@goauthentik/api 2024.6.3-1723497462 → 2024.6.3-1723921843
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +1 -0
- package/dist/apis/OutpostsApi.d.ts +16 -4
- package/dist/apis/OutpostsApi.js +42 -4
- package/dist/apis/ProvidersApi.d.ts +3 -2
- package/dist/apis/ProvidersApi.js +9 -6
- package/dist/esm/apis/OutpostsApi.d.ts +16 -4
- package/dist/esm/apis/OutpostsApi.js +43 -5
- package/dist/esm/apis/ProvidersApi.d.ts +3 -2
- package/dist/esm/apis/ProvidersApi.js +9 -6
- package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
- package/dist/esm/models/LDAPCheckAccess.js +47 -0
- package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
- package/dist/esm/models/LDAPOutpostConfig.js +0 -2
- package/dist/esm/models/LDAPProvider.d.ts +0 -6
- package/dist/esm/models/LDAPProvider.js +0 -2
- package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
- package/dist/esm/models/LDAPProviderRequest.js +0 -2
- package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
- package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
- package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +18 -0
- package/dist/esm/models/PatchedSAMLProviderRequest.js +6 -0
- package/dist/esm/models/SAMLProvider.d.ts +18 -0
- package/dist/esm/models/SAMLProvider.js +6 -0
- package/dist/esm/models/SAMLProviderRequest.d.ts +18 -0
- package/dist/esm/models/SAMLProviderRequest.js +6 -0
- package/dist/esm/models/index.d.ts +1 -0
- package/dist/esm/models/index.js +1 -0
- package/dist/models/LDAPCheckAccess.d.ts +38 -0
- package/dist/models/LDAPCheckAccess.js +54 -0
- package/dist/models/LDAPOutpostConfig.d.ts +0 -6
- package/dist/models/LDAPOutpostConfig.js +0 -2
- package/dist/models/LDAPProvider.d.ts +0 -6
- package/dist/models/LDAPProvider.js +0 -2
- package/dist/models/LDAPProviderRequest.d.ts +0 -6
- package/dist/models/LDAPProviderRequest.js +0 -2
- package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
- package/dist/models/PatchedLDAPProviderRequest.js +0 -2
- package/dist/models/PatchedSAMLProviderRequest.d.ts +18 -0
- package/dist/models/PatchedSAMLProviderRequest.js +6 -0
- package/dist/models/SAMLProvider.d.ts +18 -0
- package/dist/models/SAMLProvider.js +6 -0
- package/dist/models/SAMLProviderRequest.d.ts +18 -0
- package/dist/models/SAMLProviderRequest.js +6 -0
- package/dist/models/index.d.ts +1 -0
- package/dist/models/index.js +1 -0
- package/package.json +1 -1
- package/src/apis/OutpostsApi.ts +55 -5
- package/src/apis/ProvidersApi.ts +15 -10
- package/src/models/LDAPCheckAccess.ts +81 -0
- package/src/models/LDAPOutpostConfig.ts +0 -8
- package/src/models/LDAPProvider.ts +0 -8
- package/src/models/LDAPProviderRequest.ts +0 -8
- package/src/models/PatchedLDAPProviderRequest.ts +0 -8
- package/src/models/PatchedSAMLProviderRequest.ts +24 -0
- package/src/models/SAMLProvider.ts +24 -0
- package/src/models/SAMLProviderRequest.ts +24 -0
- package/src/models/index.ts +1 -0
package/.openapi-generator/FILES
CHANGED
|
@@ -204,6 +204,7 @@ src/models/IssuerModeEnum.ts
|
|
|
204
204
|
src/models/KubernetesServiceConnection.ts
|
|
205
205
|
src/models/KubernetesServiceConnectionRequest.ts
|
|
206
206
|
src/models/LDAPAPIAccessMode.ts
|
|
207
|
+
src/models/LDAPCheckAccess.ts
|
|
207
208
|
src/models/LDAPDebug.ts
|
|
208
209
|
src/models/LDAPOutpostConfig.ts
|
|
209
210
|
src/models/LDAPProvider.ts
|
|
@@ -10,7 +10,7 @@
|
|
|
10
10
|
* Do not edit the class manually.
