@goauthentik/api 2024.6.3-1723497462 → 2024.6.3-1723921843

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/OutpostsApi.d.ts +16 -4
  3. package/dist/apis/OutpostsApi.js +42 -4
  4. package/dist/apis/ProvidersApi.d.ts +3 -2
  5. package/dist/apis/ProvidersApi.js +9 -6
  6. package/dist/esm/apis/OutpostsApi.d.ts +16 -4
  7. package/dist/esm/apis/OutpostsApi.js +43 -5
  8. package/dist/esm/apis/ProvidersApi.d.ts +3 -2
  9. package/dist/esm/apis/ProvidersApi.js +9 -6
  10. package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
  11. package/dist/esm/models/LDAPCheckAccess.js +47 -0
  12. package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
  13. package/dist/esm/models/LDAPOutpostConfig.js +0 -2
  14. package/dist/esm/models/LDAPProvider.d.ts +0 -6
  15. package/dist/esm/models/LDAPProvider.js +0 -2
  16. package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
  17. package/dist/esm/models/LDAPProviderRequest.js +0 -2
  18. package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
  19. package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
  20. package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +18 -0
  21. package/dist/esm/models/PatchedSAMLProviderRequest.js +6 -0
  22. package/dist/esm/models/SAMLProvider.d.ts +18 -0
  23. package/dist/esm/models/SAMLProvider.js +6 -0
  24. package/dist/esm/models/SAMLProviderRequest.d.ts +18 -0
  25. package/dist/esm/models/SAMLProviderRequest.js +6 -0
  26. package/dist/esm/models/index.d.ts +1 -0
  27. package/dist/esm/models/index.js +1 -0
  28. package/dist/models/LDAPCheckAccess.d.ts +38 -0
  29. package/dist/models/LDAPCheckAccess.js +54 -0
  30. package/dist/models/LDAPOutpostConfig.d.ts +0 -6
  31. package/dist/models/LDAPOutpostConfig.js +0 -2
  32. package/dist/models/LDAPProvider.d.ts +0 -6
  33. package/dist/models/LDAPProvider.js +0 -2
  34. package/dist/models/LDAPProviderRequest.d.ts +0 -6
  35. package/dist/models/LDAPProviderRequest.js +0 -2
  36. package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
  37. package/dist/models/PatchedLDAPProviderRequest.js +0 -2
  38. package/dist/models/PatchedSAMLProviderRequest.d.ts +18 -0
  39. package/dist/models/PatchedSAMLProviderRequest.js +6 -0
  40. package/dist/models/SAMLProvider.d.ts +18 -0
  41. package/dist/models/SAMLProvider.js +6 -0
  42. package/dist/models/SAMLProviderRequest.d.ts +18 -0
  43. package/dist/models/SAMLProviderRequest.js +6 -0
  44. package/dist/models/index.d.ts +1 -0
  45. package/dist/models/index.js +1 -0
  46. package/package.json +1 -1
  47. package/src/apis/OutpostsApi.ts +55 -5
  48. package/src/apis/ProvidersApi.ts +15 -10
  49. package/src/models/LDAPCheckAccess.ts +81 -0
  50. package/src/models/LDAPOutpostConfig.ts +0 -8
  51. package/src/models/LDAPProvider.ts +0 -8
  52. package/src/models/LDAPProviderRequest.ts +0 -8
  53. package/src/models/PatchedLDAPProviderRequest.ts +0 -8
  54. package/src/models/PatchedSAMLProviderRequest.ts +24 -0
  55. package/src/models/SAMLProvider.ts +24 -0
  56. package/src/models/SAMLProviderRequest.ts +24 -0
  57. package/src/models/index.ts +1 -0
@@ -204,6 +204,7 @@ src/models/IssuerModeEnum.ts
204
204
  src/models/KubernetesServiceConnection.ts
205
205
  src/models/KubernetesServiceConnectionRequest.ts
206
206
  src/models/LDAPAPIAccessMode.ts
207
+ src/models/LDAPCheckAccess.ts
207
208
  src/models/LDAPDebug.ts
208
209
  src/models/LDAPOutpostConfig.ts
209
210
  src/models/LDAPProvider.ts
@@ -10,7 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
13
+ import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
14
14
  export interface OutpostsInstancesCreateRequest {
15
15
  outpostRequest: OutpostRequest;
16
16
  }
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
58
58
  export interface OutpostsInstancesUsedByListRequest {
59
59
  uuid: string;
60
60
  }
61
+ export interface OutpostsLdapAccessCheckRequest {
62
+ id: number;
63
+ appSlug?: string;
64
+ }
61
65
  export interface OutpostsLdapListRequest {
62
66
  name?: string;
63
67
  ordering?: string;
