@goauthentik/api 2024.6.3-1723497462 → 2024.6.3-1723645891

Sign up to get free protection for your applications and to get access to all the features.
Files changed (42) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/OutpostsApi.d.ts +16 -4
  3. package/dist/apis/OutpostsApi.js +42 -4
  4. package/dist/apis/ProvidersApi.d.ts +0 -2
  5. package/dist/apis/ProvidersApi.js +0 -6
  6. package/dist/esm/apis/OutpostsApi.d.ts +16 -4
  7. package/dist/esm/apis/OutpostsApi.js +43 -5
  8. package/dist/esm/apis/ProvidersApi.d.ts +0 -2
  9. package/dist/esm/apis/ProvidersApi.js +0 -6
  10. package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
  11. package/dist/esm/models/LDAPCheckAccess.js +47 -0
  12. package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
  13. package/dist/esm/models/LDAPOutpostConfig.js +0 -2
  14. package/dist/esm/models/LDAPProvider.d.ts +0 -6
  15. package/dist/esm/models/LDAPProvider.js +0 -2
  16. package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
  17. package/dist/esm/models/LDAPProviderRequest.js +0 -2
  18. package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
  19. package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
  20. package/dist/esm/models/index.d.ts +1 -0
  21. package/dist/esm/models/index.js +1 -0
  22. package/dist/models/LDAPCheckAccess.d.ts +38 -0
  23. package/dist/models/LDAPCheckAccess.js +54 -0
  24. package/dist/models/LDAPOutpostConfig.d.ts +0 -6
  25. package/dist/models/LDAPOutpostConfig.js +0 -2
  26. package/dist/models/LDAPProvider.d.ts +0 -6
  27. package/dist/models/LDAPProvider.js +0 -2
  28. package/dist/models/LDAPProviderRequest.d.ts +0 -6
  29. package/dist/models/LDAPProviderRequest.js +0 -2
  30. package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
  31. package/dist/models/PatchedLDAPProviderRequest.js +0 -2
  32. package/dist/models/index.d.ts +1 -0
  33. package/dist/models/index.js +1 -0
  34. package/package.json +1 -1
  35. package/src/apis/OutpostsApi.ts +55 -5
  36. package/src/apis/ProvidersApi.ts +0 -10
  37. package/src/models/LDAPCheckAccess.ts +81 -0
  38. package/src/models/LDAPOutpostConfig.ts +0 -8
  39. package/src/models/LDAPProvider.ts +0 -8
  40. package/src/models/LDAPProviderRequest.ts +0 -8
  41. package/src/models/PatchedLDAPProviderRequest.ts +0 -8
  42. package/src/models/index.ts +1 -0
@@ -204,6 +204,7 @@ src/models/IssuerModeEnum.ts
204
204
  src/models/KubernetesServiceConnection.ts
205
205
  src/models/KubernetesServiceConnectionRequest.ts
206
206
  src/models/LDAPAPIAccessMode.ts
207
+ src/models/LDAPCheckAccess.ts
207
208
  src/models/LDAPDebug.ts
208
209
  src/models/LDAPOutpostConfig.ts
209
210
  src/models/LDAPProvider.ts
@@ -10,7 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
13
+ import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
14
14
  export interface OutpostsInstancesCreateRequest {
15
15
  outpostRequest: OutpostRequest;
16
16
  }
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
58
58
  export interface OutpostsInstancesUsedByListRequest {
59
59
  uuid: string;
60
60
  }
61
+ export interface OutpostsLdapAccessCheckRequest {
62
+ id: number;
63
+ appSlug?: string;
64
+ }
61
65
  export interface OutpostsLdapListRequest {
62
66
  name?: string;
63
67
  ordering?: string;
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
72
76
  pageSize?: number;
73
77
  search?: string;
74
78
  }
75
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
79
+ export interface OutpostsRadiusAccessCheckRequest {
76
80
  id: number;
77
81
  appSlug?: string;
78
82
  }
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
237
241
  * Get a list of all objects that use this object
238
242
  */
239
243
  outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
244
+ /**
245
+ * Check access to a single application by slug
246
+ */
247
+ outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
248
+ /**
249
+ * Check access to a single application by slug
250
+ */
251
+ outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
240
252
  /**
241
253
  * LDAPProvider Viewset
242
254
  */
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
256
268
  /**
257
269
  * Check access to a single application by slug
258
270
  */
259
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
271
+ outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
260
272
  /**
261
273
  * Check access to a single application by slug
262
274
  */
263
- outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
275
+ outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
264
276
  /**
265
277
  * RadiusProvider Viewset
266
278
  */
@@ -412,6 +412,44 @@ class OutpostsApi extends runtime.BaseAPI {
412
412
  return yield response.value();
413
413
  });
414
414
  }
415
+ /**
416
+ * Check access to a single application by slug
417
+ */
418
+ outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
419
+ return __awaiter(this, void 0, void 0, function* () {
420
+ if (requestParameters.id === null || requestParameters.id === undefined) {
421
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
422
+ }
423
+ const queryParameters = {};
424
+ if (requestParameters.appSlug !== undefined) {
425
+ queryParameters['app_slug'] = requestParameters.appSlug;
426
+ }
