@goauthentik/api 2024.6.3-1723497462 → 2024.6.3-1723921843
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +1 -0
- package/dist/apis/OutpostsApi.d.ts +16 -4
- package/dist/apis/OutpostsApi.js +42 -4
- package/dist/apis/ProvidersApi.d.ts +3 -2
- package/dist/apis/ProvidersApi.js +9 -6
- package/dist/esm/apis/OutpostsApi.d.ts +16 -4
- package/dist/esm/apis/OutpostsApi.js +43 -5
- package/dist/esm/apis/ProvidersApi.d.ts +3 -2
- package/dist/esm/apis/ProvidersApi.js +9 -6
- package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
- package/dist/esm/models/LDAPCheckAccess.js +47 -0
- package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
- package/dist/esm/models/LDAPOutpostConfig.js +0 -2
- package/dist/esm/models/LDAPProvider.d.ts +0 -6
- package/dist/esm/models/LDAPProvider.js +0 -2
- package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
- package/dist/esm/models/LDAPProviderRequest.js +0 -2
- package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
- package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
- package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +18 -0
- package/dist/esm/models/PatchedSAMLProviderRequest.js +6 -0
- package/dist/esm/models/SAMLProvider.d.ts +18 -0
- package/dist/esm/models/SAMLProvider.js +6 -0
- package/dist/esm/models/SAMLProviderRequest.d.ts +18 -0
- package/dist/esm/models/SAMLProviderRequest.js +6 -0
- package/dist/esm/models/index.d.ts +1 -0
- package/dist/esm/models/index.js +1 -0
- package/dist/models/LDAPCheckAccess.d.ts +38 -0
- package/dist/models/LDAPCheckAccess.js +54 -0
- package/dist/models/LDAPOutpostConfig.d.ts +0 -6
- package/dist/models/LDAPOutpostConfig.js +0 -2
- package/dist/models/LDAPProvider.d.ts +0 -6
- package/dist/models/LDAPProvider.js +0 -2
- package/dist/models/LDAPProviderRequest.d.ts +0 -6
- package/dist/models/LDAPProviderRequest.js +0 -2
- package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
- package/dist/models/PatchedLDAPProviderRequest.js +0 -2
- package/dist/models/PatchedSAMLProviderRequest.d.ts +18 -0
- package/dist/models/PatchedSAMLProviderRequest.js +6 -0
- package/dist/models/SAMLProvider.d.ts +18 -0
- package/dist/models/SAMLProvider.js +6 -0
- package/dist/models/SAMLProviderRequest.d.ts +18 -0
- package/dist/models/SAMLProviderRequest.js +6 -0
- package/dist/models/index.d.ts +1 -0
- package/dist/models/index.js +1 -0
- package/package.json +1 -1
- package/src/apis/OutpostsApi.ts +55 -5
- package/src/apis/ProvidersApi.ts +15 -10
- package/src/models/LDAPCheckAccess.ts +81 -0
- package/src/models/LDAPOutpostConfig.ts +0 -8
- package/src/models/LDAPProvider.ts +0 -8
- package/src/models/LDAPProviderRequest.ts +0 -8
- package/src/models/PatchedLDAPProviderRequest.ts +0 -8
- package/src/models/PatchedSAMLProviderRequest.ts +24 -0
- package/src/models/SAMLProvider.ts +24 -0
- package/src/models/SAMLProviderRequest.ts +24 -0
- package/src/models/index.ts +1 -0
|
@@ -45,6 +45,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminato
|
|
|
45
45
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
46
46
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
47
47
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
48
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
49
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
50
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
48
51
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
49
52
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
50
53
|
};
|
|
@@ -72,6 +75,9 @@ export function PatchedSAMLProviderRequestToJSON(value) {
|
|
|
72
75
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
73
76
|
'signing_kp': value.signingKp,
|
|
74
77
|
'verification_kp': value.verificationKp,
|
|
78
|
+
'encryption_kp': value.encryptionKp,
|
|
79
|
+
'sign_assertion': value.signAssertion,
|
|
80
|
+
'sign_response': value.signResponse,
|
|
75
81
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
76
82
|
'default_relay_state': value.defaultRelayState,
|
|
77
83
|
};