|
|
11
11
|
*/
|
|
12
12
|
import * as runtime from '../runtime';
|
|
13
|
-
import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
|
|
13
|
+
import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
|
|
14
14
|
export interface OutpostsInstancesCreateRequest {
|
|
15
15
|
outpostRequest: OutpostRequest;
|
|
16
16
|
}
|
|
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
|
|
|
58
58
|
export interface OutpostsInstancesUsedByListRequest {
|
|
59
59
|
uuid: string;
|
|
60
60
|
}
|
|
61
|
+
export interface OutpostsLdapAccessCheckRequest {
|
|
62
|
+
id: number;
|
|
63
|
+
appSlug?: string;
|
|
64
|
+
}
|
|
61
65
|
export interface OutpostsLdapListRequest {
|
|
62
66
|
name?: string;
|
|
63
67
|
ordering?: string;
|
|
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
|
|
|
72
76
|
pageSize?: number;
|
|
73
77
|
search?: string;
|
|
74
78
|
}
|
|
75
|
-
export interface
|
|
79
|
+
export interface OutpostsRadiusAccessCheckRequest {
|
|
76
80
|
id: number;
|
|
77
81
|
appSlug?: string;
|
|
78
82
|
}
|
|
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
|
|
|
237
241
|
* Get a list of all objects that use this object
|
|
238
242
|
*/
|
|
239
243
|
outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
|
|
244
|
+
/**
|
|
245
|
+
* Check access to a single application by slug
|
|
246
|
+
*/
|
|
247
|
+
outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
|
|
248
|
+
/**
|
|
249
|
+
* Check access to a single application by slug
|
|
250
|
+
*/
|
|
251
|
+
outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
|
|
240
252
|
/**
|
|
241
253
|
* LDAPProvider Viewset
|
|
242
254
|
*/
|
|
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
|
|
|
256
268
|
/**
|
|
257
269
|
* Check access to a single application by slug
|
|
258
270
|
*/
|
|
259
|
-
|
|
271
|
+
outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
|
|
260
272
|
/**
|
|
261
273
|
* Check access to a single application by slug
|
|
262
274
|
*/
|
|
263
|
-
|
|
275
|
+
outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
|
|
264
276
|
/**
|
|
265
277
|
* RadiusProvider Viewset
|
|
266
278
|
*/
|
package/dist/apis/OutpostsApi.js
CHANGED
|
@@ -412,6 +412,44 @@ class OutpostsApi extends runtime.BaseAPI {
|
|
|
412
412
|
return yield response.value();
|
|
413
413
|
});
|
|
414
414
|
}
|
|
415
|
+
/**
|
|
416
|
+
* Check access to a single application by slug
|
|
417
|
+
*/
|
|
418
|
+
outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
|
|
419
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
420
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
421
|
+
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
|
|
422
|
+
}
|
|
423
|
+
const queryParameters = {};
|
|
424
|
+
if (requestParameters.appSlug !== undefined) {
|
|
425
|
+
queryParameters['app_slug'] = requestParameters.appSlug;
|
|
426
|
+
}
|
|
427
|
+
const headerParameters = {};
|
|
428
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
429
|
+
const token = this.configuration.accessToken;
|
|
430
|
+
const tokenString = yield token("authentik", []);
|
|
431
|
+
if (tokenString) {
|
|
432
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
433
|
+
}
|
|
434
|
+
}
|
|
435
|
+
const response = yield this.request({
|
|
436
|
+
path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
437
|
+
method: 'GET',
|
|
438
|
+
headers: headerParameters,
|
|
439
|
+
query: queryParameters,
|
|
440
|
+
}, initOverrides);
|
|
441
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.LDAPCheckAccessFromJSON)(jsonValue));
|
|
442
|
+
});
|
|
443
|
+
}
|
|
444
|
+
/**
|
|
445
|
+
* Check access to a single application by slug
|
|
446
|
+
*/
|
|
447
|
+
outpostsLdapAccessCheck(requestParameters, initOverrides) {
|
|
448
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
449
|
+
const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
|
|
450
|
+
return yield response.value();
|
|
451
|
+
});
|
|
452
|
+
}
|
|
415
453
|
/**
|
|
416
454
|
* LDAPProvider Viewset
|
|
417
455
|
*/
|
|
@@ -509,10 +547,10 @@ class OutpostsApi extends runtime.BaseAPI {
|
|
|
509
547
|
/**
|
|
510
548
|
* Check access to a single application by slug
|
|
511
549
|
*/
|
|
512
|
-
|
|
550
|
+
outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
|
|
513
551
|
return __awaiter(this, void 0, void 0, function* () {
|
|
514
552
|
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
515
|
-
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling
|
|
553
|
+
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
|
|
516
554
|
}
|
|
517
555
|
const queryParameters = {};
|
|
518
556
|
if (requestParameters.appSlug !== undefined) {
|
|
@@ -538,9 +576,9 @@ class OutpostsApi extends runtime.BaseAPI {
|
|
|
538
576
|
/**
|
|
539
577
|
* Check access to a single application by slug
|
|
540
578
|
*/
|
|
541
|
-
|
|
579
|
+
outpostsRadiusAccessCheck(requestParameters, initOverrides) {
|
|
542
580
|
return __awaiter(this, void 0, void 0, function* () {
|
|
543
|
-
const response = yield this.