427
+ const headerParameters = {};
428
+ if (this.configuration && this.configuration.accessToken) {
429
+ const token = this.configuration.accessToken;
430
+ const tokenString = yield token("authentik", []);
431
+ if (tokenString) {
432
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
433
+ }
434
+ }
435
+ const response = yield this.request({
436
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
437
+ method: 'GET',
438
+ headers: headerParameters,
439
+ query: queryParameters,
440
+ }, initOverrides);
441
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.LDAPCheckAccessFromJSON)(jsonValue));
442
+ });
443
+ }
444
+ /**
445
+ * Check access to a single application by slug
446
+ */
447
+ outpostsLdapAccessCheck(requestParameters, initOverrides) {
448
+ return __awaiter(this, void 0, void 0, function* () {
449
+ const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
450
+ return yield response.value();
451
+ });
452
+ }
415
453
  /**
416
454
  * LDAPProvider Viewset
417
455
  */
@@ -509,10 +547,10 @@ class OutpostsApi extends runtime.BaseAPI {
509
547
  /**
510
548
  * Check access to a single application by slug
511
549
  */
512
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides) {
550
+ outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
513
551
  return __awaiter(this, void 0, void 0, function* () {
514
552
  if (requestParameters.id === null || requestParameters.id === undefined) {
515
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
553
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
516
554
  }
517
555
  const queryParameters = {};
518
556
  if (requestParameters.appSlug !== undefined) {
@@ -538,9 +576,9 @@ class OutpostsApi extends runtime.BaseAPI {
538
576
  /**
539
577
  * Check access to a single application by slug
540
578
  */
541
- outpostsRadiusCheckAccessRetrieve(requestParameters, initOverrides) {
579
+ outpostsRadiusAccessCheck(requestParameters, initOverrides) {
542
580
  return __awaiter(this, void 0, void 0, function* () {
543
- const response = yield this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
581
+ const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
544
582
  return yield response.value();
545
583
  });
546
584
  }
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
121
121
  page?: number;
122
122
  pageSize?: number;
123
123
  search?: string;
124
- searchGroupGroupUuidIexact?: string;
125
- searchGroupNameIexact?: string;
126
124
  tlsServerNameIexact?: string;
127
125
  uidStartNumberIexact?: number;
128
126
  }
@@ -1022,12 +1022,6 @@ class ProvidersApi extends runtime.BaseAPI {
1022
1022
  if (requestParameters.search !== undefined) {
1023
1023
  queryParameters['search'] = requestParameters.search;
1024
1024
  }
1025
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1026
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1027
- }
1028
- if (requestParameters.searchGroupNameIexact !== undefined) {
1029
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1030
- }
1031
1025
  if (requestParameters.tlsServerNameIexact !== undefined) {
1032
1026
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1033
1027
  }
@@ -10,7 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
13
+ import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
14
14
  export interface OutpostsInstancesCreateRequest {
15
15
  outpostRequest: OutpostRequest;
16
16
  }
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
58
58
  export interface OutpostsInstancesUsedByListRequest {
59
59
  uuid: string;
60
60
  }
61
+ export interface OutpostsLdapAccessCheckRequest {
62
+ id: number;
63
+ appSlug?: string;
64
+ }
61
65
  export interface OutpostsLdapListRequest {
62
66
  name?: string;
63
67
  ordering?: string;
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
72
76
  pageSize?: number;
73
77
  search?: string;
74
78
  }
75
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
79
+ export interface OutpostsRadiusAccessCheckRequest {
76
80
  id: number;
77
81
  appSlug?: string;
78
82
  }
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
237
241
  * Get a list of all objects that use this object
238
242
  */
239
243
  outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
244
+ /**
245
+ * Check access to a single application by slug
246
+ */
247
+ outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
248
+ /**
249
+ * Check access to a single application by slug
250
+ */
251
+ outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
240
252
  /**
241
253
  * LDAPProvider Viewset
242
254
  */
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
256
268
  /**
257
269
  * Check access to a single application by slug
258
270
  */
259
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
271
+ outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
260
272
  /**
261
273
  * Check access to a single application by slug
262
274
  */
263
- outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
275
+ outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
264
276
  /**
265
277
  * RadiusProvider Viewset
266
278
  */
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
21
21
  });
22
22
  };
23
23
  import * as runtime from '../runtime';
24
- import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