|
|
@@ -162,6 +162,24 @@ export interface SAMLProvider {
|
|
|
162
162
|
* @memberof SAMLProvider
|
|
163
163
|
*/
|
|
164
164
|
verificationKp?: string | null;
|
|
165
|
+
/**
|
|
166
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
167
|
+
* @type {string}
|
|
168
|
+
* @memberof SAMLProvider
|
|
169
|
+
*/
|
|
170
|
+
encryptionKp?: string | null;
|
|
171
|
+
/**
|
|
172
|
+
*
|
|
173
|
+
* @type {boolean}
|
|
174
|
+
* @memberof SAMLProvider
|
|
175
|
+
*/
|
|
176
|
+
signAssertion?: boolean;
|
|
177
|
+
/**
|
|
178
|
+
*
|
|
179
|
+
* @type {boolean}
|
|
180
|
+
* @memberof SAMLProvider
|
|
181
|
+
*/
|
|
182
|
+
signResponse?: boolean;
|
|
165
183
|
/**
|
|
166
184
|
*
|
|
167
185
|
* @type {SpBindingEnum}
|
|
@@ -72,6 +72,9 @@ export function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
72
72
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
73
73
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
74
74
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
75
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
76
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
77
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
75
78
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
76
79
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
77
80
|
'urlDownloadMetadata': json['url_download_metadata'],
|
|
@@ -105,6 +108,9 @@ export function SAMLProviderToJSON(value) {
|
|
|
105
108
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
106
109
|
'signing_kp': value.signingKp,
|
|
107
110
|
'verification_kp': value.verificationKp,
|
|
111
|
+
'encryption_kp': value.encryptionKp,
|
|
112
|
+
'sign_assertion': value.signAssertion,
|
|
113
|
+
'sign_response': value.signResponse,
|
|
108
114
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
109
115
|
'default_relay_state': value.defaultRelayState,
|
|
110
116
|
};
|
|
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
|
|
|
108
108
|
* @memberof SAMLProviderRequest
|
|
109
109
|
*/
|
|
110
110
|
verificationKp?: string | null;
|
|
111
|
+
/**
|
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
113
|
+
* @type {string}
|
|
114
|
+
* @memberof SAMLProviderRequest
|
|
115
|
+
*/
|
|
116
|
+
encryptionKp?: string | null;
|
|
117
|
+
/**
|
|
118
|
+
*
|
|
119
|
+
* @type {boolean}
|
|
120
|
+
* @memberof SAMLProviderRequest
|
|
121
|
+
*/
|
|
122
|
+
signAssertion?: boolean;
|
|
123
|
+
/**
|
|
124
|
+
*
|
|
125
|
+
* @type {boolean}
|
|
126
|
+
* @memberof SAMLProviderRequest
|
|
127
|
+
*/
|
|
128
|
+
signResponse?: boolean;
|
|
111
129
|
/**
|
|
112
130
|
*
|
|
113
131
|
* @type {SpBindingEnum}
|
|
@@ -48,6 +48,9 @@ export function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
48
48
|
'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
|
|
49
49
|
'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
50
50
|
'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
51
|
+
'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
52
|
+
'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
53
|
+
'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
|
|
51
54
|
'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
|
|
52
55
|
'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
53
56
|
};
|
|
@@ -75,6 +78,9 @@ export function SAMLProviderRequestToJSON(value) {
|
|
|
75
78
|
'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
|
|
76
79
|
'signing_kp': value.signingKp,
|
|
77
80
|
'verification_kp': value.verificationKp,
|
|
81
|
+
'encryption_kp': value.encryptionKp,
|
|
82
|
+
'sign_assertion': value.signAssertion,
|
|
83
|
+
'sign_response': value.signResponse,
|
|
78
84
|
'sp_binding': SpBindingEnumToJSON(value.spBinding),
|
|
79
85
|
'default_relay_state': value.defaultRelayState,
|
|
80
86
|
};
|
|
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
|
|
|
177
177
|
export * from './KubernetesServiceConnection';
|
|
178
178
|
export * from './KubernetesServiceConnectionRequest';
|
|
179
179
|
export * from './LDAPAPIAccessMode';
|
|
180
