@goauthentik/api 2024.6.3-1723497462 → 2024.6.3-1723921843

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/OutpostsApi.d.ts +16 -4
  3. package/dist/apis/OutpostsApi.js +42 -4
  4. package/dist/apis/ProvidersApi.d.ts +3 -2
  5. package/dist/apis/ProvidersApi.js +9 -6
  6. package/dist/esm/apis/OutpostsApi.d.ts +16 -4
  7. package/dist/esm/apis/OutpostsApi.js +43 -5
  8. package/dist/esm/apis/ProvidersApi.d.ts +3 -2
  9. package/dist/esm/apis/ProvidersApi.js +9 -6
  10. package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
  11. package/dist/esm/models/LDAPCheckAccess.js +47 -0
  12. package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
  13. package/dist/esm/models/LDAPOutpostConfig.js +0 -2
  14. package/dist/esm/models/LDAPProvider.d.ts +0 -6
  15. package/dist/esm/models/LDAPProvider.js +0 -2
  16. package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
  17. package/dist/esm/models/LDAPProviderRequest.js +0 -2
  18. package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
  19. package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
  20. package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +18 -0
  21. package/dist/esm/models/PatchedSAMLProviderRequest.js +6 -0
  22. package/dist/esm/models/SAMLProvider.d.ts +18 -0
  23. package/dist/esm/models/SAMLProvider.js +6 -0
  24. package/dist/esm/models/SAMLProviderRequest.d.ts +18 -0
  25. package/dist/esm/models/SAMLProviderRequest.js +6 -0
  26. package/dist/esm/models/index.d.ts +1 -0
  27. package/dist/esm/models/index.js +1 -0
  28. package/dist/models/LDAPCheckAccess.d.ts +38 -0
  29. package/dist/models/LDAPCheckAccess.js +54 -0
  30. package/dist/models/LDAPOutpostConfig.d.ts +0 -6
  31. package/dist/models/LDAPOutpostConfig.js +0 -2
  32. package/dist/models/LDAPProvider.d.ts +0 -6
  33. package/dist/models/LDAPProvider.js +0 -2
  34. package/dist/models/LDAPProviderRequest.d.ts +0 -6
  35. package/dist/models/LDAPProviderRequest.js +0 -2
  36. package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
  37. package/dist/models/PatchedLDAPProviderRequest.js +0 -2
  38. package/dist/models/PatchedSAMLProviderRequest.d.ts +18 -0
  39. package/dist/models/PatchedSAMLProviderRequest.js +6 -0
  40. package/dist/models/SAMLProvider.d.ts +18 -0
  41. package/dist/models/SAMLProvider.js +6 -0
  42. package/dist/models/SAMLProviderRequest.d.ts +18 -0
  43. package/dist/models/SAMLProviderRequest.js +6 -0
  44. package/dist/models/index.d.ts +1 -0
  45. package/dist/models/index.js +1 -0
  46. package/package.json +1 -1
  47. package/src/apis/OutpostsApi.ts +55 -5
  48. package/src/apis/ProvidersApi.ts +15 -10
  49. package/src/models/LDAPCheckAccess.ts +81 -0
  50. package/src/models/LDAPOutpostConfig.ts +0 -8
  51. package/src/models/LDAPProvider.ts +0 -8
  52. package/src/models/LDAPProviderRequest.ts +0 -8
  53. package/src/models/PatchedLDAPProviderRequest.ts +0 -8
  54. package/src/models/PatchedSAMLProviderRequest.ts +24 -0
  55. package/src/models/SAMLProvider.ts +24 -0
  56. package/src/models/SAMLProviderRequest.ts +24 -0
  57. package/src/models/index.ts +1 -0
@@ -45,6 +45,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminato
45
45
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
46
46
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
47
47
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
48
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
49
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
50
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
48
51
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
49
52
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
50
53
  };
@@ -72,6 +75,9 @@ export function PatchedSAMLProviderRequestToJSON(value) {
72
75
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
73
76
  'signing_kp': value.signingKp,
74
77
  'verification_kp': value.verificationKp,
78
+ 'encryption_kp': value.encryptionKp,
79
+ 'sign_assertion': value.signAssertion,
80
+ 'sign_response': value.signResponse,
75
81
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
76
82
  'default_relay_state': value.defaultRelayState,
77
83
  };
@@ -162,6 +162,24 @@ export interface SAMLProvider {
162
162
  * @memberof SAMLProvider
163
163
  */
164
164
  verificationKp?: string | null;
165
+ /**
166
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
167
+ * @type {string}
168
+ * @memberof SAMLProvider
169
+ */
170
+ encryptionKp?: string | null;
171
+ /**
172
+ *
173
+ * @type {boolean}
174
+ * @memberof SAMLProvider
175
+ */
176
+ signAssertion?: boolean;
177
+ /**
178
+ *
179
+ * @type {boolean}
180
+ * @memberof SAMLProvider
181
+ */