24
+ import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, LDAPCheckAccessFromJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
25
25
  /**
26
26
  *
27
27
  */
@@ -409,6 +409,44 @@ export class OutpostsApi extends runtime.BaseAPI {
409
409
  return yield response.value();
410
410
  });
411
411
  }
412
+ /**
413
+ * Check access to a single application by slug
414
+ */
415
+ outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
416
+ return __awaiter(this, void 0, void 0, function* () {
417
+ if (requestParameters.id === null || requestParameters.id === undefined) {
418
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
419
+ }
420
+ const queryParameters = {};
421
+ if (requestParameters.appSlug !== undefined) {
422
+ queryParameters['app_slug'] = requestParameters.appSlug;
423
+ }
424
+ const headerParameters = {};
425
+ if (this.configuration && this.configuration.accessToken) {
426
+ const token = this.configuration.accessToken;
427
+ const tokenString = yield token("authentik", []);
428
+ if (tokenString) {
429
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
430
+ }
431
+ }
432
+ const response = yield this.request({
433
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
434
+ method: 'GET',
435
+ headers: headerParameters,
436
+ query: queryParameters,
437
+ }, initOverrides);
438
+ return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
439
+ });
440
+ }
441
+ /**
442
+ * Check access to a single application by slug
443
+ */
444
+ outpostsLdapAccessCheck(requestParameters, initOverrides) {
445
+ return __awaiter(this, void 0, void 0, function* () {
446
+ const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
447
+ return yield response.value();
448
+ });
449
+ }
412
450
  /**
413
451
  * LDAPProvider Viewset
414
452
  */
@@ -506,10 +544,10 @@ export class OutpostsApi extends runtime.BaseAPI {
506
544
  /**
507
545
  * Check access to a single application by slug
508
546
  */
509
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides) {
547
+ outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
510
548
  return __awaiter(this, void 0, void 0, function* () {
511
549
  if (requestParameters.id === null || requestParameters.id === undefined) {
512
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
550
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
513
551
  }
514
552
  const queryParameters = {};
515
553
  if (requestParameters.appSlug !== undefined) {
@@ -535,9 +573,9 @@ export class OutpostsApi extends runtime.BaseAPI {
535
573
  /**
536
574
  * Check access to a single application by slug
537
575
  */
538
- outpostsRadiusCheckAccessRetrieve(requestParameters, initOverrides) {
576
+ outpostsRadiusAccessCheck(requestParameters, initOverrides) {
539
577
  return __awaiter(this, void 0, void 0, function* () {
540
- const response = yield this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
578
+ const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
541
579
  return yield response.value();
542
580
  });
543
581
  }
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
121
121
  page?: number;
122
122
  pageSize?: number;
123
123
  search?: string;
124
- searchGroupGroupUuidIexact?: string;
125
- searchGroupNameIexact?: string;
126
124
  tlsServerNameIexact?: string;
127
125
  uidStartNumberIexact?: number;
128
126
  }
@@ -1019,12 +1019,6 @@ export class ProvidersApi extends runtime.BaseAPI {
1019
1019
  if (requestParameters.search !== undefined) {
1020
1020
  queryParameters['search'] = requestParameters.search;
1021
1021
  }
1022
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1023
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1024
- }
1025
- if (requestParameters.searchGroupNameIexact !== undefined) {
1026
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1027
- }
1028
1022
  if (requestParameters.tlsServerNameIexact !== undefined) {
1029
1023
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1030
1024
  }
@@ -0,0 +1,38 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.6.3
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { PolicyTestResult } from './PolicyTestResult';
13
+ /**
14
+ * Base serializer class which doesn't implement create/update methods
15
+ * @export
16
+ * @interface LDAPCheckAccess
17
+ */
18
+ export interface LDAPCheckAccess {
19
+ /**
20
+ *
21
+ * @type {boolean}
22
+ * @memberof LDAPCheckAccess
23
+ */
24
+ hasSearchPermission?: boolean;
25
+ /**
26
+ *
27
+ * @type {PolicyTestResult}
28
+ * @memberof LDAPCheckAccess
29
+ */
30
+ access: PolicyTestResult;
31
+ }
32
+ /**
33
+ * Check if a given object implements the LDAPCheckAccess interface.
34
+ */
35
+ export declare function instanceOfLDAPCheckAccess(value: object): boolean;
36
+ export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
37
+ export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
38
+ export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
@@ -0,0 +1,47 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.6.3
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ import { exists } from '../runtime';
15
+ import { PolicyTestResultFromJSON, PolicyTestResultToJSON, } from './PolicyTestResult';
16
+ /**
17
+ * Check if a given object implements the LDAPCheckAccess interface.