|
|
581
|
+
const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
|
|
544
582
|
return yield response.value();
|
|
545
583
|
});
|
|
546
584
|
}
|
|
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
|
|
|
121
121
|
page?: number;
|
|
122
122
|
pageSize?: number;
|
|
123
123
|
search?: string;
|
|
124
|
-
searchGroupGroupUuidIexact?: string;
|
|
125
|
-
searchGroupNameIexact?: string;
|
|
126
124
|
tlsServerNameIexact?: string;
|
|
127
125
|
uidStartNumberIexact?: number;
|
|
128
126
|
}
|
|
@@ -382,6 +380,7 @@ export interface ProvidersSamlListRequest {
|
|
|
382
380
|
backchannelApplication?: string;
|
|
383
381
|
defaultRelayState?: string;
|
|
384
382
|
digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
|
|
383
|
+
encryptionKp?: string;
|
|
385
384
|
isBackchannel?: boolean;
|
|
386
385
|
issuer?: string;
|
|
387
386
|
name?: string;
|
|
@@ -392,6 +391,8 @@ export interface ProvidersSamlListRequest {
|
|
|
392
391
|
propertyMappings?: Array<string>;
|
|
393
392
|
search?: string;
|
|
394
393
|
sessionValidNotOnOrAfter?: string;
|
|
394
|
+
signAssertion?: boolean;
|
|
395
|
+
signResponse?: boolean;
|
|
395
396
|
signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
|
|
396
397
|
signingKp?: string;
|
|
397
398
|
spBinding?: ProvidersSamlListSpBindingEnum;
|
|
@@ -1022,12 +1022,6 @@ class ProvidersApi extends runtime.BaseAPI {
|
|
|
1022
1022
|
if (requestParameters.search !== undefined) {
|
|
1023
1023
|
queryParameters['search'] = requestParameters.search;
|
|
1024
1024
|
}
|
|
1025
|
-
if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
|
|
1026
|
-
queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
|
|
1027
|
-
}
|
|
1028
|
-
if (requestParameters.searchGroupNameIexact !== undefined) {
|
|
1029
|
-
queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
|
|
1030
|
-
}
|
|
1031
1025
|
if (requestParameters.tlsServerNameIexact !== undefined) {
|
|
1032
1026
|
queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
|
|
1033
1027
|
}
|
|
@@ -3299,6 +3293,9 @@ class ProvidersApi extends runtime.BaseAPI {
|
|
|
3299
3293
|
if (requestParameters.digestAlgorithm !== undefined) {
|
|
3300
3294
|
queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
|
|
3301
3295
|
}
|
|
3296
|
+
if (requestParameters.encryptionKp !== undefined) {
|
|
3297
|
+
queryParameters['encryption_kp'] = requestParameters.encryptionKp;
|
|
3298
|
+
}
|
|
3302
3299
|
if (requestParameters.isBackchannel !== undefined) {
|
|
3303
3300
|
queryParameters['is_backchannel'] = requestParameters.isBackchannel;
|
|
3304
3301
|
}
|
|
@@ -3329,6 +3326,12 @@ class ProvidersApi extends runtime.BaseAPI {
|
|
|
3329
3326
|
if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
|
|
3330
3327
|
queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
|
|
3331
3328
|
}
|
|
3329
|
+
if (requestParameters.signAssertion !== undefined) {
|
|
3330
|
+
queryParameters['sign_assertion'] = requestParameters.signAssertion;
|
|
3331
|
+
}
|
|
3332
|
+
if (requestParameters.signResponse !== undefined) {
|
|
3333
|
+
queryParameters['sign_response'] = requestParameters.signResponse;
|
|
3334
|
+
}
|
|
3332
3335
|
if (requestParameters.signatureAlgorithm !== undefined) {
|
|
3333
3336
|
queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
|
|
3334
3337
|
}
|
|
@@ -10,7 +10,7 @@
|
|
|
10
10
|
* Do not edit the class manually.
