@goauthentik/api 2024.6.3-1723497462 → 2024.6.3-1723921843

Sign up to get free protection for your applications and to get access to all the features.
Files changed (57) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/OutpostsApi.d.ts +16 -4
  3. package/dist/apis/OutpostsApi.js +42 -4
  4. package/dist/apis/ProvidersApi.d.ts +3 -2
  5. package/dist/apis/ProvidersApi.js +9 -6
  6. package/dist/esm/apis/OutpostsApi.d.ts +16 -4
  7. package/dist/esm/apis/OutpostsApi.js +43 -5
  8. package/dist/esm/apis/ProvidersApi.d.ts +3 -2
  9. package/dist/esm/apis/ProvidersApi.js +9 -6
  10. package/dist/esm/models/LDAPCheckAccess.d.ts +38 -0
  11. package/dist/esm/models/LDAPCheckAccess.js +47 -0
  12. package/dist/esm/models/LDAPOutpostConfig.d.ts +0 -6
  13. package/dist/esm/models/LDAPOutpostConfig.js +0 -2
  14. package/dist/esm/models/LDAPProvider.d.ts +0 -6
  15. package/dist/esm/models/LDAPProvider.js +0 -2
  16. package/dist/esm/models/LDAPProviderRequest.d.ts +0 -6
  17. package/dist/esm/models/LDAPProviderRequest.js +0 -2
  18. package/dist/esm/models/PatchedLDAPProviderRequest.d.ts +0 -6
  19. package/dist/esm/models/PatchedLDAPProviderRequest.js +0 -2
  20. package/dist/esm/models/PatchedSAMLProviderRequest.d.ts +18 -0
  21. package/dist/esm/models/PatchedSAMLProviderRequest.js +6 -0
  22. package/dist/esm/models/SAMLProvider.d.ts +18 -0
  23. package/dist/esm/models/SAMLProvider.js +6 -0
  24. package/dist/esm/models/SAMLProviderRequest.d.ts +18 -0
  25. package/dist/esm/models/SAMLProviderRequest.js +6 -0
  26. package/dist/esm/models/index.d.ts +1 -0
  27. package/dist/esm/models/index.js +1 -0
  28. package/dist/models/LDAPCheckAccess.d.ts +38 -0
  29. package/dist/models/LDAPCheckAccess.js +54 -0
  30. package/dist/models/LDAPOutpostConfig.d.ts +0 -6
  31. package/dist/models/LDAPOutpostConfig.js +0 -2
  32. package/dist/models/LDAPProvider.d.ts +0 -6
  33. package/dist/models/LDAPProvider.js +0 -2
  34. package/dist/models/LDAPProviderRequest.d.ts +0 -6
  35. package/dist/models/LDAPProviderRequest.js +0 -2
  36. package/dist/models/PatchedLDAPProviderRequest.d.ts +0 -6
  37. package/dist/models/PatchedLDAPProviderRequest.js +0 -2
  38. package/dist/models/PatchedSAMLProviderRequest.d.ts +18 -0
  39. package/dist/models/PatchedSAMLProviderRequest.js +6 -0
  40. package/dist/models/SAMLProvider.d.ts +18 -0
  41. package/dist/models/SAMLProvider.js +6 -0
  42. package/dist/models/SAMLProviderRequest.d.ts +18 -0
  43. package/dist/models/SAMLProviderRequest.js +6 -0
  44. package/dist/models/index.d.ts +1 -0
  45. package/dist/models/index.js +1 -0
  46. package/package.json +1 -1
  47. package/src/apis/OutpostsApi.ts +55 -5
  48. package/src/apis/ProvidersApi.ts +15 -10
  49. package/src/models/LDAPCheckAccess.ts +81 -0
  50. package/src/models/LDAPOutpostConfig.ts +0 -8
  51. package/src/models/LDAPProvider.ts +0 -8
  52. package/src/models/LDAPProviderRequest.ts +0 -8
  53. package/src/models/PatchedLDAPProviderRequest.ts +0 -8
  54. package/src/models/PatchedSAMLProviderRequest.ts +24 -0
  55. package/src/models/SAMLProvider.ts +24 -0
  56. package/src/models/SAMLProviderRequest.ts +24 -0
  57. package/src/models/index.ts +1 -0
@@ -45,6 +45,9 @@ export function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminato
45
45
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
46
46
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
47
47
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
48
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
49
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
50
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
48
51
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
49
52
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
50
53
  };
@@ -72,6 +75,9 @@ export function PatchedSAMLProviderRequestToJSON(value) {
72
75
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
73
76
