@goauthentik/api 2024.6.3-1723497462 → 2024.6.3-1723921843

Sign up to get free protection for your applications and to get access to all the features.
Files changed (57) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/OutpostsApi.d.ts +16 -4
  3. package/dist/apis/OutpostsApi.js +42 -4
  4. package/dist/apis/ProvidersApi.d.ts +3 -2
  5. package/dist/apis/ProvidersApi.js +9 -6
  6. package/dist/esm/apis/OutpostsApi.d.ts +16 -4
  7. package/dist/esm/apis/OutpostsApi.js +43 -5
  8. package/dist/esm/apis/ProvidersApi.d.ts +3 -2
  9. package/dist/esm/apis/ProvidersApi.js +9 -6
  10. package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
  11. package/dist/esm/models/LDAPCheckAccess.js +47 -0
  12. package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
  13. package/dist/esm/models/LDAPOutpostConfig.js +0 -2
  14. package/dist/esm/models/LDAPProvider.d.ts +0 -6
  15. package/dist/esm/models/LDAPProvider.js +0 -2
  16. package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
  17. package/dist/esm/models/LDAPProviderRequest.js +0 -2
  18. package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
  19. package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
  20. package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +18 -0
  21. package/dist/esm/models/PatchedSAMLProviderRequest.js +6 -0
  22. package/dist/esm/models/SAMLProvider.d.ts +18 -0
  23. package/dist/esm/models/SAMLProvider.js +6 -0
  24. package/dist/esm/models/SAMLProviderRequest.d.ts +18 -0
  25. package/dist/esm/models/SAMLProviderRequest.js +6 -0
  26. package/dist/esm/models/index.d.ts +1 -0
  27. package/dist/esm/models/index.js +1 -0
  28. package/dist/models/LDAPCheckAccess.d.ts +38 -0
  29. package/dist/models/LDAPCheckAccess.js +54 -0
  30. package/dist/models/LDAPOutpostConfig.d.ts +0 -6
  31. package/dist/models/LDAPOutpostConfig.js +0 -2
  32. package/dist/models/LDAPProvider.d.ts +0 -6
  33. package/dist/models/LDAPProvider.js +0 -2
  34. package/dist/models/LDAPProviderRequest.d.ts +0 -6
  35. package/dist/models/LDAPProviderRequest.js +0 -2
  36. package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
  37. package/dist/models/PatchedLDAPProviderRequest.js +0 -2
  38. package/dist/models/PatchedSAMLProviderRequest.d.ts +18 -0
  39. package/dist/models/PatchedSAMLProviderRequest.js +6 -0
  40. package/dist/models/SAMLProvider.d.ts +18 -0
  41. package/dist/models/SAMLProvider.js +6 -0
  42. package/dist/models/SAMLProviderRequest.d.ts +18 -0
  43. package/dist/models/SAMLProviderRequest.js +6 -0
  44. package/dist/models/index.d.ts +1 -0
  45. package/dist/models/index.js +1 -0
  46. package/package.json +1 -1
  47. package/src/apis/OutpostsApi.ts +55 -5
  48. package/src/apis/ProvidersApi.ts +15 -10
  49. package/src/models/LDAPCheckAccess.ts +81 -0
  50. package/src/models/LDAPOutpostConfig.ts +0 -8
  51. package/src/models/LDAPProvider.ts +0 -8
  52. package/src/models/LDAPProviderRequest.ts +0 -8
  53. package/src/models/PatchedLDAPProviderRequest.ts +0 -8
  54. package/src/models/PatchedSAMLProviderRequest.ts +24 -0
  55. package/src/models/SAMLProvider.ts +24 -0
  56. package/src/models/SAMLProviderRequest.ts +24 -0
  57. package/src/models/index.ts +1 -0
@@ -204,6 +204,7 @@ src/models/IssuerModeEnum.ts
204
204
  src/models/KubernetesServiceConnection.ts
205
205
  src/models/KubernetesServiceConnectionRequest.ts
206
206
  src/models/LDAPAPIAccessMode.ts
207
+ src/models/LDAPCheckAccess.ts
207
208
  src/models/LDAPDebug.ts
208
209
  src/models/LDAPOutpostConfig.ts
209
210
  src/models/LDAPProvider.ts
@@ -10,7 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
13
+ import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
14
14
  export interface OutpostsInstancesCreateRequest {
15
15
  outpostRequest: OutpostRequest;
16
16
  }
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
58
58
  export interface OutpostsInstancesUsedByListRequest {
59
59
  uuid: string;
60
60
  }
61
+ export interface OutpostsLdapAccessCheckRequest {
62
+ id: number;
63
+ appSlug?: string;
64
+ }
61
65
  export interface OutpostsLdapListRequest {
62
66
  name?: string;
63
67
  ordering?: string;
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
72
76
  pageSize?: number;
73
77
  search?: string;
74
78
  }
75
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
79
+ export interface OutpostsRadiusAccessCheckRequest {
76
80
  id: number;
77
81
  appSlug?: string;
78
82
  }
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
237
241
  * Get a list of all objects that use this object
238
242
  */
239
243
  outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
244
+ /**
245
+ * Check access to a single application by slug
246
+ */
247
+ outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
248
+ /**
249
+ * Check access to a single application by slug
250
+ */
251
+ outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
240
252
  /**