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
72
76
  pageSize?: number;
73
77
  search?: string;
74
78
  }
75
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
79
+ export interface OutpostsRadiusAccessCheckRequest {
76
80
  id: number;
77
81
  appSlug?: string;
78
82
  }
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
237
241
  * Get a list of all objects that use this object
238
242
  */
239
243
  outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
244
+ /**
245
+ * Check access to a single application by slug
246
+ */
247
+ outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
248
+ /**
249
+ * Check access to a single application by slug
250
+ */
251
+ outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
240
252
  /**
241
253
  * LDAPProvider Viewset
242
254
  */
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
256
268
  /**
257
269
  * Check access to a single application by slug
258
270
  */
259
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
271
+ outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
260
272
  /**
261
273
  * Check access to a single application by slug
262
274
  */
263
- outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
275
+ outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
264
276
  /**
265
277
  * RadiusProvider Viewset
266
278
  */
@@ -412,6 +412,44 @@ class OutpostsApi extends runtime.BaseAPI {
412
412
  return yield response.value();
413
413
  });
414
414
  }
415
+ /**
416
+ * Check access to a single application by slug
417
+ */
418
+ outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
419
+ return __awaiter(this, void 0, void 0, function* () {
420
+ if (requestParameters.id === null || requestParameters.id === undefined) {
421
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
422
+ }
423
+ const queryParameters = {};
424
+ if (requestParameters.appSlug !== undefined) {
425
+ queryParameters['app_slug'] = requestParameters.appSlug;
426
+ }
427
+ const headerParameters = {};
428
+ if (this.configuration && this.configuration.accessToken) {
429
+ const token = this.configuration.accessToken;
430
+ const tokenString = yield token("authentik", []);
431
+ if (tokenString) {
432
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
433
+ }
434
+ }
435
+ const response = yield this.request({
436
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
437
+ method: 'GET',
438
+ headers: headerParameters,
439
+ query: queryParameters,
440
+ }, initOverrides);
441
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.LDAPCheckAccessFromJSON)(jsonValue));
442
+ });
443
+ }
444
+ /**
445
+ * Check access to a single application by slug
446
+ */
447
+ outpostsLdapAccessCheck(requestParameters, initOverrides) {
448
+ return __awaiter(this, void 0, void 0, function* () {
449
+ const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
450
+ return yield response.value();
451
+ });
452
+ }
415
453
  /**
416
454
  * LDAPProvider Viewset
417
455
  */
@@ -509,10 +547,10 @@ class OutpostsApi extends runtime.BaseAPI {
509
547
  /**
510
548
  * Check access to a single application by slug
511
549
  */
512
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides) {
550
+ outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
513
551
  return __awaiter(this, void 0, void 0, function* () {
514
552
  if (requestParameters.id === null || requestParameters.id === undefined) {
515
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
553
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
516
554
  }
517
555
  const queryParameters = {};
518
556
  if (requestParameters.appSlug !== undefined) {
@@ -538,9 +576,9 @@ class OutpostsApi extends runtime.BaseAPI {
538
576
  /**
539
577
  * Check access to a single application by slug
540
578
  */
541
- outpostsRadiusCheckAccessRetrieve(requestParameters, initOverrides) {
579
+ outpostsRadiusAccessCheck(requestParameters, initOverrides) {
542
580
  return __awaiter(this, void 0, void 0, function* () {
543
- const response = yield this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