|
|
11
11
|
*/
|
|
12
12
|
import * as runtime from '../runtime';
|
|
13
|
-
import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
|
|
13
|
+
import type { DockerServiceConnection, DockerServiceConnectionRequest, KubernetesServiceConnection, KubernetesServiceConnectionRequest, LDAPCheckAccess, Outpost, OutpostDefaultConfig, OutpostHealth, OutpostRequest, PaginatedDockerServiceConnectionList, PaginatedKubernetesServiceConnectionList, PaginatedLDAPOutpostConfigList, PaginatedOutpostList, PaginatedProxyOutpostConfigList, PaginatedRadiusOutpostConfigList, PaginatedServiceConnectionList, PatchedDockerServiceConnectionRequest, PatchedKubernetesServiceConnectionRequest, PatchedOutpostRequest, RadiusCheckAccess, ServiceConnection, ServiceConnectionState, TypeCreate, UsedBy } from '../models';
|
|
14
14
|
export interface OutpostsInstancesCreateRequest {
|
|
15
15
|
outpostRequest: OutpostRequest;
|
|
16
16
|
}
|
|
@@ -58,6 +58,10 @@ export interface OutpostsInstancesUpdateRequest {
|
|
|
58
58
|
export interface OutpostsInstancesUsedByListRequest {
|
|
59
59
|
uuid: string;
|
|
60
60
|
}
|
|
61
|
+
export interface OutpostsLdapAccessCheckRequest {
|
|
62
|
+
id: number;
|
|
63
|
+
appSlug?: string;
|
|
64
|
+
}
|
|
61
65
|
export interface OutpostsLdapListRequest {
|
|
62
66
|
name?: string;
|
|
63
67
|
ordering?: string;
|
|
@@ -72,7 +76,7 @@ export interface OutpostsProxyListRequest {
|
|
|
72
76
|
pageSize?: number;
|
|
73
77
|
search?: string;
|
|
74
78
|
}
|
|
75
|
-
export interface
|
|
79
|
+
export interface OutpostsRadiusAccessCheckRequest {
|
|
76
80
|
id: number;
|
|
77
81
|
appSlug?: string;
|
|
78
82
|
}
|
|
@@ -237,6 +241,14 @@ export declare class OutpostsApi extends runtime.BaseAPI {
|
|
|
237
241
|
* Get a list of all objects that use this object
|
|
238
242
|
*/
|
|
239
243
|
outpostsInstancesUsedByList(requestParameters: OutpostsInstancesUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>>;
|
|
244
|
+
/**
|
|
245
|
+
* Check access to a single application by slug
|
|
246
|
+
*/
|
|
247
|
+
outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>>;
|
|
248
|
+
/**
|
|
249
|
+
* Check access to a single application by slug
|
|
250
|
+
*/
|
|
251
|
+
outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess>;
|
|
240
252
|
/**
|
|
241
253
|
* LDAPProvider Viewset
|
|
242
254
|
*/
|
|
@@ -256,11 +268,11 @@ export declare class OutpostsApi extends runtime.BaseAPI {
|
|
|
256
268
|
/**
|
|
257
269
|
* Check access to a single application by slug
|
|
258
270
|
*/
|
|
259
|
-
|
|
271
|
+
outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>>;
|
|
260
272
|
/**
|
|
261
273
|
* Check access to a single application by slug
|
|
262
274
|
*/
|
|
263
|
-
|
|
275
|
+
outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess>;
|
|
264
276
|
/**
|
|
265
277
|
* RadiusProvider Viewset
|
|
266
278
|
*/
|
|
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|
|
21
21
|
});
|
|
22
22
|
};
|
|
23
23
|
import * as runtime from '../runtime';
|
|
24
|
-
import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
|
|
24
|
+