  'signing_kp': value.signingKp,
74
77
  'verification_kp': value.verificationKp,
78
+ 'encryption_kp': value.encryptionKp,
79
+ 'sign_assertion': value.signAssertion,
80
+ 'sign_response': value.signResponse,
75
81
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
76
82
  'default_relay_state': value.defaultRelayState,
77
83
  };
@@ -162,6 +162,24 @@ export interface SAMLProvider {
162
162
  * @memberof SAMLProvider
163
163
  */
164
164
  verificationKp?: string | null;
165
+ /**
166
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
167
+ * @type {string}
168
+ * @memberof SAMLProvider
169
+ */
170
+ encryptionKp?: string | null;
171
+ /**
172
+ *
173
+ * @type {boolean}
174
+ * @memberof SAMLProvider
175
+ */
176
+ signAssertion?: boolean;
177
+ /**
178
+ *
179
+ * @type {boolean}
180
+ * @memberof SAMLProvider
181
+ */
182
+ signResponse?: boolean;
165
183
  /**
166
184
  *
167
185
  * @type {SpBindingEnum}
@@ -72,6 +72,9 @@ export function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
72
72
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
73
73
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
74
74
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
75
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
76
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
77
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
75
78
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
76
79
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
77
80
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -105,6 +108,9 @@ export function SAMLProviderToJSON(value) {
105
108
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
106
109
  'signing_kp': value.signingKp,
107
110
  'verification_kp': value.verificationKp,
111
+ 'encryption_kp': value.encryptionKp,
112
+ 'sign_assertion': value.signAssertion,
113
+ 'sign_response': value.signResponse,
108
114
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
109
115
  'default_relay_state': value.defaultRelayState,
110
116
  };
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
108
108
  * @memberof SAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof SAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof SAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof SAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -48,6 +48,9 @@ export function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
48
48
  'signatureAlgorithm': !exists(json, 'signature_algorithm') ? undefined : SignatureAlgorithmEnumFromJSON(json['signature_algorithm']),
49
49
  'signingKp': !exists(json, 'signing_kp') ? undefined : json['signing_kp'],
50
50
  'verificationKp': !exists(json, 'verification_kp') ? undefined : json['verification_kp'],
51
+ 'encryptionKp': !exists(json, 'encryption_kp') ? undefined : json['encryption_kp'],
52
+ 'signAssertion': !exists(json, 'sign_assertion') ? undefined : json['sign_assertion'],
53
+ 'signResponse': !exists(json, 'sign_response') ? undefined : json['sign_response'],
51
54
  'spBinding': !exists(json, 'sp_binding') ? undefined : SpBindingEnumFromJSON(json['sp_binding']),
52
55
  'defaultRelayState': !exists(json, 'default_relay_state') ? undefined : json['default_relay_state'],
53
56
  };
@@ -75,6 +78,9 @@ export function SAMLProviderRequestToJSON(value) {
75
78
  'signature_algorithm': SignatureAlgorithmEnumToJSON(value.signatureAlgorithm),
76
79
  'signing_kp': value.signingKp,
77
80
  'verification_kp': value.verificationKp,
81
+ 'encryption_kp': value.encryptionKp,
82
+ 'sign_assertion': value.signAssertion,
83
+ 'sign_response': value.signResponse,
78
84
  'sp_binding': SpBindingEnumToJSON(value.spBinding),
79
85
  'default_relay_state': value.defaultRelayState,
80
86
  };
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
177
177
  export * from './KubernetesServiceConnection';
178
178
  export * from './KubernetesServiceConnectionRequest';
179
179