182
+ signResponse?: boolean;
165
183
  /**
166
184
  *
167
185
  * @type {SpBindingEnum}
@@ -72,6 +72,9 @@ export function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
72
72
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
73
73
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
74
74
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
75
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
76
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
77
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
75
78
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
76
79
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
77
80
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -105,6 +108,9 @@ export function SAMLProviderToJSON(value) {
105
108
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
106
109
  'signing_kp': value.signingKp,
107
110
  'verification_kp': value.verificationKp,
111
+ 'encryption_kp': value.encryptionKp,
112
+ 'sign_assertion': value.signAssertion,
113
+ 'sign_response': value.signResponse,
108
114
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
109
115
  'default_relay_state': value.defaultRelayState,
110
116
  };
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
108
108
  * @memberof SAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof SAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof SAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof SAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -48,6 +48,9 @@ export function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
48
48
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
49
49
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
50
50
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
51
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
52
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
53
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
51
54
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
52
55
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
53
56
  };
@@ -75,6 +78,9 @@ export function SAMLProviderRequestToJSON(value) {
75
78
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
76
79
  'signing_kp': value.signingKp,
77
80
  'verification_kp': value.verificationKp,
81
+ 'encryption_kp': value.encryptionKp,
82
+ 'sign_assertion': value.signAssertion,
83
+ 'sign_response': value.signResponse,
78
84
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
79
85
  'default_relay_state': value.defaultRelayState,
80
86
  };
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
177
177
  export * from './KubernetesServiceConnection';
178
178
  export * from './KubernetesServiceConnectionRequest';
179
179
  export * from './LDAPAPIAccessMode';
180
+ export * from './LDAPCheckAccess';
180
181
  export * from './LDAPDebug';
181
182
  export * from './LDAPOutpostConfig';
182
183
  export * from './LDAPProvider';
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
179
179
  export * from './KubernetesServiceConnection';
180
180
  export * from './KubernetesServiceConnectionRequest';
181
181
  export * from './LDAPAPIAccessMode';
182
+ export * from './LDAPCheckAccess';
182
183
  export * from './LDAPDebug';
183
184
  export * from './LDAPOutpostConfig';
184
185
  export * from './LDAPProvider';
@@ -0,0 +1,38 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.6.3
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { PolicyTestResult } from './PolicyTestResult';
13
+ /**
14
+ * Base serializer class which doesn't implement create/update methods
15
+ * @export
16
+ * @interface LDAPCheckAccess
17
+ */
18
+ export interface LDAPCheckAccess {
19
+ /**
20
+ *
21
+ * @type {boolean}
22
+ * @memberof LDAPCheckAccess
23
+ */
24
+ hasSearchPermission?: boolean;
25
+ /**
26
+ *
27
+ * @type {PolicyTestResult}
28
+ * @memberof LDAPCheckAccess
29
+ */
30
+ access: PolicyTestResult;
31
+ }
32
+ /**
33
+ * Check if a given object implements the LDAPCheckAccess interface.
34
+ */
35
+ export declare function instanceOfLDAPCheckAccess(value: object): boolean;
36
+ export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
37
+ export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
38
+ export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
@@ -0,0 +1,54 @@
1
+ "use strict";
2
+ /* tslint:disable */
3
+ /* eslint-disable */
4
+ /**
5
+ * authentik
6
+ * Making authentication simple.
7
+ *
8
+ * The version of the OpenAPI document: 2024.6.3
9
+ * Contact: hello@goauthentik.io
10
+ *
11
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
12
+ * https://openapi-generator.tech
13
+ * Do not edit the class manually.