581
+ const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
544
582
  return yield response.value();
545
583
  });
546
584
  }
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
121
121
  page?: number;
122
122
  pageSize?: number;
123
123
  search?: string;
124
- searchGroupGroupUuidIexact?: string;
125
- searchGroupNameIexact?: string;
126
124
  tlsServerNameIexact?: string;
127
125
  uidStartNumberIexact?: number;
128
126
  }
@@ -382,6 +380,7 @@ export interface ProvidersSamlListRequest {
382
380
  backchannelApplication?: string;
383
381
  defaultRelayState?: string;
384
382
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
383
+ encryptionKp?: string;
385
384
  isBackchannel?: boolean;
386
385
  issuer?: string;
387
386
  name?: string;
@@ -392,6 +391,8 @@ export interface ProvidersSamlListRequest {
392
391
  propertyMappings?: Array<string>;
393
392
  search?: string;
394
393
  sessionValidNotOnOrAfter?: string;
394
+ signAssertion?: boolean;
395
+ signResponse?: boolean;
395
396
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
396
397
  signingKp?: string;
397
398
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -1022,12 +1022,6 @@ class ProvidersApi extends runtime.BaseAPI {
1022
1022
  if (requestParameters.search !== undefined) {
1023
1023
  queryParameters['search'] = requestParameters.search;
1024
1024
  }
1025
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1026
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1027
- }
1028
- if (requestParameters.searchGroupNameIexact !== undefined) {
1029
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1030
- }
1031
1025
  if (requestParameters.tlsServerNameIexact !== undefined) {
1032
1026
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1033
1027
  }
@@ -3299,6 +3293,9 @@ class ProvidersApi extends runtime.BaseAPI {
3299
3293
  if (requestParameters.digestAlgorithm !== undefined) {
3300
3294
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
3301
3295
  }
3296
+ if (requestParameters.encryptionKp !== undefined) {
3297
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
3298
+ }
3302
3299
  if (requestParameters.isBackchannel !== undefined) {
3303
3300
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
3304
3301
  }
@@ -3329,6 +3326,12 @@ class ProvidersApi extends runtime.BaseAPI {
3329
3326
  if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
3330
3327
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
3331
3328
  }
3329
+ if (requestParameters.signAssertion !== undefined) {
3330
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
3331
+ }
3332
+ if (requestParameters.signResponse !== undefined) {
3333
+ queryParameters['sign_response'] = requestParameters.signResponse;
3334
+ }
3332
3335
  if (requestParameters.signatureAlgorithm !== undefined) {
3333
3336
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
3334
3337
  }
@@ -10,7 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
13
+ import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
14
14
  export interface OutpostsInstancesCreateRequest {
15
15
  outpostRequest: OutpostRequest;
16
16
  }
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
58
58
  export interface OutpostsInstancesUsedByListRequest {
59
59
  uuid: string;
60
60
  }
61
+ export interface OutpostsLdapAccessCheckRequest {
62
+ id: number;
63
+ appSlug?: string;
64
+ }
61
65
  export interface OutpostsLdapListRequest {
62
66
  name?: string;
63
67
  ordering?: string;
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
72
76
  pageSize?: number;
73
77
  search?: string;
74
78
  }
75
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
79
+ export interface OutpostsRadiusAccessCheckRequest {
76
80
  id: number;
77
81
  appSlug?: string;
78
82
  }
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
237
241
  * Get a list of all objects that use this object
238
242
  */
239
243
  outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
244
+ /**
245
+ * Check access to a single application by slug
246
+ */
247
+ outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