241
253
  * LDAPProvider Viewset
242
254
  */
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
256
268
  /**
257
269
  * Check access to a single application by slug
258
270
  */
259
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
271
+ outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
260
272
  /**
261
273
  * Check access to a single application by slug
262
274
  */
263
- outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
275
+ outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
264
276
  /**
265
277
  * RadiusProvider Viewset
266
278
  */
@@ -412,6 +412,44 @@ class OutpostsApi extends runtime.BaseAPI {
412
412
  return yield response.value();
413
413
  });
414
414
  }
415
+ /**
416
+ * Check access to a single application by slug
417
+ */
418
+ outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
419
+ return __awaiter(this, void 0, void 0, function* () {
420
+ if (requestParameters.id === null || requestParameters.id === undefined) {
421
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
422
+ }
423
+ const queryParameters = {};
424
+ if (requestParameters.appSlug !== undefined) {
425
+ queryParameters['app_slug'] = requestParameters.appSlug;
426
+ }
427
+ const headerParameters = {};
428
+ if (this.configuration && this.configuration.accessToken) {
429
+ const token = this.configuration.accessToken;
430
+ const tokenString = yield token("authentik", []);
431
+ if (tokenString) {
432
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
433
+ }
434
+ }
435
+ const response = yield this.request({
436
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
437
+ method: 'GET',
438
+ headers: headerParameters,
439
+ query: queryParameters,
440
+ }, initOverrides);
441
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.LDAPCheckAccessFromJSON)(jsonValue));
442
+ });
443
+ }
444
+ /**
445
+ * Check access to a single application by slug
446
+ */
447
+ outpostsLdapAccessCheck(requestParameters, initOverrides) {
448
+ return __awaiter(this, void 0, void 0, function* () {
449
+ const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
450
+ return yield response.value();
451
+ });
452
+ }
415
453
  /**
416
454
  * LDAPProvider Viewset
417
455
  */
@@ -509,10 +547,10 @@ class OutpostsApi extends runtime.BaseAPI {
509
547
  /**
510
548
  * Check access to a single application by slug
511
549
  */
512
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides) {
550
+ outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
513
551
  return __awaiter(this, void 0, void 0, function* () {
514
552
  if (requestParameters.id === null || requestParameters.id === undefined) {
515
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
553
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
516
554
  }
517
555
  const queryParameters = {};
518
556
  if (requestParameters.appSlug !== undefined) {
@@ -538,9 +576,9 @@ class OutpostsApi extends runtime.BaseAPI {
538
576
  /**
539
577
  * Check access to a single application by slug
540
578
  */
541
- outpostsRadiusCheckAccessRetrieve(requestParameters, initOverrides) {
579
+ outpostsRadiusAccessCheck(requestParameters, initOverrides) {
542
580
  return __awaiter(this, void 0, void 0, function* () {
543
- const response = yield this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
581
+ const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
544
582
  return yield response.value();
545
583
  });
546
584
  }
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
121
121
  page?: number;
122
122
  pageSize?: number;
123
123
  search?: string;
124
- searchGroupGroupUuidIexact?: string;
125
- searchGroupNameIexact?: string;
126
124
  tlsServerNameIexact?: string;
127
125
  uidStartNumberIexact?: number;
128
126
  }
@@ -382,6 +380,7 @@ export interface ProvidersSamlListRequest {
382
380
  backchannelApplication?: string;
383
381
  defaultRelayState?: string;
384
382
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
383
+ encryptionKp?: string;
385
384
  isBackchannel?: boolean;
386
385
  issuer?: string;
387
386
  name?: string;
@@ -392,6 +391,8 @@ export interface ProvidersSamlListRequest {
392
391
  propertyMappings?: Array<string>;
393
392
  search?: string;
394
393
  sessionValidNotOnOrAfter?: string;
394
+ signAssertion?: boolean;
395
+ signResponse?: boolean;
395
396
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
396
397
  signingKp?: string;
397
398
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -1022,12 +1022,6 @@ class ProvidersApi extends runtime.BaseAPI {
1022
1022
  if (requestParameters.search !== undefined) {
1023
1023
  queryParameters['search'] = requestParameters.search;
1024
1024
  }
1025
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1026
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1027
- }
1028
- if (requestParameters.searchGroupNameIexact !== undefined) {
1029
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1030
- }