14
+ */
15
+ Object.defineProperty(exports, "__esModule", { value: true });
16
+ exports.LDAPCheckAccessToJSON = exports.LDAPCheckAccessFromJSONTyped = exports.LDAPCheckAccessFromJSON = exports.instanceOfLDAPCheckAccess = void 0;
17
+ const runtime_1 = require("../runtime");
18
+ const PolicyTestResult_1 = require("./PolicyTestResult");
19
+ /**
20
+ * Check if a given object implements the LDAPCheckAccess interface.
21
+ */
22
+ function instanceOfLDAPCheckAccess(value) {
23
+ let isInstance = true;
24
+ isInstance = isInstance && "access" in value;
25
+ return isInstance;
26
+ }
27
+ exports.instanceOfLDAPCheckAccess = instanceOfLDAPCheckAccess;
28
+ function LDAPCheckAccessFromJSON(json) {
29
+ return LDAPCheckAccessFromJSONTyped(json, false);
30
+ }
31
+ exports.LDAPCheckAccessFromJSON = LDAPCheckAccessFromJSON;
32
+ function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
33
+ if ((json === undefined) || (json === null)) {
34
+ return json;
35
+ }
36
+ return {
37
+ 'hasSearchPermission': !(0, runtime_1.exists)(json, 'has_search_permission') ? undefined : json['has_search_permission'],
38
+ 'access': (0, PolicyTestResult_1.PolicyTestResultFromJSON)(json['access']),
39
+ };
40
+ }
41
+ exports.LDAPCheckAccessFromJSONTyped = LDAPCheckAccessFromJSONTyped;
42
+ function LDAPCheckAccessToJSON(value) {
43
+ if (value === undefined) {
44
+ return undefined;
45
+ }
46
+ if (value === null) {
47
+ return null;
48
+ }
49
+ return {
50
+ 'has_search_permission': value.hasSearchPermission,
51
+ 'access': (0, PolicyTestResult_1.PolicyTestResultToJSON)(value.access),
52
+ };
53
+ }
54
+ exports.LDAPCheckAccessToJSON = LDAPCheckAccessToJSON;
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
46
46
  * @memberof LDAPOutpostConfig
47
47
  */
48
48
  readonly applicationSlug: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPOutpostConfig
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -42,7 +42,6 @@ function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
42
42
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
43
43
  'bindFlowSlug': json['bind_flow_slug'],
44
44
  'applicationSlug': json['application_slug'],
45
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
46
45
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
47
46
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
48
47
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -64,7 +63,6 @@ function LDAPOutpostConfigToJSON(value) {
64
63
  'name': value.name,
65
64
  'base_dn': value.baseDn,
66
65
  'bind_flow_slug': value.bindFlowSlug,
67
- 'search_group': value.searchGroup,
68
66
  'certificate': value.certificate,
69
67
  'tls_server_name': value.tlsServerName,
70
68
  'uid_start_number': value.uidStartNumber,
@@ -100,12 +100,6 @@ export interface LDAPProvider {
100
100
  * @memberof LDAPProvider
101
101
  */
102
102
  baseDn?: string;
103
- /**
104
- * Users in this group can do search queries. If not set, every user can execute search queries.
