
+ if (value === null) {
73
+ return null;
74
+ }
75
+ return {
76
+
77
+ 'has_search_permission': value.hasSearchPermission,
78
+ 'access': PolicyTestResultToJSON(value.access),
79
+ };
80
+ }
81
+
@@ -56,12 +56,6 @@ export interface LDAPOutpostConfig {
56
56
  * @memberof LDAPOutpostConfig
57
57
  */
58
58
  readonly applicationSlug: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof LDAPOutpostConfig
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -134,7 +128,6 @@ export function LDAPOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator: b
134
128
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
135
129
  'bindFlowSlug': json['bind_flow_slug'],
136
130
  'applicationSlug': json['application_slug'],
137
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
138
131
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
139
132
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
140
133
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -157,7 +150,6 @@ export function LDAPOutpostConfigToJSON(value?: LDAPOutpostConfig | null): any {
157
150
  'name': value.name,
158
151
  'base_dn': value.baseDn,
159
152
  'bind_flow_slug': value.bindFlowSlug,
160
- 'search_group': value.searchGroup,
161
153
  'certificate': value.certificate,
162
154
  'tls_server_name': value.tlsServerName,
163
155
  'uid_start_number': value.uidStartNumber,
@@ -110,12 +110,6 @@ export interface LDAPProvider {
110
110
  * @memberof LDAPProvider
111
111
  */
112
112
  baseDn?: string;
113
- /**
114
- * Users in this group can do search queries. If not set, every user can execute search queries.
115
- * @type {string}
116
- * @memberof LDAPProvider
117
- */
118
- searchGroup?: string | null;
119
113
  /**
120
114
  *
121
115
  * @type {string}
@@ -211,7 +205,6 @@ export function LDAPProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
211
205
  'verboseNamePlural': json['verbose_name_plural'],
212
206
  'metaModelName': json['meta_model_name'],
213
207
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
214
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
215
208
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
216
209
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
217
210
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -237,7 +230,6 @@ export function LDAPProviderToJSON(value?: LDAPProvider | null): any {
237
230
  'authorization_flow': value.authorizationFlow,
238
231
  'property_mappings': value.propertyMappings,
239
232
  'base_dn': value.baseDn,
240
- 'search_group': value.searchGroup,
241
233
  'certificate': value.certificate,
242
234
  'tls_server_name': value.tlsServerName,
243
235
  'uid_start_number': value.uidStartNumber,
@@ -56,12 +56,6 @@ export interface LDAPProviderRequest {
56
56
  * @memberof LDAPProviderRequest
57
57
  */
58
58
  baseDn?: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof LDAPProviderRequest
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -132,7 +126,6 @@ export function LDAPProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
132
126
  'authorizationFlow': json['authorization_flow'],
133
127
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
134
128
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
135
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
136
129
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
137
130
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
138
131
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -157,7 +150,6 @@ export function LDAPProviderRequestToJSON(value?: LDAPProviderRequest | null): a
157
150
  'authorization_flow': value.authorizationFlow,
158
151
  'property_mappings': value.propertyMappings,
159
152
  'base_dn': value.baseDn,
160
- 'search_group': value.searchGroup,
161
153
  'certificate': value.certificate,
162
154
  'tls_server_name': value.tlsServerName,
163
155
  'uid_start_number': value.uidStartNumber,
@@ -56,12 +56,6 @@ export interface PatchedLDAPProviderRequest {
56
56
  * @memberof PatchedLDAPProviderRequest
57
57
  */
58
58
  baseDn?: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof PatchedLDAPProviderRequest
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -130,7 +124,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json: any, ignoreDiscrim
130
124
  'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
131
125
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
132
126
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
133
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
134
127
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
135
128
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
136
129
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -155,7 +148,6 @@ export function PatchedLDAPProviderRequestToJSON(value?: PatchedLDAPProviderRequ
155
148
  'authorization_flow': value.authorizationFlow,
156
149
  'property_mappings': value.propertyMappings,
157
150
  'base_dn': value.baseDn,
158
- 'search_group': value.searchGroup,
159
151
  'certificate': value.certificate,
160
152
  'tls_server_name': value.tlsServerName,
161
153
  'uid_start_number': value.uidStartNumber,
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
179
179
  export * from './KubernetesServiceConnection';
180
180
  export * from './KubernetesServiceConnectionRequest';
181
181
  export * from './LDAPAPIAccessMode';
182
+ export * from './LDAPCheckAccess';
182
183
  export * from './LDAPDebug';
183
184
  export * from './LDAPOutpostConfig';
184
185
  export * from './LDAPProvider';