18
+ */
19
+ export function instanceOfLDAPCheckAccess(value) {
20
+ let isInstance = true;
21
+ isInstance = isInstance && "access" in value;
22
+ return isInstance;
23
+ }
24
+ export function LDAPCheckAccessFromJSON(json) {
25
+ return LDAPCheckAccessFromJSONTyped(json, false);
26
+ }
27
+ export function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
28
+ if ((json === undefined) || (json === null)) {
29
+ return json;
30
+ }
31
+ return {
32
+ 'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
33
+ 'access': PolicyTestResultFromJSON(json['access']),
34
+ };
35
+ }
36
+ export function LDAPCheckAccessToJSON(value) {
37
+ if (value === undefined) {
38
+ return undefined;
39
+ }
40
+ if (value === null) {
41
+ return null;
42
+ }
43
+ return {
44
+ 'has_search_permission': value.hasSearchPermission,
45
+ 'access': PolicyTestResultToJSON(value.access),
46
+ };
47
+ }
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
46
46
  * @memberof LDAPOutpostConfig
47
47
  */
48
48
  readonly applicationSlug: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPOutpostConfig
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -37,7 +37,6 @@ export function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
37
37
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
38
38
  'bindFlowSlug': json['bind_flow_slug'],
39
39
  'applicationSlug': json['application_slug'],
40
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
41
40
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
42
41
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
43
42
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -58,7 +57,6 @@ export function LDAPOutpostConfigToJSON(value) {
58
57
  'name': value.name,
59
58
  'base_dn': value.baseDn,
60
59
  'bind_flow_slug': value.bindFlowSlug,
61
- 'search_group': value.searchGroup,
62
60
  'certificate': value.certificate,
63
61
  'tls_server_name': value.tlsServerName,
64
62
  'uid_start_number': value.uidStartNumber,
@@ -100,12 +100,6 @@ export interface LDAPProvider {
100
100
  * @memberof LDAPProvider
101
101
  */
102
102
  baseDn?: string;
103
- /**
104
- * Users in this group can do search queries. If not set, every user can execute search queries.
105
- * @type {string}
106
- * @memberof LDAPProvider
107
- */
108
- searchGroup?: string | null;
109
103
  /**
110
104
  *
111
105
  * @type {string}
@@ -54,7 +54,6 @@ export function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
54
54
  'verboseNamePlural': json['verbose_name_plural'],
55
55
  'metaModelName': json['meta_model_name'],
56
56
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
57
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
58
57
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
59
58
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
60
59
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -78,7 +77,6 @@ export function LDAPProviderToJSON(value) {
78
77
  'authorization_flow': value.authorizationFlow,
79
78
  'property_mappings': value.propertyMappings,
80
79
  'base_dn': value.baseDn,
81
- 'search_group': value.searchGroup,
82
80
  'certificate': value.certificate,
83
81
  'tls_server_name': value.tlsServerName,
84
82
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
46
46
  * @memberof LDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -35,7 +35,6 @@ export function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
35
35
  'authorizationFlow': json['authorization_flow'],
36
36
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
37
37
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
38
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
39
38
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
40
39
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
41
40
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -58,7 +57,6 @@ export function LDAPProviderRequestToJSON(value) {
58
57
  'authorization_flow': value.authorizationFlow,
59
58
  'property_mappings': value.propertyMappings,
60
59
  'base_dn': value.baseDn,
61
- 'search_group': value.searchGroup,
62
60
  'certificate': value.certificate,
63
61
  'tls_server_name': value.tlsServerName,
64
62
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
46
46
  * @memberof PatchedLDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof PatchedLDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -33,7 +33,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminato
33
33
  'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
34
34
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
35
35
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
36
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
37
36
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
38
37
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
39
38
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -56,7 +55,6 @@ export function PatchedLDAPProviderRequestToJSON(value) {
56
55
  'authorization_flow': value.authorizationFlow,
57
56
  'property_mappings': value.propertyMappings,
58
57
  'base_dn': value.baseDn,
59
- 'search_group': value.searchGroup,
60
58
  'certificate': value.certificate,
61
59
  'tls_server_name': value.tlsServerName,
62
60
  'uid_start_number': value.uidStartNumber,
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
177
177
  export * from './KubernetesServiceConnection';
178
178
  export * from './KubernetesServiceConnectionRequest';
179
179
  export * from './LDAPAPIAccessMode';
180
+ export * from './LDAPCheckAccess';
180
181
  export * from './LDAPDebug';
181
182
  export * from './LDAPOutpostConfig';
182
183
  export * from './LDAPProvider';
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
179
179
  export * from './KubernetesServiceConnection';
180
180
  export * from './KubernetesServiceConnectionRequest';
181
181
  export * from './LDAPAPIAccessMode';
182
+ export * from './LDAPCheckAccess';
182
183
  export * from './LDAPDebug';
183
184
  export * from './LDAPOutpostConfig';
184
185
  export * from './LDAPProvider';
@@ -0,0 +1,38 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.6.3
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { PolicyTestResult } from './PolicyTestResult';
13
+ /**
14
+ * Base serializer class which doesn't implement create/update methods
15
+ * @export
16
+ * @interface LDAPCheckAccess
17
+ */
18
+ export interface LDAPCheckAccess {
19
+ /**
20
+ *
21
+ * @type {boolean}
22
+ * @memberof LDAPCheckAccess
23
+ */
24
+ hasSearchPermission?: boolean;
25
+ /**
26
+ *
27
+ * @type {PolicyTestResult}
28
+ * @memberof LDAPCheckAccess
29
+ */
30
+ access: PolicyTestResult;
31
+ }
32
+ /**
33
+ * Check if a given object implements the LDAPCheckAccess interface.