105
- * @type {string}
106
- * @memberof LDAPProvider
107
- */
108
- searchGroup?: string | null;
109
103
  /**
110
104
  *
111
105
  * @type {string}
@@ -59,7 +59,6 @@ function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
59
59
  'verboseNamePlural': json['verbose_name_plural'],
60
60
  'metaModelName': json['meta_model_name'],
61
61
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
62
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
63
62
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
64
63
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
65
64
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -84,7 +83,6 @@ function LDAPProviderToJSON(value) {
84
83
  'authorization_flow': value.authorizationFlow,
85
84
  'property_mappings': value.propertyMappings,
86
85
  'base_dn': value.baseDn,
87
- 'search_group': value.searchGroup,
88
86
  'certificate': value.certificate,
89
87
  'tls_server_name': value.tlsServerName,
90
88
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
46
46
  * @memberof LDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -40,7 +40,6 @@ function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
40
40
  'authorizationFlow': json['authorization_flow'],
41
41
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
42
42
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
43
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
44
43
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
45
44
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
46
45
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -64,7 +63,6 @@ function LDAPProviderRequestToJSON(value) {
64
63
  'authorization_flow': value.authorizationFlow,
65
64
  'property_mappings': value.propertyMappings,
66
65
  'base_dn': value.baseDn,
67
- 'search_group': value.searchGroup,
68
66
  'certificate': value.certificate,
69
67
  'tls_server_name': value.tlsServerName,
70
68
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
46
46
  * @memberof PatchedLDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof PatchedLDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -38,7 +38,6 @@ function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
38
38
  'authorizationFlow': !(0, runtime_1.exists)(json, 'authorization_flow') ? undefined : json['authorization_flow'],
39
39
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
40
40
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
41
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
42
41
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
43
42
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
44
43
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -62,7 +61,6 @@ function PatchedLDAPProviderRequestToJSON(value) {
62
61
  'authorization_flow': value.authorizationFlow,
63
62
  'property_mappings': value.propertyMappings,
64
63
  'base_dn': value.baseDn,
65
- 'search_group': value.searchGroup,
66
64
  'certificate': value.certificate,
67
65
  'tls_server_name': value.tlsServerName,
68
66
  'uid_start_number': value.uidStartNumber,
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
108
108
  * @memberof PatchedSAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof PatchedSAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof PatchedSAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof PatchedSAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -50,6 +50,9 @@ function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
50
50
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
51
51
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
52
52
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
53
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
54
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
55
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
53
56
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
54
57
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
55
58
  };
@@ -78,6 +81,9 @@ function PatchedSAMLProviderRequestToJSON(value) {
78
81
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
79
82
  'signing_kp': value.signingKp,
80
83
  'verification_kp': value.verificationKp,
84
+ 'encryption_kp': value.encryptionKp,
85
+ 'sign_assertion': value.signAssertion,
86
+ 'sign_response': value.signResponse,
81
87
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
82
88
  'default_relay_state': value.defaultRelayState,
83
89
  };
@@ -162,6 +162,24 @@ export interface SAMLProvider {
162
162
  * @memberof SAMLProvider
163
163
  */
164
164
  verificationKp?: string | null;
165
+ /**
166
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
167
+ * @type {string}
168
+ * @memberof SAMLProvider
169
+ */
170
+ encryptionKp?: string | null;
171
+ /**
172
+ *
173
+ * @type {boolean}
174
+ * @memberof SAMLProvider
175
+ */
176
+ signAssertion?: boolean;
177
+ /**
178
+ *
179
+ * @type {boolean}
180
+ * @memberof SAMLProvider
181
+ */
182
+ signResponse?: boolean;
165
183
  /**
166
184
  *
167
185
  * @type {SpBindingEnum}
@@ -77,6 +77,9 @@ function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
77
77
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
78
78
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
79
79
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
80
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
81
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
82
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
80
83
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
81
84
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
82
85
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -111,6 +114,9 @@ function SAMLProviderToJSON(value) {
111
114
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
112
115
  'signing_kp': value.signingKp,
113
116
  'verification_kp': value.verificationKp,
117
+ 'encryption_kp': value.encryptionKp,
118
+ 'sign_assertion': value.signAssertion,
119
+ 'sign_response': value.signResponse,
114
120
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
115
121
  'default_relay_state': value.defaultRelayState,
116
122
  };
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
108
108