248
+ /**
249
+ * Check access to a single application by slug
250
+ */
251
+ outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
240
252
  /**
241
253
  * LDAPProvider Viewset
242
254
  */
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
256
268
  /**
257
269
  * Check access to a single application by slug
258
270
  */
259
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
271
+ outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
260
272
  /**
261
273
  * Check access to a single application by slug
262
274
  */
263
- outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
275
+ outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
264
276
  /**
265
277
  * RadiusProvider Viewset
266
278
  */
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
21
21
  });
22
22
  };
23
23
  import * as runtime from '../runtime';
24
- import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
24
+ import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, LDAPCheckAccessFromJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
25
25
  /**
26
26
  *
27
27
  */
@@ -409,6 +409,44 @@ export class OutpostsApi extends runtime.BaseAPI {
409
409
  return yield response.value();
410
410
  });
411
411
  }
412
+ /**
413
+ * Check access to a single application by slug
414
+ */
415
+ outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
416
+ return __awaiter(this, void 0, void 0, function* () {
417
+ if (requestParameters.id === null || requestParameters.id === undefined) {
418
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
419
+ }
420
+ const queryParameters = {};
421
+ if (requestParameters.appSlug !== undefined) {
422
+ queryParameters['app_slug'] = requestParameters.appSlug;
423
+ }
424
+ const headerParameters = {};
425
+ if (this.configuration && this.configuration.accessToken) {
426
+ const token = this.configuration.accessToken;
427
+ const tokenString = yield token("authentik", []);
428
+ if (tokenString) {
429
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
430
+ }
431
+ }
432
+ const response = yield this.request({
433
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
434
+ method: 'GET',
435
+ headers: headerParameters,
436
+ query: queryParameters,
437
+ }, initOverrides);
438
+ return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
439
+ });
440
+ }
441
+ /**
442
+ * Check access to a single application by slug
443
+ */
444
+ outpostsLdapAccessCheck(requestParameters, initOverrides) {
445
+ return __awaiter(this, void 0, void 0, function* () {
446
+ const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
447
+ return yield response.value();
448
+ });
449
+ }
412
450
  /**
413
451
  * LDAPProvider Viewset
414
452
  */
@@ -506,10 +544,10 @@ export class OutpostsApi extends runtime.BaseAPI {
506
544
  /**
507
545
  * Check access to a single application by slug
508
546
  */
509
- outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides) {
547
+ outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
510
548
  return __awaiter(this, void 0, void 0, function* () {
511
549
  if (requestParameters.id === null || requestParameters.id === undefined) {
512
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
550
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
513
551
  }
514
552
  const queryParameters = {};
515
553
  if (requestParameters.appSlug !== undefined) {
@@ -535,9 +573,9 @@ export class OutpostsApi extends runtime.BaseAPI {
535
573
  /**
536
574
  * Check access to a single application by slug
537
575
  */
538
- outpostsRadiusCheckAccessRetrieve(requestParameters, initOverrides) {
576
+ outpostsRadiusAccessCheck(requestParameters, initOverrides) {
539
577
  return __awaiter(this, void 0, void 0, function* () {
540
- const response = yield this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
578
+ const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
541
579
  return yield response.value();
542
580
  });
543
581
  }
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
121
121
  page?: number;
122
122
  pageSize?: number;