import { DockerServiceConnectionFromJSON, DockerServiceConnectionRequestToJSON, KubernetesServiceConnectionFromJSON, KubernetesServiceConnectionRequestToJSON, LDAPCheckAccessFromJSON, OutpostFromJSON, OutpostDefaultConfigFromJSON, OutpostHealthFromJSON, OutpostRequestToJSON, PaginatedDockerServiceConnectionListFromJSON, PaginatedKubernetesServiceConnectionListFromJSON, PaginatedLDAPOutpostConfigListFromJSON, PaginatedOutpostListFromJSON, PaginatedProxyOutpostConfigListFromJSON, PaginatedRadiusOutpostConfigListFromJSON, PaginatedServiceConnectionListFromJSON, PatchedDockerServiceConnectionRequestToJSON, PatchedKubernetesServiceConnectionRequestToJSON, PatchedOutpostRequestToJSON, RadiusCheckAccessFromJSON, ServiceConnectionFromJSON, ServiceConnectionStateFromJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models';
|
|
25
25
|
/**
|
|
26
26
|
*
|
|
27
27
|
*/
|
|
@@ -409,6 +409,44 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
409
409
|
return yield response.value();
|
|
410
410
|
});
|
|
411
411
|
}
|
|
412
|
+
/**
|
|
413
|
+
* Check access to a single application by slug
|
|
414
|
+
*/
|
|
415
|
+
outpostsLdapAccessCheckRaw(requestParameters, initOverrides) {
|
|
416
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
417
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
418
|
+
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
|
|
419
|
+
}
|
|
420
|
+
const queryParameters = {};
|
|
421
|
+
if (requestParameters.appSlug !== undefined) {
|
|
422
|
+
queryParameters['app_slug'] = requestParameters.appSlug;
|
|
423
|
+
}
|
|
424
|
+
const headerParameters = {};
|
|
425
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
426
|
+
const token = this.configuration.accessToken;
|
|
427
|
+
const tokenString = yield token("authentik", []);
|
|
428
|
+
if (tokenString) {
|
|
429
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
430
|
+
}
|
|
431
|
+
}
|
|
432
|
+
const response = yield this.request({
|
|
433
|
+
path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
434
|
+
method: 'GET',
|
|
435
|
+
headers: headerParameters,
|
|
436
|
+
query: queryParameters,
|
|
437
|
+
}, initOverrides);
|
|
438
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
|
|
439
|
+
});
|
|
440
|
+
}
|
|
441
|
+
/**
|
|
442
|
+
* Check access to a single application by slug
|
|
443
|
+
*/
|
|
444
|
+
outpostsLdapAccessCheck(requestParameters, initOverrides) {
|
|
445
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
446
|
+
const response = yield this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
|
|
447
|
+
return yield response.value();
|
|
448
|
+
});
|
|
449
|
+
}
|
|
412
450
|
/**
|
|
413
451
|
* LDAPProvider Viewset
|
|
414
452
|
*/
|
|
@@ -506,10 +544,10 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
506
544
|
/**
|
|
507
545
|
* Check access to a single application by slug
|
|
508
546
|
*/
|
|
509
|
-
|
|
547
|
+
outpostsRadiusAccessCheckRaw(requestParameters, initOverrides) {
|
|
510
548
|
return __awaiter(this, void 0, void 0, function* () {
|
|
511
549
|
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
512
|
-
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling
|
|
550
|
+
throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
|
|
513
551
|
}
|
|
514
552
|
const queryParameters = {};
|
|
515
553
|
if (requestParameters.appSlug !== undefined) {
|
|
@@ -535,9 +573,9 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
535
573
|
/**
|
|
536
574
|
* Check access to a single application by slug
|
|
537
575
|
*/
|
|
538
|
-
|
|
576
|
+
outpostsRadiusAccessCheck(requestParameters, initOverrides) {
|
|
539
577
|
return __awaiter(this, void 0, void 0, function* () {
|
|
540
|
-
const response = yield this.