|
+
export * from './LDAPCheckAccess';
|
|
180
181
|
export * from './LDAPDebug';
|
|
181
182
|
export * from './LDAPOutpostConfig';
|
|
182
183
|
export * from './LDAPProvider';
|
package/dist/esm/models/index.js
CHANGED
|
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
|
|
|
179
179
|
export * from './KubernetesServiceConnection';
|
|
180
180
|
export * from './KubernetesServiceConnectionRequest';
|
|
181
181
|
export * from './LDAPAPIAccessMode';
|
|
182
|
+
export * from './LDAPCheckAccess';
|
|
182
183
|
export * from './LDAPDebug';
|
|
183
184
|
export * from './LDAPOutpostConfig';
|
|
184
185
|
export * from './LDAPProvider';
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2024.6.3
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import type { PolicyTestResult } from './PolicyTestResult';
|
|
13
|
+
/**
|
|
14
|
+
* Base serializer class which doesn't implement create/update methods
|
|
15
|
+
* @export
|
|
16
|
+
* @interface LDAPCheckAccess
|
|
17
|
+
*/
|
|
18
|
+
export interface LDAPCheckAccess {
|
|
19
|
+
/**
|
|
20
|
+
*
|
|
21
|
+
* @type {boolean}
|
|
22
|
+
* @memberof LDAPCheckAccess
|
|
23
|
+
*/
|
|
24
|
+
hasSearchPermission?: boolean;
|
|
25
|
+
/**
|
|
26
|
+
*
|
|
27
|
+
* @type {PolicyTestResult}
|
|
28
|
+
* @memberof LDAPCheckAccess
|
|
29
|
+
*/
|
|
30
|
+
access: PolicyTestResult;
|
|
31
|
+
}
|
|
32
|
+
/**
|
|
33
|
+
* Check if a given object implements the LDAPCheckAccess interface.
|
|
34
|
+
*/
|
|
35
|
+
export declare function instanceOfLDAPCheckAccess(value: object): boolean;
|
|
36
|
+
export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
|
|
37
|
+
export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
|
|
38
|
+
export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
|
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/* tslint:disable */
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
/**
|
|
5
|
+
* authentik
|
|
6
|
+
* Making authentication simple.
|
|
7
|
+
*
|
|
8
|
+
* The version of the OpenAPI document: 2024.6.3
|
|
9
|
+
* Contact: hello@goauthentik.io
|
|
10
|
+
*
|
|
11
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
12
|
+
* https://openapi-generator.tech
|
|
13
|
+
* Do not edit the class manually.
|
|
14
|
+
*/
|
|
15
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
+
exports.LDAPCheckAccessToJSON = exports.LDAPCheckAccessFromJSONTyped = exports.LDAPCheckAccessFromJSON = exports.instanceOfLDAPCheckAccess = void 0;
|
|
17
|
+
const runtime_1 = require("../runtime");
|
|
18
|
+
const PolicyTestResult_1 = require("./PolicyTestResult");
|
|
19
|
+
/**
|
|
20
|
+
* Check if a given object implements the LDAPCheckAccess interface.
|
|
21
|
+
*/
|
|
22
|
+
function instanceOfLDAPCheckAccess(value) {
|
|
23
|
+
let isInstance = true;
|
|
24
|
+
isInstance = isInstance && "access" in value;
|
|
25
|
+
return isInstance;
|
|
26
|
+
}
|
|
27
|
+
exports.instanceOfLDAPCheckAccess = instanceOfLDAPCheckAccess;
|
|
28
|
+
function LDAPCheckAccessFromJSON(json) {
|
|
29
|
+
return LDAPCheckAccessFromJSONTyped(json, false);
|
|
30
|
+
}
|
|
31
|
+
exports.LDAPCheckAccessFromJSON = LDAPCheckAccessFromJSON;
|
|
32
|
+
function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
|
|
33
|
+
if ((json === undefined) || (json === null)) {
|
|
34
|
+
return json;
|
|
35
|
+
}
|
|
36
|
+
return {
|
|
37
|
+
'hasSearchPermission': !(0, runtime_1.exists)(json, 'has_search_permission') ? undefined : json['has_search_permission'],
|
|
38
|
+
'access': (0, PolicyTestResult_1.PolicyTestResultFromJSON)(json['access']),
|
|
39
|
+
};
|
|
40
|
+
}
|
|
41
|
+
exports.LDAPCheckAccessFromJSONTyped = LDAPCheckAccessFromJSONTyped;
|
|
42
|
+
function LDAPCheckAccessToJSON(value) {
|
|
43
|
+
if (value === undefined) {
|
|
44
|
+
return undefined;
|
|
45
|
+
}
|
|
46
|
+
if (value === null) {
|
|
47
|
+
return null;
|
|
48
|
+
}
|
|
49
|
+
return {
|
|
50
|
+
'has_search_permission': value.hasSearchPermission,
|
|
51
|
+
'access': (0, PolicyTestResult_1.PolicyTestResultToJSON)(value.access),