123
123
  search?: string;
124
- searchGroupGroupUuidIexact?: string;
125
- searchGroupNameIexact?: string;
126
124
  tlsServerNameIexact?: string;
127
125
  uidStartNumberIexact?: number;
128
126
  }
@@ -382,6 +380,7 @@ export interface ProvidersSamlListRequest {
382
380
  backchannelApplication?: string;
383
381
  defaultRelayState?: string;
384
382
  digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
383
+ encryptionKp?: string;
385
384
  isBackchannel?: boolean;
386
385
  issuer?: string;
387
386
  name?: string;
@@ -392,6 +391,8 @@ export interface ProvidersSamlListRequest {
392
391
  propertyMappings?: Array<string>;
393
392
  search?: string;
394
393
  sessionValidNotOnOrAfter?: string;
394
+ signAssertion?: boolean;
395
+ signResponse?: boolean;
395
396
  signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
396
397
  signingKp?: string;
397
398
  spBinding?: ProvidersSamlListSpBindingEnum;
@@ -1019,12 +1019,6 @@ export class ProvidersApi extends runtime.BaseAPI {
1019
1019
  if (requestParameters.search !== undefined) {
1020
1020
  queryParameters['search'] = requestParameters.search;
1021
1021
  }
1022
- if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
1023
- queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
1024
- }
1025
- if (requestParameters.searchGroupNameIexact !== undefined) {
1026
- queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
1027
- }
1028
1022
  if (requestParameters.tlsServerNameIexact !== undefined) {
1029
1023
  queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
1030
1024
  }
@@ -3296,6 +3290,9 @@ export class ProvidersApi extends runtime.BaseAPI {
3296
3290
  if (requestParameters.digestAlgorithm !== undefined) {
3297
3291
  queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
3298
3292
  }
3293
+ if (requestParameters.encryptionKp !== undefined) {
3294
+ queryParameters['encryption_kp'] = requestParameters.encryptionKp;
3295
+ }
3299
3296
  if (requestParameters.isBackchannel !== undefined) {
3300
3297
  queryParameters['is_backchannel'] = requestParameters.isBackchannel;
3301
3298
  }
@@ -3326,6 +3323,12 @@ export class ProvidersApi extends runtime.BaseAPI {
3326
3323
  if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
3327
3324
  queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
3328
3325
  }
3326
+ if (requestParameters.signAssertion !== undefined) {
3327
+ queryParameters['sign_assertion'] = requestParameters.signAssertion;
3328
+ }
3329
+ if (requestParameters.signResponse !== undefined) {
3330
+ queryParameters['sign_response'] = requestParameters.signResponse;
3331
+ }
3329
3332
  if (requestParameters.signatureAlgorithm !== undefined) {
3330
3333
  queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
3331
3334
  }
@@ -0,0 +1,38 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.6.3
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { PolicyTestResult } from './PolicyTestResult';
13
+ /**
14
+ * Base serializer class which doesn't implement create/update methods
15
+ * @export
16
+ * @interface LDAPCheckAccess
17
+ */
18
+ export interface LDAPCheckAccess {
19
+ /**
20
+ *
21
+ * @type {boolean}
22
+ * @memberof LDAPCheckAccess
23
+ */
24
+ hasSearchPermission?: boolean;
25
+ /**
26
+ *
27
+ * @type {PolicyTestResult}
28
+ * @memberof LDAPCheckAccess
29
+ */
30
+ access: PolicyTestResult;
31
+ }
32
+ /**
33
+ * Check if a given object implements the LDAPCheckAccess interface.
34
+ */
35
+ export declare function instanceOfLDAPCheckAccess(value: object): boolean;
36
+ export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
37
+ export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
38
+ export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
@@ -0,0 +1,47 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.6.3
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ import { exists } from '../runtime';
15
+ import { PolicyTestResultFromJSON, PolicyTestResultToJSON, } from './PolicyTestResult';
16
+ /**
17
+ * Check if a given object implements the LDAPCheckAccess interface.