|
|
578
|
+
const response = yield this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
|
|
541
579
|
return yield response.value();
|
|
542
580
|
});
|
|
543
581
|
}
|
|
@@ -121,8 +121,6 @@ export interface ProvidersLdapListRequest {
|
|
|
121
121
|
page?: number;
|
|
122
122
|
pageSize?: number;
|
|
123
123
|
search?: string;
|
|
124
|
-
searchGroupGroupUuidIexact?: string;
|
|
125
|
-
searchGroupNameIexact?: string;
|
|
126
124
|
tlsServerNameIexact?: string;
|
|
127
125
|
uidStartNumberIexact?: number;
|
|
128
126
|
}
|
|
@@ -382,6 +380,7 @@ export interface ProvidersSamlListRequest {
|
|
|
382
380
|
backchannelApplication?: string;
|
|
383
381
|
defaultRelayState?: string;
|
|
384
382
|
digestAlgorithm?: ProvidersSamlListDigestAlgorithmEnum;
|
|
383
|
+
encryptionKp?: string;
|
|
385
384
|
isBackchannel?: boolean;
|
|
386
385
|
issuer?: string;
|
|
387
386
|
name?: string;
|
|
@@ -392,6 +391,8 @@ export interface ProvidersSamlListRequest {
|
|
|
392
391
|
propertyMappings?: Array<string>;
|
|
393
392
|
search?: string;
|
|
394
393
|
sessionValidNotOnOrAfter?: string;
|
|
394
|
+
signAssertion?: boolean;
|
|
395
|
+
signResponse?: boolean;
|
|
395
396
|
signatureAlgorithm?: ProvidersSamlListSignatureAlgorithmEnum;
|
|
396
397
|
signingKp?: string;
|
|
397
398
|
spBinding?: ProvidersSamlListSpBindingEnum;
|
|
@@ -1019,12 +1019,6 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
1019
1019
|
if (requestParameters.search !== undefined) {
|
|
1020
1020
|
queryParameters['search'] = requestParameters.search;
|
|
1021
1021
|
}
|
|
1022
|
-
if (requestParameters.searchGroupGroupUuidIexact !== undefined) {
|
|
1023
|
-
queryParameters['search_group__group_uuid__iexact'] = requestParameters.searchGroupGroupUuidIexact;
|
|
1024
|
-
}
|
|
1025
|
-
if (requestParameters.searchGroupNameIexact !== undefined) {
|
|
1026
|
-
queryParameters['search_group__name__iexact'] = requestParameters.searchGroupNameIexact;
|
|
1027
|
-
}
|
|
1028
1022
|
if (requestParameters.tlsServerNameIexact !== undefined) {
|
|
1029
1023
|
queryParameters['tls_server_name__iexact'] = requestParameters.tlsServerNameIexact;
|
|
1030
1024
|
}
|
|
@@ -3296,6 +3290,9 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
3296
3290
|
if (requestParameters.digestAlgorithm !== undefined) {
|
|
3297
3291
|
queryParameters['digest_algorithm'] = requestParameters.digestAlgorithm;
|
|
3298
3292
|
}
|
|
3293
|
+
if (requestParameters.encryptionKp !== undefined) {
|
|
3294
|
+
queryParameters['encryption_kp'] = requestParameters.encryptionKp;
|
|
3295
|
+
}
|
|
3299
3296
|
if (requestParameters.isBackchannel !== undefined) {
|
|
3300
3297
|
queryParameters['is_backchannel'] = requestParameters.isBackchannel;
|
|
3301
3298
|
}
|
|
@@ -3326,6 +3323,12 @@ export class ProvidersApi extends runtime.BaseAPI {
|
|
|
3326
3323
|
if (requestParameters.sessionValidNotOnOrAfter !== undefined) {
|
|
3327
3324
|
queryParameters['session_valid_not_on_or_after'] = requestParameters.sessionValidNotOnOrAfter;
|
|
3328
3325
|
}
|
|
3326
|
+
if (requestParameters.signAssertion !== undefined) {
|
|
3327
|
+
queryParameters['sign_assertion'] = requestParameters.signAssertion;
|
|
3328
|
+
}
|
|
3329
|
+
if (requestParameters.signResponse !== undefined) {
|
|
3330
|
+
queryParameters['sign_response'] = requestParameters.signResponse;
|
|
3331
|
+
}
|
|
3329
3332
|
if (requestParameters.signatureAlgorithm !== undefined) {
|
|
3330
3333
|
queryParameters['signature_algorithm'] = requestParameters.signatureAlgorithm;
|
|
3331
3334
|
}
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2024.6.3
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import type { PolicyTestResult } from './PolicyTestResult';
|
|
13
|
+
/**
|
|
14
|
+
* Base serializer class which doesn't implement create/update methods
|
|
15
|
+
* @export
|
|
16
|
+
* @interface LDAPCheckAccess
|
|
17
|
+
*/
|
|
18
|
+
export interface LDAPCheckAccess {
|
|
19
|
+
/**
|
|
20
|
+
*
|
|
21
|
+
* @type {boolean}
|
|
22
|
+
* @memberof LDAPCheckAccess
|
|
23
|
+
*/
|
|
24
|
+
hasSearchPermission?: boolean;
|
|
25
|
+
/**
|
|
26
|
+
*
|
|
27
|
+
* @type {PolicyTestResult}
|
|
28
|
+
* @memberof LDAPCheckAccess
|
|
29
|
+
*/
|
|
30
|
+
access: PolicyTestResult;
|
|
31
|
+
}
|
|
32
|
+
/**
|
|
33
|
+
* Check if a given object implements the LDAPCheckAccess interface.