1031
1025
  if (requestParameters.tlsServerNameIexact !== undefined) {
1032
1026
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1033
1027
  }
@@ -3299,6 +3293,9 @@ class ProvidersApi extends runtime.BaseAPI {
3299
3293
  if (requestParameters.digestAlgorithm !== undefined) {
3300
3294
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
3301
3295
  }
3296
+ if (requestParameters.encryptionKp !== undefined) {
3297
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
3298
+ }
3302
3299
  if (requestParameters.isBackchannel !== undefined) {
3303
3300
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
3304
3301
  }
@@ -3329,6 +3326,12 @@ class ProvidersApi extends runtime.BaseAPI {
3329
3326
  if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
3330
3327
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
3331
3328
  }
3329
+ if (requestParameters.signAssertion !== undefined) {
3330
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
3331
+ }
3332
+ if (requestParameters.signResponse !== undefined) {
3333
+ queryParameters['sign_response'] = requestParameters.signResponse;
3334
+ }
3332
3335
  if (requestParameters.signatureAlgorithm !== undefined) {
3333
3336
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
3334
3337
  }
@@ -10,7 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
13
+ import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
14
14
  export interface OutpostsInstancesCreateRequest {
15
15
  outpostRequest: OutpostRequest;
16
16
  }
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
58
58
  export interface OutpostsInstancesUsedByListRequest {
59
59
  uuid: string;
60
60
  }
61
+ export interface OutpostsLdapAccessCheckRequest {
62
+ id: number;
63
+ appSlug?: string;
64
+ }
61
65
  export interface OutpostsLdapListRequest {
62
66
  name?: string;
63
67
  ordering?: string;
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
72
76
  pageSize?: number;
73
77
  search?: string;
74
78
  }
75
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
79
+ export interface OutpostsRadiusAccessCheckRequest {
76
80
  id: number;
77
81
  appSlug?: string;
78
82
  }
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
237
241
  * Get a list of all objects that use this object
238
242
  */
239
243
  outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
244
+ /**
245
+ * Check access to a single application by slug
246
+ */
247
+ outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
248
+ /**
249
+ * Check access to a single application by slug
250
+ */
251
+ outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
240
252
  /**
241
253
  * LDAPProvider Viewset
242
254
  */
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
256
268
  /**
257
269
  * Check access to a single application by slug
258
270
  */
259
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
271
+ outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
260
272
  /**
261
273
  * Check access to a single application by slug
262
274
  */
263
- outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
275
+ outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
264
276
  /**
265
277
  * RadiusProvider Viewset
266
278
  */
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
21
21
  });
22
22
  };
23
23
  import * as runtime from '../runtime';
24
- import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
24
+ import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, LDAPCheckAccessFromJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
25
25
  /**
26
26
  *
27
27
  */
@@ -409,6 +409,44 @@ export class OutpostsApi extends runtime.BaseAPI {
409
409
  return yield response.value();
410
410
  });
411
411
  }
412
+ /**
413
+ * Check access to a single application by slug
414
+ */
415
+ outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
416
+ return __awaiter(this, void 0, void 0, function* () {
417
+ if (requestParameters.id === null || requestParameters.id === undefined) {
418
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
419
+ }
420
+ const queryParameters = {};
421
+ if (requestParameters.appSlug !== undefined) {
422
+ queryParameters['app_slug'] = requestParameters.appSlug;
423
+ }
424
+ const headerParameters = {};
425
+ if (this.configuration && this.configuration.accessToken) {
426
+ const token = this.configuration.accessToken;
427
+ const tokenString = yield token("authentik", []);
428
+ if (tokenString) {
429
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
430
+ }
431
+ }
432
+ const response = yield this.request({
433
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
434
+ method: 'GET',
435
+ headers: headerParameters,
436
+ query: queryParameters,
437
+ }, initOverrides);
438
+ return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
439
+ });
440
+ }
441
+ /**
442
+ * Check access to a single application by slug
443
+ */
444
+ outpostsLdapAccessCheck(requestParameters, initOverrides) {