|
|
52
|
+
};
|
|
53
|
+
}
|
|
54
|
+
exports.LDAPCheckAccessToJSON = LDAPCheckAccessToJSON;
|
|
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
|
|
|
46
46
|
* @memberof LDAPOutpostConfig
|
|
47
47
|
*/
|
|
48
48
|
readonly applicationSlug: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof LDAPOutpostConfig
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -42,7 +42,6 @@ function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
42
42
|
'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
|
|
43
43
|
'bindFlowSlug': json['bind_flow_slug'],
|
|
44
44
|
'applicationSlug': json['application_slug'],
|
|
45
|
-
'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
|
|
46
45
|
'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
|
|
47
46
|
'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
48
47
|
'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -64,7 +63,6 @@ function LDAPOutpostConfigToJSON(value) {
|
|
|
64
63
|
'name': value.name,
|
|
65
64
|
'base_dn': value.baseDn,
|
|
66
65
|
'bind_flow_slug': value.bindFlowSlug,
|
|
67
|
-
'search_group': value.searchGroup,
|
|
68
66
|
'certificate': value.certificate,
|
|
69
67
|
'tls_server_name': value.tlsServerName,
|
|
70
68
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -100,12 +100,6 @@ export interface LDAPProvider {
|
|
|
100
100
|
* @memberof LDAPProvider
|
|
101
101
|
*/
|
|
102
102
|
baseDn?: string;
|
|
103
|
-
/**
|
|
104
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
105
|
-
* @type {string}
|
|
106
|
-
* @memberof LDAPProvider
|
|
107
|
-
*/
|
|
108
|
-
searchGroup?: string | null;
|
|
109
103
|
/**
|
|
110
104
|
*
|
|
111
105
|
* @type {string}
|
|
@@ -59,7 +59,6 @@ function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
59
59
|
'verboseNamePlural': json['verbose_name_plural'],
|
|
60
60
|
'metaModelName': json['meta_model_name'],
|
|
61
61
|
'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
|
|
62
|
-
'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
|
|
63
62
|
'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
|
|
64
63
|
'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
65
64
|
'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -84,7 +83,6 @@ function LDAPProviderToJSON(value) {
|
|
|
84
83
|
'authorization_flow': value.authorizationFlow,
|
|
85
84
|
'property_mappings': value.propertyMappings,
|
|
86
85
|
'base_dn': value.baseDn,
|
|
87
|
-
'search_group': value.searchGroup,
|
|
88
86
|
'certificate': value.certificate,
|
|
89
87
|
'tls_server_name': value.tlsServerName,
|
|
90
88
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
|
|
|
46
46
|
* @memberof LDAPProviderRequest
|
|
47
47
|
*/
|
|
48
48
|
baseDn?: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof LDAPProviderRequest
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -40,7 +40,6 @@ function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
40
40
|
'authorizationFlow': json['authorization_flow'],
|
|
41
41
|
'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
42
42
|
'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
|
|
43
|
-
'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
|
|
44
43
|
'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
|
|
45
44
|
'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
46
45
|
'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -64,7 +63,6 @@ function LDAPProviderRequestToJSON(value) {
|
|
|
64
63
|
'authorization_flow': value.authorizationFlow,
|
|
65
64
|
'property_mappings': value.propertyMappings,
|
|
66
65
|
'base_dn': value.baseDn,
|
|
67
|
-
'search_group': value.searchGroup,
|
|
68
66
|
'certificate': value.certificate,
|
|
69
67
|
'tls_server_name': value.tlsServerName,
|
|
70
68
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
|
|
|
46
46
|
* @memberof PatchedLDAPProviderRequest
|
|
47
47
|
*/
|
|
48
48
|
baseDn?: string;
|
|
49
|
-
/**
|
|
50
|
-
* Users in this group can do search queries. If not set, every user can execute search queries.