|
|
34
|
+
*/
|
|
35
|
+
export declare function instanceOfLDAPCheckAccess(value: object): boolean;
|
|
36
|
+
export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
|
|
37
|
+
export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
|
|
38
|
+
export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* authentik
|
|
5
|
+
* Making authentication simple.
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 2024.6.3
|
|
8
|
+
* Contact: hello@goauthentik.io
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
import { exists } from '../runtime';
|
|
15
|
+
import { PolicyTestResultFromJSON, PolicyTestResultToJSON, } from './PolicyTestResult';
|
|
16
|
+
/**
|
|
17
|
+
* Check if a given object implements the LDAPCheckAccess interface.
|
|
18
|
+
*/
|
|
19
|
+
export function instanceOfLDAPCheckAccess(value) {
|
|
20
|
+
let isInstance = true;
|
|
21
|
+
isInstance = isInstance && "access" in value;
|
|
22
|
+
return isInstance;
|
|
23
|
+
}
|
|
24
|
+
export function LDAPCheckAccessFromJSON(json) {
|
|
25
|
+
return LDAPCheckAccessFromJSONTyped(json, false);
|
|
26
|
+
}
|
|
27
|
+
export function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
|
|
28
|
+
if ((json === undefined) || (json === null)) {
|
|
29
|
+
return json;
|
|
30
|
+
}
|
|
31
|
+
return {
|
|
32
|
+
'hasSearchPermission': !exists(json, 'has_search_permission') ? undefined : json['has_search_permission'],
|
|
33
|
+
'access': PolicyTestResultFromJSON(json['access']),
|
|
34
|
+
};
|
|
35
|
+
}
|
|
36
|
+
export function LDAPCheckAccessToJSON(value) {
|
|
37
|
+
if (value === undefined) {
|
|
38
|
+
return undefined;
|
|
39
|
+
}
|
|
40
|
+
if (value === null) {
|
|
41
|
+
return null;
|
|
42
|
+
}
|
|
43
|
+
return {
|
|
44
|
+
'has_search_permission': value.hasSearchPermission,
|
|
45
|
+
'access': PolicyTestResultToJSON(value.access),
|
|
46
|
+
};
|
|
47
|
+
}
|
|
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
|
|
|
46
46
|
* @memberof LDAPOutpostConfig
|
|
47
47
|
*/
|
|
48
48
|
readonly applicationSlug: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof LDAPOutpostConfig
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -37,7 +37,6 @@ export function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
37
37
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
38
38
|
'bindFlowSlug': json['bind_flow_slug'],
|
|
39
39
|
'applicationSlug': json['application_slug'],
|
|
40
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
41
40
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
42
41
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
43
42
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -58,7 +57,6 @@ export function LDAPOutpostConfigToJSON(value) {
|
|
|
58
57
|
'name': value.name,
|
|
59
58
|
'base_dn': value.baseDn,
|
|
60
59
|
'bind_flow_slug': value.bindFlowSlug,
|
|
61
|
-
'search_group': value.searchGroup,
|
|
62
60
|
'certificate': value.certificate,
|
|
63
61
|
'tls_server_name': value.tlsServerName,
|
|
64
62
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -100,12 +100,6 @@ export interface LDAPProvider {
|
|
|
100
100
|
* @memberof LDAPProvider
|
|
101
101
|
*/
|
|
102
102
|
baseDn?: string;
|
|
103
|
-
/**
|
|
104
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
105
|
-
* @type {string}
|
|
106
|
-
* @memberof LDAPProvider
|
|
107
|
-
*/
|
|
108
|
-
searchGroup?: string | null;
|
|
109
103
|
/**
|
|
110
104
|
*
|
|
111
105
|
* @type {string}
|
|
@@ -54,7 +54,6 @@ export function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
54
54
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
55
55
|
'metaModelName': json['meta_model_name'],
|
|
56
56
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
57
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
58
57
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