34
+ */
35
+ export declare function instanceOfLDAPCheckAccess(value: object): boolean;
36
+ export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
37
+ export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
38
+ export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
@@ -0,0 +1,54 @@
1
+ "use strict";
2
+ /* tslint:disable */
3
+ /* eslint-disable */
4
+ /**
5
+ * authentik
6
+ * Making authentication simple.
7
+ *
8
+ * The version of the OpenAPI document: 2024.6.3
9
+ * Contact: hello@goauthentik.io
10
+ *
11
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
12
+ * https://openapi-generator.tech
13
+ * Do not edit the class manually.
14
+ */
15
+ Object.defineProperty(exports, "__esModule", { value: true });
16
+ exports.LDAPCheckAccessToJSON = exports.LDAPCheckAccessFromJSONTyped = exports.LDAPCheckAccessFromJSON = exports.instanceOfLDAPCheckAccess = void 0;
17
+ const runtime_1 = require("../runtime");
18
+ const PolicyTestResult_1 = require("./PolicyTestResult");
19
+ /**
20
+ * Check if a given object implements the LDAPCheckAccess interface.
21
+ */
22
+ function instanceOfLDAPCheckAccess(value) {
23
+ let isInstance = true;
24
+ isInstance = isInstance && "access" in value;
25
+ return isInstance;
26
+ }
27
+ exports.instanceOfLDAPCheckAccess = instanceOfLDAPCheckAccess;
28
+ function LDAPCheckAccessFromJSON(json) {
29
+ return LDAPCheckAccessFromJSONTyped(json, false);
30
+ }
31
+ exports.LDAPCheckAccessFromJSON = LDAPCheckAccessFromJSON;
32
+ function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
33
+ if ((json === undefined) || (json === null)) {
34
+ return json;
35
+ }
36
+ return {
37
+ 'hasSearchPermission': !(0, runtime_1.exists)(json, 'has_search_permission') ? undefined : json['has_search_permission'],
38
+ 'access': (0, PolicyTestResult_1.PolicyTestResultFromJSON)(json['access']),
39
+ };
40
+ }
41
+ exports.LDAPCheckAccessFromJSONTyped = LDAPCheckAccessFromJSONTyped;
42
+ function LDAPCheckAccessToJSON(value) {
43
+ if (value === undefined) {
44
+ return undefined;
45
+ }
46
+ if (value === null) {
47
+ return null;
48
+ }
49
+ return {
50
+ 'has_search_permission': value.hasSearchPermission,
51
+ 'access': (0, PolicyTestResult_1.PolicyTestResultToJSON)(value.access),
52
+ };
53
+ }
54
+ exports.LDAPCheckAccessToJSON = LDAPCheckAccessToJSON;
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
46
46
  * @memberof LDAPOutpostConfig
47
47
  */
48
48
  readonly applicationSlug: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPOutpostConfig
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -42,7 +42,6 @@ function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
42
42
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
43
43
  'bindFlowSlug': json['bind_flow_slug'],
44
44
  'applicationSlug': json['application_slug'],
45
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
46
45
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
47
46
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
48
47
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -64,7 +63,6 @@ function LDAPOutpostConfigToJSON(value) {
64
63
  'name': value.name,
65
64
  'base_dn': value.baseDn,
66
65
  'bind_flow_slug': value.bindFlowSlug,
67
- 'search_group': value.searchGroup,
68
66
  'certificate': value.certificate,
69
67
  'tls_server_name': value.tlsServerName,
70
68
  'uid_start_number': value.uidStartNumber,
@@ -100,12 +100,6 @@ export interface LDAPProvider {
100
100
  * @memberof LDAPProvider
101
101
  */
102
102
  baseDn?: string;
103
- /**
104
- * Users in this group can do search queries. If not set, every user can execute search queries.