|
|
51
|
-
* @type {string}
|
|
52
|
-
* @memberof PatchedLDAPProviderRequest
|
|
53
|
-
*/
|
|
54
|
-
searchGroup?: string | null;
|
|
55
49
|
/**
|
|
56
50
|
*
|
|
57
51
|
* @type {string}
|
|
@@ -38,7 +38,6 @@ function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
38
38
|
'authorizationFlow': !(0, runtime_1.exists)(json, 'authorization_flow') ? undefined : json['authorization_flow'],
|
|
39
39
|
'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
|
|
40
40
|
'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
|
|
41
|
-
'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
|
|
42
41
|
'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
|
|
43
42
|
'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
|
|
44
43
|
'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
|
|
@@ -62,7 +61,6 @@ function PatchedLDAPProviderRequestToJSON(value) {
|
|
|
62
61
|
'authorization_flow': value.authorizationFlow,
|
|
63
62
|
'property_mappings': value.propertyMappings,
|
|
64
63
|
'base_dn': value.baseDn,
|
|
65
|
-
'search_group': value.searchGroup,
|
|
66
64
|
'certificate': value.certificate,
|
|
67
65
|
'tls_server_name': value.tlsServerName,
|
|
68
66
|
'uid_start_number': value.uidStartNumber,
|
|
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
|
|
|
108
108
|
* @memberof PatchedSAMLProviderRequest
|
|
109
109
|
*/
|
|
110
110
|
verificationKp?: string | null;
|
|
111
|
+
/**
|
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
113
|
+
* @type {string}
|
|
114
|
+
* @memberof PatchedSAMLProviderRequest
|
|
115
|
+
*/
|
|
116
|
+
encryptionKp?: string | null;
|
|
117
|
+
/**
|
|
118
|
+
*
|
|
119
|
+
* @type {boolean}
|
|
120
|
+
* @memberof PatchedSAMLProviderRequest
|
|
121
|
+
*/
|
|
122
|
+
signAssertion?: boolean;
|
|
123
|
+
/**
|
|
124
|
+
*
|
|
125
|
+
* @type {boolean}
|
|
126
|
+
* @memberof PatchedSAMLProviderRequest
|
|
127
|
+
*/
|
|
128
|
+
signResponse?: boolean;
|
|
111
129
|
/**
|
|
112
130
|
*
|
|
113
131
|
* @type {SpBindingEnum}
|
|
@@ -50,6 +50,9 @@ function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
50
50
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
|
51
51
|
'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
52
52
|
'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
53
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
54
|
+
'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
55
|
+
'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
|
|
53
56
|
'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
|
|
54
57
|
'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
55
58
|
};
|
|
@@ -78,6 +81,9 @@ function PatchedSAMLProviderRequestToJSON(value) {
|
|
|
78
81
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
|
79
82
|
'signing_kp': value.signingKp,
|
|
80
83
|
'verification_kp': value.verificationKp,
|
|
84
|
+
'encryption_kp': value.encryptionKp,
|
|
85
|
+
'sign_assertion': value.signAssertion,
|
|
86
|
+
'sign_response': value.signResponse,
|
|
81
87
|
'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
|
|
82
88
|
'default_relay_state': value.defaultRelayState,
|
|
83
89
|
};
|
|
@@ -162,6 +162,24 @@ export interface SAMLProvider {
|
|
|
162
162
|
* @memberof SAMLProvider
|
|
163
163
|
*/
|
|
164
164
|
verificationKp?: string | null;
|
|
165
|
+
/**
|
|
166
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
167
|
+
* @type {string}
|
|
168
|
+
* @memberof SAMLProvider
|
|
169
|
+
*/
|
|
170
|
+
encryptionKp?: string | null;
|
|
171
|
+
/**
|
|
172
|
+
*
|
|
173
|
+
* @type {boolean}
|
|
174
|
+
* @memberof SAMLProvider
|
|
175
|
+
*/
|
|
176
|
+
signAssertion?: boolean;
|
|
177
|
+
/**
|
|
178
|
+
*
|
|
179
|
+
* @type {boolean}
|
|
180
|
+
* @memberof SAMLProvider
|
|
181
|
+
*/
|
|
182
|
+
signResponse?: boolean;
|
|
165
183
|
/**
|
|
166
184
|
*
|
|
167
185
|
* @type {SpBindingEnum}
|
|
@@ -77,6 +77,9 @@ function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
77
77
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
|
78
78
|
'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
79
79
|
'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