18
+ */
19
+ export function instanceOfLDAPCheckAccess(value) {
20
+ let isInstance = true;
21
+ isInstance = isInstance && "access" in value;
22
+ return isInstance;
23
+ }
24
+ export function LDAPCheckAccessFromJSON(json) {
25
+ return LDAPCheckAccessFromJSONTyped(json, false);
26
+ }
27
+ export function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
28
+ if ((json === undefined) || (json === null)) {
29
+ return json;
30
+ }
31
+ return {
32
+ 'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
33
+ 'access': PolicyTestResultFromJSON(json['access']),
34
+ };
35
+ }
36
+ export function LDAPCheckAccessToJSON(value) {
37
+ if (value === undefined) {
38
+ return undefined;
39
+ }
40
+ if (value === null) {
41
+ return null;
42
+ }
43
+ return {
44
+ 'has_search_permission': value.hasSearchPermission,
45
+ 'access': PolicyTestResultToJSON(value.access),
46
+ };
47
+ }
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
46
46
  * @memberof LDAPOutpostConfig
47
47
  */
48
48
  readonly applicationSlug: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPOutpostConfig
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -37,7 +37,6 @@ export function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
37
37
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
38
38
  'bindFlowSlug': json['bind_flow_slug'],
39
39
  'applicationSlug': json['application_slug'],
40
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
41
40
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
42
41
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
43
42
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -58,7 +57,6 @@ export function LDAPOutpostConfigToJSON(value) {
58
57
  'name': value.name,
59
58
  'base_dn': value.baseDn,
60
59
  'bind_flow_slug': value.bindFlowSlug,
61
- 'search_group': value.searchGroup,
62
60
  'certificate': value.certificate,
63
61
  'tls_server_name': value.tlsServerName,
64
62
  'uid_start_number': value.uidStartNumber,
@@ -100,12 +100,6 @@ export interface LDAPProvider {
100
100
  * @memberof LDAPProvider
101
101
  */
102
102
  baseDn?: string;
103
- /**
104
- * Users in this group can do search queries. If not set, every user can execute search queries.
105
- * @type {string}
106
- * @memberof LDAPProvider
107
- */
108
- searchGroup?: string | null;
109
103
  /**
110
104
  *
111
105
  * @type {string}
@@ -54,7 +54,6 @@ export function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
54
54
  'verboseNamePlural': json['verbose_name_plural'],
55
55
  'metaModelName': json['meta_model_name'],
56
56
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
57
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
58
57
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
59
58
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
60
59
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -78,7 +77,6 @@ export function LDAPProviderToJSON(value) {
78
77
  'authorization_flow': value.authorizationFlow,
79
78
  'property_mappings': value.propertyMappings,
80
79
  'base_dn': value.baseDn,
81
- 'search_group': value.searchGroup,
82
80
  'certificate': value.certificate,
83
81
  'tls_server_name': value.tlsServerName,
84
82
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
46
46
  * @memberof LDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -35,7 +35,6 @@ export function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
35
35
  'authorizationFlow': json['authorization_flow'],
36
36
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
37
37
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
38
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
39
38
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
40
39
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
41
40
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -58,7 +57,6 @@ export function LDAPProviderRequestToJSON(value) {
58
57
  'authorization_flow': value.authorizationFlow,
59
58
  'property_mappings': value.propertyMappings,
60
59
  'base_dn': value.baseDn,
61
- 'search_group': value.searchGroup,
62
60
  'certificate': value.certificate,
63
61
  'tls_server_name': value.tlsServerName,
64
62
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
46
46
  * @memberof PatchedLDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof PatchedLDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -33,7 +33,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminato
33
33
  'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
34
34
  'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
35
35
  'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
36
- 'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
37
36
  'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
38
37
  'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
39
38
  'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -56,7 +55,6 @@ export function PatchedLDAPProviderRequestToJSON(value) {
56
55
  'authorization_flow': value.authorizationFlow,
57
56
  'property_mappings': value.propertyMappings,
58
57
  'base_dn': value.baseDn,
59
- 'search_group': value.searchGroup,
60
58
  'certificate': value.certificate,
61
59
  'tls_server_name': value.tlsServerName,
62
60
  'uid_start_number': value.uidStartNumber,
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
108
108
  * @memberof PatchedSAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof PatchedSAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof PatchedSAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof PatchedSAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}