445
+ return __awaiter(this, void 0, void 0, function* () {
446
+ const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
447
+ return yield response.value();
448
+ });
449
+ }
412
450
  /**
413
451
  * LDAPProvider Viewset
414
452
  */
@@ -506,10 +544,10 @@ export class OutpostsApi extends runtime.BaseAPI {
506
544
  /**
507
545
  * Check access to a single application by slug
508
546
  */
509
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides) {
547
+ outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
510
548
  return __awaiter(this, void 0, void 0, function* () {
511
549
  if (requestParameters.id === null || requestParameters.id === undefined) {
512
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
550
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
513
551
  }
514
552
  const queryParameters = {};
515
553
  if (requestParameters.appSlug !== undefined) {
@@ -535,9 +573,9 @@ export class OutpostsApi extends runtime.BaseAPI {
535
573
  /**
536
574
  * Check access to a single application by slug
537
575
  */
538
- outpostsRadiusCheckAccessRetrieve(requestParameters, initOverrides) {
576
+ outpostsRadiusAccessCheck(requestParameters, initOverrides) {
539
577
  return __awaiter(this, void 0, void 0, function* () {
540
- const response = yield this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
578
+ const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
541
579
  return yield response.value();
542
580
  });
543
581
  }
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
121
121
  page?: number;
122
122
  pageSize?: number;
123
123
  search?: string;
124
- searchGroupGroupUuidIexact?: string;
125
- searchGroupNameIexact?: string;
126
124
  tlsServerNameIexact?: string;
127
125
  uidStartNumberIexact?: number;
128
126
  }
@@ -382,6 +380,7 @@ export interface ProvidersSamlListRequest {
382
380
  backchannelApplication?: string;
383
381
  defaultRelayState?: string;
384
382
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
383
+ encryptionKp?: string;
385
384
  isBackchannel?: boolean;
386
385
  issuer?: string;
387
386
  name?: string;
@@ -392,6 +391,8 @@ export interface ProvidersSamlListRequest {
392
391
  propertyMappings?: Array<string>;
393
392
  search?: string;
394
393
  sessionValidNotOnOrAfter?: string;
394
+ signAssertion?: boolean;
395
+ signResponse?: boolean;
395
396
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
396
397
  signingKp?: string;
397
398
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -1019,12 +1019,6 @@ export class ProvidersApi extends runtime.BaseAPI {
1019
1019
  if (requestParameters.search !== undefined) {
1020
1020
  queryParameters['search'] = requestParameters.search;
1021
1021
  }
1022
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1023
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1024
- }
1025
- if (requestParameters.searchGroupNameIexact !== undefined) {
1026
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1027
- }
1028
1022
  if (requestParameters.tlsServerNameIexact !== undefined) {
1029
1023
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1030
1024
  }
@@ -3296,6 +3290,9 @@ export class ProvidersApi extends runtime.BaseAPI {
3296
3290
  if (requestParameters.digestAlgorithm !== undefined) {
3297
3291
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
3298
3292
  }
3293
+ if (requestParameters.encryptionKp !== undefined) {
3294
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
3295
+ }
3299
3296
  if (requestParameters.isBackchannel !== undefined) {
3300
3297
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
3301
3298
  }
@@ -3326,6 +3323,12 @@ export class ProvidersApi extends runtime.BaseAPI {
3326
3323
  if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
3327
3324
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
3328
3325
  }
3326
+ if (requestParameters.signAssertion !== undefined) {
3327
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
3328
+ }
3329
+ if (requestParameters.signResponse !== undefined) {
3330
+ queryParameters['sign_response'] = requestParameters.signResponse;
3331
+ }
3329
3332
  if (requestParameters.signatureAlgorithm !== undefined) {
3330
3333
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
3331
3334
  }
@@ -0,0 +1,38 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.6.3
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { PolicyTestResult } from './PolicyTestResult';
13
+ /**
14
+ * Base serializer class which doesn't implement create/update methods
15
+ * @export
16
+ * @interface LDAPCheckAccess
17
+ */
18
+ export interface LDAPCheckAccess {
19
+ /**
20
+ *
21
+ * @type {boolean}
22
+ * @memberof LDAPCheckAccess
23
+ */
24
+ hasSearchPermission?: boolean;
25
+ /**
26
+ *
27
+ * @type {PolicyTestResult}
28
+ * @memberof LDAPCheckAccess
29
+ */
30
+ access: PolicyTestResult;
31
+ }
32
+ /**
33
+ * Check if a given object implements the LDAPCheckAccess interface.