80
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
81
|
+
'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
82
|
+
'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
|
|
80
83
|
'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
|
|
81
84
|
'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
82
85
|
'urlDownloadMetadata': json['url_download_metadata'],
|
|
@@ -111,6 +114,9 @@ function SAMLProviderToJSON(value) {
|
|
|
111
114
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
|
112
115
|
'signing_kp': value.signingKp,
|
|
113
116
|
'verification_kp': value.verificationKp,
|
|
117
|
+
'encryption_kp': value.encryptionKp,
|
|
118
|
+
'sign_assertion': value.signAssertion,
|
|
119
|
+
'sign_response': value.signResponse,
|
|
114
120
|
'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
|
|
115
121
|
'default_relay_state': value.defaultRelayState,
|
|
116
122
|
};
|
|
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
|
|
|
108
108
|
* @memberof SAMLProviderRequest
|
|
109
109
|
*/
|
|
110
110
|
verificationKp?: string | null;
|
|
111
|
+
/**
|
|
112
|
+
* When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
|
|
113
|
+
* @type {string}
|
|
114
|
+
* @memberof SAMLProviderRequest
|
|
115
|
+
*/
|
|
116
|
+
encryptionKp?: string | null;
|
|
117
|
+
/**
|
|
118
|
+
*
|
|
119
|
+
* @type {boolean}
|
|
120
|
+
* @memberof SAMLProviderRequest
|
|
121
|
+
*/
|
|
122
|
+
signAssertion?: boolean;
|
|
123
|
+
/**
|
|
124
|
+
*
|
|
125
|
+
* @type {boolean}
|
|
126
|
+
* @memberof SAMLProviderRequest
|
|
127
|
+
*/
|
|
128
|
+
signResponse?: boolean;
|
|
111
129
|
/**
|
|
112
130
|
*
|
|
113
131
|
* @type {SpBindingEnum}
|
|
@@ -53,6 +53,9 @@ function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
|
53
53
|
'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
|
|
54
54
|
'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
|
|
55
55
|
'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
|
|
56
|
+
'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
|
|
57
|
+
'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
|
|
58
|
+
'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
|
|
56
59
|
'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
|
|
57
60
|
'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
|
|
58
61
|
};
|
|
@@ -81,6 +84,9 @@ function SAMLProviderRequestToJSON(value) {
|
|
|
81
84
|
'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
|
|
82
85
|
'signing_kp': value.signingKp,
|
|
83
86
|
'verification_kp': value.verificationKp,
|
|
87
|
+
'encryption_kp': value.encryptionKp,
|
|
88
|
+
'sign_assertion': value.signAssertion,
|
|
89
|
+
'sign_response': value.signResponse,
|
|
84
90
|
'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
|
|
85
91
|
'default_relay_state': value.defaultRelayState,
|
|
86
92
|
};
|
package/dist/models/index.d.ts
CHANGED
|
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
|
|
|
177
177
|
export * from './KubernetesServiceConnection';
|
|
178
178
|
export * from './KubernetesServiceConnectionRequest';
|
|
179
179
|
export * from './LDAPAPIAccessMode';
|
|
180
|
+
export * from './LDAPCheckAccess';
|
|
180
181
|
export * from './LDAPDebug';
|
|
181
182
|
export * from './LDAPOutpostConfig';
|
|
182
183
|
export * from './LDAPProvider';
|
package/dist/models/index.js
CHANGED
|
@@ -195,6 +195,7 @@ __exportStar(require("./IssuerModeEnum"), exports);
|
|
|
195
195
|
__exportStar(require("./KubernetesServiceConnection"), exports);
|
|
196
196
|
__exportStar(require("./KubernetesServiceConnectionRequest"), exports);
|
|
197
197
|
__exportStar(require("./LDAPAPIAccessMode"), exports);
|
|
198
|
+
__exportStar(require("./LDAPCheckAccess"), exports);
|
|
198
199
|
__exportStar(require("./LDAPDebug"), exports);
|
|
199
200
|
__exportStar(require("./LDAPOutpostConfig"), exports);
|
|
200
201
|
__exportStar(require("./LDAPProvider"), exports);
|
package/package.json
CHANGED
package/src/apis/OutpostsApi.ts
CHANGED
|
@@ -20,6 +20,7 @@ import type {
|
|
|
20
20
|
GenericError,
|
|
21
21
|
KubernetesServiceConnection,