105
- * @type {string}
106
- * @memberof LDAPProvider
107
- */
108
- searchGroup?: string | null;
109
103
  /**
110
104
  *
111
105
  * @type {string}
@@ -59,7 +59,6 @@ function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
59
59
  'verboseNamePlural': json['verbose_name_plural'],
60
60
  'metaModelName': json['meta_model_name'],
61
61
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
62
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
63
62
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
64
63
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
65
64
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -84,7 +83,6 @@ function LDAPProviderToJSON(value) {
84
83
  'authorization_flow': value.authorizationFlow,
85
84
  'property_mappings': value.propertyMappings,
86
85
  'base_dn': value.baseDn,
87
- 'search_group': value.searchGroup,
88
86
  'certificate': value.certificate,
89
87
  'tls_server_name': value.tlsServerName,
90
88
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
46
46
  * @memberof LDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -40,7 +40,6 @@ function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
40
40
  'authorizationFlow': json['authorization_flow'],
41
41
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
42
42
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
43
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
44
43
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
45
44
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
46
45
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -64,7 +63,6 @@ function LDAPProviderRequestToJSON(value) {
64
63
  'authorization_flow': value.authorizationFlow,
65
64
  'property_mappings': value.propertyMappings,
66
65
  'base_dn': value.baseDn,
67
- 'search_group': value.searchGroup,
68
66
  'certificate': value.certificate,
69
67
  'tls_server_name': value.tlsServerName,
70
68
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
46
46
  * @memberof PatchedLDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof PatchedLDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -38,7 +38,6 @@ function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
38
38
  'authorizationFlow': !(0, runtime_1.exists)(json, 'authorization_flow') ? undefined : json['authorization_flow'],
39
39
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
40
40
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
41
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
42
41
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
43
42
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
44
43
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -62,7 +61,6 @@ function PatchedLDAPProviderRequestToJSON(value) {
62
61
  'authorization_flow': value.authorizationFlow,
63
62
  'property_mappings': value.propertyMappings,
64
63
  'base_dn': value.baseDn,
65
- 'search_group': value.searchGroup,
66
64
  'certificate': value.certificate,
67
65
  'tls_server_name': value.tlsServerName,
68
66
  'uid_start_number': value.uidStartNumber,
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
177
177
  export * from './KubernetesServiceConnection';
178
178
  export * from './KubernetesServiceConnectionRequest';
179
179
  export * from './LDAPAPIAccessMode';
180
+ export * from './LDAPCheckAccess';
180
181
  export * from './LDAPDebug';
181
182
  export * from './LDAPOutpostConfig';
182
183
  export * from './LDAPProvider';
@@ -195,6 +195,7 @@ __exportStar(require("./IssuerModeEnum"), exports);
195
195
  __exportStar(require("./KubernetesServiceConnection"), exports);
196
196
  __exportStar(require("./KubernetesServiceConnectionRequest"), exports);
197
197
  __exportStar(require("./LDAPAPIAccessMode"), exports);
198
+ __exportStar(require("./LDAPCheckAccess"), exports);
198
199
  __exportStar(require("./LDAPDebug"), exports);
199
200
  __exportStar(require("./LDAPOutpostConfig"), exports);
200
201
  __exportStar(require("./LDAPProvider"), exports);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.6.3-1723497462",
3
+ "version": "2024.6.3-1723645891",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -20,6 +20,7 @@ import type {
20
20
  GenericError,
21
21
  KubernetesServiceConnection,
22
22
  KubernetesServiceConnectionRequest,
23
+ LDAPCheckAccess,
23
24
  Outpost,
24
25
  OutpostDefaultConfig,
25
26
  OutpostHealth,
@@ -52,6 +53,8 @@ import {
52
53
  KubernetesServiceConnectionToJSON,
53
54
  KubernetesServiceConnectionRequestFromJSON,
54
55
  KubernetesServiceConnectionRequestToJSON,
56
+ LDAPCheckAccessFromJSON,
57
+ LDAPCheckAccessToJSON,
55
58
  OutpostFromJSON,
56
59
  OutpostToJSON,
57
60
  OutpostDefaultConfigFromJSON,
@@ -149,6 +152,11 @@ export interface OutpostsInstancesUsedByListRequest {
149
152
  uuid: string;
150
153
  }
151
154
 
155
+ export interface OutpostsLdapAccessCheckRequest {
156
+ id: number;
157
+ appSlug?: string;
158
+ }
159
+
152