34
+ */
35
+ export declare function instanceOfLDAPCheckAccess(value: object): boolean;
36
+ export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
37
+ export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
38
+ export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
@@ -0,0 +1,47 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.6.3
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ import { exists } from '../runtime';
15
+ import { PolicyTestResultFromJSON, PolicyTestResultToJSON, } from './PolicyTestResult';
16
+ /**
17
+ * Check if a given object implements the LDAPCheckAccess interface.
18
+ */
19
+ export function instanceOfLDAPCheckAccess(value) {
20
+ let isInstance = true;
21
+ isInstance = isInstance && "access" in value;
22
+ return isInstance;
23
+ }
24
+ export function LDAPCheckAccessFromJSON(json) {
25
+ return LDAPCheckAccessFromJSONTyped(json, false);
26
+ }
27
+ export function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
28
+ if ((json === undefined) || (json === null)) {
29
+ return json;
30
+ }
31
+ return {
32
+ 'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
33
+ 'access': PolicyTestResultFromJSON(json['access']),
34
+ };
35
+ }
36
+ export function LDAPCheckAccessToJSON(value) {
37
+ if (value === undefined) {
38
+ return undefined;
39
+ }
40
+ if (value === null) {
41
+ return null;
42
+ }
43
+ return {
44
+ 'has_search_permission': value.hasSearchPermission,
45
+ 'access': PolicyTestResultToJSON(value.access),
46
+ };
47
+ }
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
46
46
  * @memberof LDAPOutpostConfig
47
47
  */
48
48
  readonly applicationSlug: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPOutpostConfig
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -37,7 +37,6 @@ export function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
37
37
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
38
38
  'bindFlowSlug': json['bind_flow_slug'],
39
39
  'applicationSlug': json['application_slug'],
40
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
41
40
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
42
41
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
43
42
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -58,7 +57,6 @@ export function LDAPOutpostConfigToJSON(value) {
58
57
  'name': value.name,
59
58
  'base_dn': value.baseDn,
60
59
  'bind_flow_slug': value.bindFlowSlug,
61
- 'search_group': value.searchGroup,
62
60
  'certificate': value.certificate,
63
61
  'tls_server_name': value.tlsServerName,
64
62
  'uid_start_number': value.uidStartNumber,
@@ -100,12 +100,6 @@ export interface LDAPProvider {
100
100
  * @memberof LDAPProvider
101
101
  */
102
102
  baseDn?: string;
103
- /**
104
- * Users in this group can do search queries. If not set, every user can execute search queries.
105
- * @type {string}
106
- * @memberof LDAPProvider
107
- */
108
- searchGroup?: string | null;
109
103
  /**
110
104
  *
111
105
  * @type {string}
@@ -54,7 +54,6 @@ export function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
54
54
  'verboseNamePlural': json['verbose_name_plural'],
55
55
  'metaModelName': json['meta_model_name'],
56
56
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
57
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
58
57
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
59
58
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
60
59
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -78,7 +77,6 @@ export function LDAPProviderToJSON(value) {
78
77
  'authorization_flow': value.authorizationFlow,
79
78
  'property_mappings': value.propertyMappings,
80
79
  'base_dn': value.baseDn,
81
- 'search_group': value.searchGroup,
82
80
  'certificate': value.certificate,
83
81
  'tls_server_name': value.tlsServerName,
84
82
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
46
46
  * @memberof LDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -35,7 +35,6 @@ export function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
35
35
  'authorizationFlow': json['authorization_flow'],
36
36
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
37
37
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
38
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
39
38
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
40
39
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
41
40
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -58,7 +57,6 @@ export function LDAPProviderRequestToJSON(value) {
58
57
  'authorization_flow': value.authorizationFlow,
59
58
  'property_mappings': value.propertyMappings,
60
59
  'base_dn': value.baseDn,
61
- 'search_group': value.searchGroup,
62
60
  'certificate': value.certificate,
63
61
  'tls_server_name': value.tlsServerName,
64
62
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
46
46
  * @memberof PatchedLDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof PatchedLDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -33,7 +33,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminato
33
33
  'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
34
34
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
35
35
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
36
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
37
36
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
38
37
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
39
38
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -56,7 +55,6 @@ export function PatchedLDAPProviderRequestToJSON(value) {
56
55
  'authorization_flow': value.authorizationFlow,
57
56
  'property_mappings': value.propertyMappings,
58
57
  'base_dn': value.baseDn,
59
- 'search_group': value.searchGroup,
60
58
  'certificate': value.certificate,
61
59
  'tls_server_name': value.tlsServerName,
62
60
  'uid_start_number': value.uidStartNumber,
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
108
108
  * @memberof PatchedSAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof PatchedSAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof PatchedSAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof PatchedSAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}