  * @memberof SAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof SAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof SAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof SAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -53,6 +53,9 @@ function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
53
53
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
54
54
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
55
55
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
56
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
57
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
58
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
56
59
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
57
60
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
58
61
  };
@@ -81,6 +84,9 @@ function SAMLProviderRequestToJSON(value) {
81
84
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
82
85
  'signing_kp': value.signingKp,
83
86
  'verification_kp': value.verificationKp,
87
+ 'encryption_kp': value.encryptionKp,
88
+ 'sign_assertion': value.signAssertion,
89
+ 'sign_response': value.signResponse,
84
90
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
85
91
  'default_relay_state': value.defaultRelayState,
86
92
  };
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
177
177
  export * from './KubernetesServiceConnection';
178
178
  export * from './KubernetesServiceConnectionRequest';
179
179
  export * from './LDAPAPIAccessMode';
180
+ export * from './LDAPCheckAccess';
180
181
  export * from './LDAPDebug';
181
182
  export * from './LDAPOutpostConfig';
182
183
  export * from './LDAPProvider';
@@ -195,6 +195,7 @@ __exportStar(require("./IssuerModeEnum"), exports);
195
195
  __exportStar(require("./KubernetesServiceConnection"), exports);
196
196
  __exportStar(require("./KubernetesServiceConnectionRequest"), exports);
197
197
  __exportStar(require("./LDAPAPIAccessMode"), exports);
198
+ __exportStar(require("./LDAPCheckAccess"), exports);
198
199
  __exportStar(require("./LDAPDebug"), exports);
199
200
  __exportStar(require("./LDAPOutpostConfig"), exports);
200
201
  __exportStar(require("./LDAPProvider"), exports);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.6.3-1723497462",
3
+ "version": "2024.6.3-1723921843",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -20,6 +20,7 @@ import type {
20
20
  GenericError,
21
21
  KubernetesServiceConnection,
22
22
  KubernetesServiceConnectionRequest,
23
+ LDAPCheckAccess,
23
24
  Outpost,
24
25
  OutpostDefaultConfig,
25
26
  OutpostHealth,
@@ -52,6 +53,8 @@ import {
52
53
  KubernetesServiceConnectionToJSON,
53
54
  KubernetesServiceConnectionRequestFromJSON,
54
55
  KubernetesServiceConnectionRequestToJSON,
56
+ LDAPCheckAccessFromJSON,
57
+ LDAPCheckAccessToJSON,
55
58
  OutpostFromJSON,
56
59
  OutpostToJSON,
57
60
  OutpostDefaultConfigFromJSON,
@@ -149,6 +152,11 @@ export interface OutpostsInstancesUsedByListRequest {
149
152
  uuid: string;
150
153
  }
151
154
 
155
+ export interface OutpostsLdapAccessCheckRequest {
156
+ id: number;
157
+ appSlug?: string;
158
+ }
159
+
152
160
  export interface OutpostsLdapListRequest {
153
161
  name?: string;
154
162
  ordering?: string;
@@ -165,7 +173,7 @@ export interface OutpostsProxyListRequest {
165
173
  search?: string;
166
174
  }
167
175
 
168
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
176
+ export interface OutpostsRadiusAccessCheckRequest {
169
177
  id: number;
170
178
  appSlug?: string;
171
179
  }
@@ -714,6 +722,48 @@ export class OutpostsApi extends runtime.BaseAPI {
714
722
  return await response.value();
715
723
  }
716
724
 
725
+ /**
726
+ * Check access to a single application by slug
727
+ */
728
+ async outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>> {
729
+ if (requestParameters.id === null || requestParameters.id === undefined) {
730
+ throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
731
+ }
732
+
733
+ const queryParameters: any = {};
734
+
735
+ if (requestParameters.appSlug !== undefined) {
736
+ queryParameters['app_slug'] = requestParameters.appSlug;
737
+ }
738
+
739
+ const headerParameters: runtime.HTTPHeaders = {};
740
+
741
+ if (this.configuration && this.configuration.accessToken) {
742
+ const token = this.configuration.accessToken;
743
+ const tokenString = await token("authentik", []);
744
+
745
+ if (tokenString) {
746
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
747
+ }
748
+ }
749
+ const response = await this.request({
750
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
751
+ method: 'GET',
752
+ headers: headerParameters,
753
+ query: queryParameters,
754
+ }, initOverrides);
755
+
756
+ return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
757
+ }
758
+
759
+ /**
760
+ * Check access to a single application by slug
761
+ */
762
+ async outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess> {
763
+ const response = await this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
764
+ return await response.value();
765
+ }
766
+
717
767
  /**
718
768
  * LDAPProvider Viewset
719
769
  */
@@ -825,9 +875,9 @@ export class OutpostsApi extends runtime.BaseAPI {
825
875
  /**
826
876
  * Check access to a single application by slug
827
877
  */
828
- async outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>> {
878
+ async outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>> {
829
879
  if (requestParameters.id === null || requestParameters.id === undefined) {
830
- throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
880
+ throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
831
881
  }
832
882
 
833
883
  const queryParameters: any = {};
@@ -859,8 +909,8 @@ export class OutpostsApi extends runtime.BaseAPI {
859
909
  /**
860
910
  * Check access to a single application by slug
861
911
  */
862
- async outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess> {
863
- const response = await this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
912
+ async outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess> {
913
+ const response = await this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
864
914
  return await response.value();
865
915
  }
866
916