160
  export interface OutpostsLdapListRequest {
153
161
  name?: string;
154
162
  ordering?: string;
@@ -165,7 +173,7 @@ export interface OutpostsProxyListRequest {
165
173
  search?: string;
166
174
  }
167
175
 
168
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
176
+ export interface OutpostsRadiusAccessCheckRequest {
169
177
  id: number;
170
178
  appSlug?: string;
171
179
  }
@@ -714,6 +722,48 @@ export class OutpostsApi extends runtime.BaseAPI {
714
722
  return await response.value();
715
723
  }
716
724
 
725
+ /**
726
+ * Check access to a single application by slug
727
+ */
728
+ async outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>> {
729
+ if (requestParameters.id === null || requestParameters.id === undefined) {
730
+ throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
731
+ }
732
+
733
+ const queryParameters: any = {};
734
+
735
+ if (requestParameters.appSlug !== undefined) {
736
+ queryParameters['app_slug'] = requestParameters.appSlug;
737
+ }
738
+
739
+ const headerParameters: runtime.HTTPHeaders = {};
740
+
741
+ if (this.configuration && this.configuration.accessToken) {
742
+ const token = this.configuration.accessToken;
743
+ const tokenString = await token("authentik", []);
744
+
745
+ if (tokenString) {
746
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
747
+ }
748
+ }
749
+ const response = await this.request({
750
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
751
+ method: 'GET',
752
+ headers: headerParameters,
753
+ query: queryParameters,
754
+ }, initOverrides);
755
+
756
+ return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
757
+ }
758
+
759
+ /**
760
+ * Check access to a single application by slug
761
+ */
762
+ async outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess> {
763
+ const response = await this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
764
+ return await response.value();
765
+ }
766
+
717
767
  /**
718
768
  * LDAPProvider Viewset
719
769
  */
@@ -825,9 +875,9 @@ export class OutpostsApi extends runtime.BaseAPI {
825
875
  /**
826
876
  * Check access to a single application by slug
827
877
  */
828
- async outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>> {
878
+ async outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>> {
829
879
  if (requestParameters.id === null || requestParameters.id === undefined) {
830
- throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
880
+ throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
831
881
  }
832
882
 
833
883
  const queryParameters: any = {};
@@ -859,8 +909,8 @@ export class OutpostsApi extends runtime.BaseAPI {
859
909
  /**
860
910
  * Check access to a single application by slug
861
911
  */
862
- async outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess> {
863
- const response = await this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
912
+ async outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess> {
913
+ const response = await this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
864
914
  return await response.value();
865
915
  }
866
916
 
@@ -345,8 +345,6 @@ export interface ProvidersLdapListRequest {
345
345
  page?: number;
346
346
  pageSize?: number;
347
347
  search?: string;
348
- searchGroupGroupUuidIexact?: string;
349
- searchGroupNameIexact?: string;
350
348
  tlsServerNameIexact?: string;
351
349
  uidStartNumberIexact?: number;
352
350
  }
@@ -1914,14 +1912,6 @@ export class ProvidersApi extends runtime.BaseAPI {
1914
1912
  queryParameters['search'] = requestParameters.search;
1915
1913
  }
1916
1914
 
1917
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1918
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1919
- }
1920
-
1921
- if (requestParameters.searchGroupNameIexact !== undefined) {
1922
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1923
- }
1924
-
1925
1915
  if (requestParameters.tlsServerNameIexact !== undefined) {
1926
1916
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1927
1917
  }
@@ -0,0 +1,81 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.6.3
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+
15
+ import { exists, mapValues } from '../runtime';
16
+ import type { PolicyTestResult } from './PolicyTestResult';
17
+ import {
18
+ PolicyTestResultFromJSON,
19
+ PolicyTestResultFromJSONTyped,
20
+ PolicyTestResultToJSON,
21
+ } from './PolicyTestResult';
22
+
23
+ /**
24
+ * Base serializer class which doesn't implement create/update methods
25
+ * @export
26
+ * @interface LDAPCheckAccess
27
+ */
28
+ export interface LDAPCheckAccess {
29
+ /**
30
+ *
31
+ * @type {boolean}
32
+ * @memberof LDAPCheckAccess
33
+ */
34
+ hasSearchPermission?: boolean;
35
+ /**
36
+ *
37
+ * @type {PolicyTestResult}
38
+ * @memberof LDAPCheckAccess
39
+ */
40
+ access: PolicyTestResult;
41
+ }
42
+
43
+ /**
44
+ * Check if a given object implements the LDAPCheckAccess interface.