59
58
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
60
59
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -78,7 +77,6 @@ export function LDAPProviderToJSON(value) {
|
|
|
78
77
|
'authorization_flow': value.authorizationFlow,
|
|
79
78
|
'property_mappings': value.propertyMappings,
|
|
80
79
|
'base_dn': value.baseDn,
|
|
81
|
-
'search_group': value.searchGroup,
|
|
82
80
|
'certificate': value.certificate,
|
|
83
81
|
'tls_server_name': value.tlsServerName,
|
|
84
82
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
|
|
|
46
46
|
* @memberof LDAPProviderRequest
|
|
47
47
|
*/
|
|
48
48
|
baseDn?: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof LDAPProviderRequest
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -35,7 +35,6 @@ export function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
35
35
|
'authorizationFlow': json['authorization_flow'],
|
|
36
36
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
37
37
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
38
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
39
38
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
40
39
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
41
40
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -58,7 +57,6 @@ export function LDAPProviderRequestToJSON(value) {
|
|
|
58
57
|
'authorization_flow': value.authorizationFlow,
|
|
59
58
|
'property_mappings': value.propertyMappings,
|
|
60
59
|
'base_dn': value.baseDn,
|
|
61
|
-
'search_group': value.searchGroup,
|
|
62
60
|
'certificate': value.certificate,
|
|
63
61
|
'tls_server_name': value.tlsServerName,
|
|
64
62
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
|
|
|
46
46
|
* @memberof PatchedLDAPProviderRequest
|
|
47
47
|
*/
|
|
48
48
|
baseDn?: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof PatchedLDAPProviderRequest
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -33,7 +33,6 @@ export function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminato
|
|
|
33
33
|
'authorizationFlow': !exists(json, 'authorization_flow') ? undefined : json['authorization_flow'],
|
|
34
34
|
'propertyMappings': !exists(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
35
35
|
'baseDn': !exists(json, 'base_dn') ? undefined : json['base_dn'],
|
|
36
|
-
'searchGroup': !exists(json, 'search_group') ? undefined : json['search_group'],
|
|
37
36
|
'certificate': !exists(json, 'certificate') ? undefined : json['certificate'],
|
|
38
37
|
'tlsServerName': !exists(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
39
38
|
'uidStartNumber': !exists(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -56,7 +55,6 @@ export function PatchedLDAPProviderRequestToJSON(value) {
|
|
|
56
55
|
'authorization_flow': value.authorizationFlow,
|
|
57
56
|
'property_mappings': value.propertyMappings,
|
|
58
57
|
'base_dn': value.baseDn,
|
|
59
|
-
'search_group': value.searchGroup,
|
|
60
58
|
'certificate': value.certificate,
|
|
61
59
|
'tls_server_name': value.tlsServerName,
|
|
62
60
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
|
|
|
108
108
|
* @memberof PatchedSAMLProviderRequest
|
|
109
109
|
*/
|
|
110
110
|
verificationKp?: string | null;
|
|
111
|
+
/**
|
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
113
|
+
* @type {string}
|
|
114
|
+
* @memberof PatchedSAMLProviderRequest
|
|
115
|
+
*/
|
|
116
|
+
encryptionKp?: string | null;
|
|
117
|
+
/**
|
|
118
|
+
*
|
|
119
|
+
* @type {boolean}
|
|
120
|
+
* @memberof PatchedSAMLProviderRequest
|
|
121
|
+
*/
|
|
122
|
+
signAssertion?: boolean;
|
|
123
|
+
/**
|
|
124
|
+
*
|
|
125
|
+
* @type {boolean}
|
|
126
|
+
* @memberof PatchedSAMLProviderRequest
|
|
127
|
+
*/
|
|
128
|
+
signResponse?: boolean;
|
|
111
129
|
/**
|
|
112
130
|
*
|
|
113
131
|
* @type {SpBindingEnum}
|