|
|
22
22
|
KubernetesServiceConnectionRequest,
|
|
23
|
+
LDAPCheckAccess,
|
|
23
24
|
Outpost,
|
|
24
25
|
OutpostDefaultConfig,
|
|
25
26
|
OutpostHealth,
|
|
@@ -52,6 +53,8 @@ import {
|
|
|
52
53
|
KubernetesServiceConnectionToJSON,
|
|
53
54
|
KubernetesServiceConnectionRequestFromJSON,
|
|
54
55
|
KubernetesServiceConnectionRequestToJSON,
|
|
56
|
+
LDAPCheckAccessFromJSON,
|
|
57
|
+
LDAPCheckAccessToJSON,
|
|
55
58
|
OutpostFromJSON,
|
|
56
59
|
OutpostToJSON,
|
|
57
60
|
OutpostDefaultConfigFromJSON,
|
|
@@ -149,6 +152,11 @@ export interface OutpostsInstancesUsedByListRequest {
|
|
|
149
152
|
uuid: string;
|
|
150
153
|
}
|
|
151
154
|
|
|
155
|
+
export interface OutpostsLdapAccessCheckRequest {
|
|
156
|
+
id: number;
|
|
157
|
+
appSlug?: string;
|
|
158
|
+
}
|
|
159
|
+
|
|
152
160
|
export interface OutpostsLdapListRequest {
|
|
153
161
|
name?: string;
|
|
154
162
|
ordering?: string;
|
|
@@ -165,7 +173,7 @@ export interface OutpostsProxyListRequest {
|
|
|
165
173
|
search?: string;
|
|
166
174
|
}
|
|
167
175
|
|
|
168
|
-
export interface
|
|
176
|
+
export interface OutpostsRadiusAccessCheckRequest {
|
|
169
177
|
id: number;
|
|
170
178
|
appSlug?: string;
|
|
171
179
|
}
|
|
@@ -714,6 +722,48 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
714
722
|
return await response.value();
|
|
715
723
|
}
|
|
716
724
|
|
|
725
|
+
/**
|
|
726
|
+
* Check access to a single application by slug
|
|
727
|
+
*/
|
|
728
|
+
async outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>> {
|
|
729
|
+
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
730
|
+
throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
|
|
731
|
+
}
|
|
732
|
+
|
|
733
|
+
const queryParameters: any = {};
|
|
734
|
+
|
|
735
|
+
if (requestParameters.appSlug !== undefined) {
|
|
736
|
+
queryParameters['app_slug'] = requestParameters.appSlug;
|
|
737
|
+
}
|
|
738
|
+
|
|
739
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
740
|
+
|
|
741
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
742
|
+
const token = this.configuration.accessToken;
|
|
743
|
+
const tokenString = await token("authentik", []);
|
|
744
|
+
|
|
745
|
+
if (tokenString) {
|
|
746
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
747
|
+
}
|
|
748
|
+
}
|
|
749
|
+
const response = await this.request({
|
|
750
|
+
path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
|
|
751
|
+
method: 'GET',
|
|
752
|
+
headers: headerParameters,
|
|
753
|
+
query: queryParameters,
|
|
754
|
+
}, initOverrides);
|
|
755
|
+
|
|
756
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
|
|
757
|
+
}
|
|
758
|
+
|
|
759
|
+
/**
|
|
760
|
+
* Check access to a single application by slug
|
|
761
|
+
*/
|
|
762
|
+
async outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess> {
|
|
763
|
+
const response = await this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
|
|
764
|
+
return await response.value();
|
|
765
|
+
}
|
|
766
|
+
|
|
717
767
|
/**
|
|
718
768
|
* LDAPProvider Viewset
|
|
719
769
|
*/
|
|
@@ -825,9 +875,9 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
825
875
|
/**
|
|
826
876
|
* Check access to a single application by slug
|
|
827
877
|
*/
|
|
828
|
-
async
|
|
878
|
+
async outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>> {
|
|
829
879
|
if (requestParameters.id === null || requestParameters.id === undefined) {
|
|
830
|
-
throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling
|
|
880
|
+
throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
|
|
831
881
|
}
|
|
832
882
|
|
|
833
883
|
const queryParameters: any = {};
|
|
@@ -859,8 +909,8 @@ export class OutpostsApi extends runtime.BaseAPI {
|
|
|
859
909
|
/**
|
|
860
910
|
* Check access to a single application by slug
|
|
861
911
|
*/
|
|
862
|
-
async
|
|
863
|
-
const response = await this.
|
|
912
|
+
async outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess> {
|
|
913
|
+
const response = await this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
|
|
864
914
|
return await response.value();
|
|
865
915
|
}
|
|
866
916
|
|