45
+ */
46
+ export function instanceOfLDAPCheckAccess(value: object): boolean {
47
+ let isInstance = true;
48
+ isInstance = isInstance && "access" in value;
49
+
50
+ return isInstance;
51
+ }
52
+
53
+ export function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess {
54
+ return LDAPCheckAccessFromJSONTyped(json, false);
55
+ }
56
+
57
+ export function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess {
58
+ if ((json === undefined) || (json === null)) {
59
+ return json;
60
+ }
61
+ return {
62
+
63
+ 'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
64
+ 'access': PolicyTestResultFromJSON(json['access']),
65
+ };
66
+ }
67
+
68
+ export function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any {
69
+ if (value === undefined) {
70
+ return undefined;
71
+ }
72
+ if (value === null) {
73
+ return null;
74
+ }
75
+ return {
76
+
77
+ 'has_search_permission': value.hasSearchPermission,
78
+ 'access': PolicyTestResultToJSON(value.access),
79
+ };
80
+ }
81
+
@@ -56,12 +56,6 @@ export interface LDAPOutpostConfig {
56
56
  * @memberof LDAPOutpostConfig
57
57
  */
58
58
  readonly applicationSlug: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof LDAPOutpostConfig
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -134,7 +128,6 @@ export function LDAPOutpostConfigFromJSONTyped(json: any, ignoreDiscriminator: b
134
128
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
135
129
  'bindFlowSlug': json['bind_flow_slug'],
136
130
  'applicationSlug': json['application_slug'],
137
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
138
131
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
139
132
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
140
133
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -157,7 +150,6 @@ export function LDAPOutpostConfigToJSON(value?: LDAPOutpostConfig | null): any {
157
150
  'name': value.name,
158
151
  'base_dn': value.baseDn,
159
152
  'bind_flow_slug': value.bindFlowSlug,
160
- 'search_group': value.searchGroup,
161
153
  'certificate': value.certificate,
162
154
  'tls_server_name': value.tlsServerName,
163
155
  'uid_start_number': value.uidStartNumber,
@@ -110,12 +110,6 @@ export interface LDAPProvider {
110
110
  * @memberof LDAPProvider
111
111
  */
112
112
  baseDn?: string;
113
- /**
114
- * Users in this group can do search queries. If not set, every user can execute search queries.
115
- * @type {string}
116
- * @memberof LDAPProvider
117
- */
118
- searchGroup?: string | null;
119
113
  /**
120
114
  *
121
115
  * @type {string}
@@ -211,7 +205,6 @@ export function LDAPProviderFromJSONTyped(json: any, ignoreDiscriminator: boolea
211
205
  'verboseNamePlural': json['verbose_name_plural'],
212
206
  'metaModelName': json['meta_model_name'],
213
207
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
214
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
215
208
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
216
209
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
217
210
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -237,7 +230,6 @@ export function LDAPProviderToJSON(value?: LDAPProvider | null): any {
237
230
  'authorization_flow': value.authorizationFlow,
238
231
  'property_mappings': value.propertyMappings,
239
232
  'base_dn': value.baseDn,
240
- 'search_group': value.searchGroup,
241
233
  'certificate': value.certificate,
242
234
  'tls_server_name': value.tlsServerName,
243
235
  'uid_start_number': value.uidStartNumber,
@@ -56,12 +56,6 @@ export interface LDAPProviderRequest {
56
56
  * @memberof LDAPProviderRequest
57
57
  */
58
58
  baseDn?: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof LDAPProviderRequest
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -132,7 +126,6 @@ export function LDAPProviderRequestFromJSONTyped(json: any, ignoreDiscriminator:
132
126
  'authorizationFlow': json['authorization_flow'],
133
127
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
134
128
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
135
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
136
129
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
137
130
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
138
131
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -157,7 +150,6 @@ export function LDAPProviderRequestToJSON(value?: LDAPProviderRequest | null): a
157
150
  'authorization_flow': value.authorizationFlow,
158
151
  'property_mappings': value.propertyMappings,
159
152
  'base_dn': value.baseDn,
160
- 'search_group': value.searchGroup,
161
153
  'certificate': value.certificate,
162
154
  'tls_server_name': value.tlsServerName,
163
155
  'uid_start_number': value.uidStartNumber,
@@ -56,12 +56,6 @@ export interface PatchedLDAPProviderRequest {
56
56
  * @memberof PatchedLDAPProviderRequest
57
57
  */
58
58
  baseDn?: string;
59
- /**
60
- * Users in this group can do search queries. If not set, every user can execute search queries.
61
- * @type {string}
62
- * @memberof PatchedLDAPProviderRequest
63
- */
64
- searchGroup?: string | null;
65
59
  /**
66
60
  *
67
61
  * @type {string}
@@ -130,7 +124,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json: any, ignoreDiscrim
130
124
  'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
131
125
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
132
126
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
133
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
134
127
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
135
128
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
136
129
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -155,7 +148,6 @@ export function PatchedLDAPProviderRequestToJSON(value?: PatchedLDAPProviderRequ
155
148
  'authorization_flow': value.authorizationFlow,
156
149
  'property_mappings': value.propertyMappings,
157
150
  'base_dn': value.baseDn,
158
- 'search_group': value.searchGroup,
159
151
  'certificate': value.certificate,
160
152
  'tls_server_name': value.tlsServerName,
161
153
  'uid_start_number': value.uidStartNumber,
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
179
179
  export * from './KubernetesServiceConnection';
180
180
  export * from './KubernetesServiceConnectionRequest';
181
181
  export * from './LDAPAPIAccessMode';
182
+ export * from './LDAPCheckAccess';
182
183
  export * from './LDAPDebug';
183
184
  export * from './LDAPOutpostConfig';
184
185
  export * from './LDAPProvider';