  export * from './LDAPAPIAccessMode';
180
+ export * from './LDAPCheckAccess';
180
181
  export * from './LDAPDebug';
181
182
  export * from './LDAPOutpostConfig';
182
183
  export * from './LDAPProvider';
@@ -179,6 +179,7 @@ export * from './IssuerModeEnum';
179
179
  export * from './KubernetesServiceConnection';
180
180
  export * from './KubernetesServiceConnectionRequest';
181
181
  export * from './LDAPAPIAccessMode';
182
+ export * from './LDAPCheckAccess';
182
183
  export * from './LDAPDebug';
183
184
  export * from './LDAPOutpostConfig';
184
185
  export * from './LDAPProvider';
@@ -0,0 +1,38 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.6.3
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { PolicyTestResult } from './PolicyTestResult';
13
+ /**
14
+ * Base serializer class which doesn't implement create/update methods
15
+ * @export
16
+ * @interface LDAPCheckAccess
17
+ */
18
+ export interface LDAPCheckAccess {
19
+ /**
20
+ *
21
+ * @type {boolean}
22
+ * @memberof LDAPCheckAccess
23
+ */
24
+ hasSearchPermission?: boolean;
25
+ /**
26
+ *
27
+ * @type {PolicyTestResult}
28
+ * @memberof LDAPCheckAccess
29
+ */
30
+ access: PolicyTestResult;
31
+ }
32
+ /**
33
+ * Check if a given object implements the LDAPCheckAccess interface.
34
+ */
35
+ export declare function instanceOfLDAPCheckAccess(value: object): boolean;
36
+ export declare function LDAPCheckAccessFromJSON(json: any): LDAPCheckAccess;
37
+ export declare function LDAPCheckAccessFromJSONTyped(json: any, ignoreDiscriminator: boolean): LDAPCheckAccess;
38
+ export declare function LDAPCheckAccessToJSON(value?: LDAPCheckAccess | null): any;
@@ -0,0 +1,54 @@
1
+ "use strict";
2
+ /* tslint:disable */
3
+ /* eslint-disable */
4
+ /**
5
+ * authentik
6
+ * Making authentication simple.
7
+ *
8
+ * The version of the OpenAPI document: 2024.6.3
9
+ * Contact: hello@goauthentik.io
10
+ *
11
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
12
+ * https://openapi-generator.tech
13
+ * Do not edit the class manually.
14
+ */
15
+ Object.defineProperty(exports, "__esModule", { value: true });
16
+ exports.LDAPCheckAccessToJSON = exports.LDAPCheckAccessFromJSONTyped = exports.LDAPCheckAccessFromJSON = exports.instanceOfLDAPCheckAccess = void 0;
17
+ const runtime_1 = require("../runtime");
18
+ const PolicyTestResult_1 = require("./PolicyTestResult");
19
+ /**
20
+ * Check if a given object implements the LDAPCheckAccess interface.
21
+ */
22
+ function instanceOfLDAPCheckAccess(value) {
23
+ let isInstance = true;
24
+ isInstance = isInstance && "access" in value;
25
+ return isInstance;
26
+ }
27
+ exports.instanceOfLDAPCheckAccess = instanceOfLDAPCheckAccess;
28
+ function LDAPCheckAccessFromJSON(json) {
29
+ return LDAPCheckAccessFromJSONTyped(json, false);
30
+ }
31
+ exports.LDAPCheckAccessFromJSON = LDAPCheckAccessFromJSON;
32
+ function LDAPCheckAccessFromJSONTyped(json, ignoreDiscriminator) {
33
+ if ((json === undefined) || (json === null)) {
34
+ return json;
35
+ }
36
+ return {
37
+ 'hasSearchPermission': !(0, runtime_1.exists)(json, 'has_search_permission') ? undefined : json['has_search_permission'],
38
+ 'access': (0, PolicyTestResult_1.PolicyTestResultFromJSON)(json['access']),
39
+ };
40
+ }
41
+ exports.LDAPCheckAccessFromJSONTyped = LDAPCheckAccessFromJSONTyped;
42
+ function LDAPCheckAccessToJSON(value) {
43
+ if (value === undefined) {
44
+ return undefined;
45
+ }
46
+ if (value === null) {
47
+ return null;
48
+ }
49
+ return {
50
+ 'has_search_permission': value.hasSearchPermission,
51
+ 'access': (0, PolicyTestResult_1.PolicyTestResultToJSON)(value.access),
52
+ };
53
+ }
54
+ exports.LDAPCheckAccessToJSON = LDAPCheckAccessToJSON;
@@ -46,12 +46,6 @@ export interface LDAPOutpostConfig {
46
46
  * @memberof LDAPOutpostConfig
47
47
  */
48
48
  readonly applicationSlug: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPOutpostConfig
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -42,7 +42,6 @@ function LDAPOutpostConfigFromJSONTyped(json, ignoreDiscriminator) {
42
42
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
43
43
  'bindFlowSlug': json['bind_flow_slug'],
44
44
  'applicationSlug': json['application_slug'],
45
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
46
45
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
47
46
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
48
47
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -64,7 +63,6 @@ function LDAPOutpostConfigToJSON(value) {
64
63
  'name': value.name,
65
64
  'base_dn': value.baseDn,
66
65
  'bind_flow_slug': value.bindFlowSlug,
67
- 'search_group': value.searchGroup,
68
66
  'certificate': value.certificate,
69
67
  'tls_server_name': value.tlsServerName,
70
68
  'uid_start_number': value.uidStartNumber,
@@ -100,12 +100,6 @@ export interface LDAPProvider {
100
100
  * @memberof LDAPProvider
101
101
  */
102
102
  baseDn?: string;
103
- /**
104
- * Users in this group can do search queries. If not set, every user can execute search queries.
105
- * @type {string}
106
- * @memberof LDAPProvider
107
- */
108
- searchGroup?: string | null;
109
103
  /**
110
104
  *
111
105
  * @type {string}
@@ -59,7 +59,6 @@ function LDAPProviderFromJSONTyped(json, ignoreDiscriminator) {
59
59
  'verboseNamePlural': json['verbose_name_plural'],
60
60
  'metaModelName': json['meta_model_name'],
61
61
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
62
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
63
62
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
64
63
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
65
64
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -84,7 +83,6 @@ function LDAPProviderToJSON(value) {
84
83
  'authorization_flow': value.authorizationFlow,
85
84
  'property_mappings': value.propertyMappings,
86
85
  'base_dn': value.baseDn,
87
- 'search_group': value.searchGroup,
88
86
  'certificate': value.certificate,
89
87
  'tls_server_name': value.tlsServerName,
90
88
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface LDAPProviderRequest {
46
46
  * @memberof LDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof LDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -40,7 +40,6 @@ function LDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
40
40
  'authorizationFlow': json['authorization_flow'],
41
41
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
42
42
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
43
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
44
43
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
45
44
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
46
45
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -64,7 +63,6 @@ function LDAPProviderRequestToJSON(value) {
64
63
  'authorization_flow': value.authorizationFlow,
65
64
  'property_mappings': value.propertyMappings,
66
65
  'base_dn': value.baseDn,
67
- 'search_group': value.searchGroup,
68
66
  'certificate': value.certificate,
69
67
  'tls_server_name': value.tlsServerName,
70
68
  'uid_start_number': value.uidStartNumber,
@@ -46,12 +46,6 @@ export interface PatchedLDAPProviderRequest {
46
46
  * @memberof PatchedLDAPProviderRequest
47
47
  */
48
48
  baseDn?: string;
49
- /**
50
- * Users in this group can do search queries. If not set, every user can execute search queries.
51
- * @type {string}
52
- * @memberof PatchedLDAPProviderRequest
53
- */
54
- searchGroup?: string | null;
55
49
  /**
56
50
  *
57
51
  * @type {string}
@@ -38,7 +38,6 @@ function PatchedLDAPProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
38
38
  'authorizationFlow': !(0, runtime_1.exists)(json, 'authorization_flow') ? undefined : json['authorization_flow'],
39
39
  'propertyMappings': !(0, runtime_1.exists)(json, 'property_mappings') ? undefined : json['property_mappings'],
40
40
  'baseDn': !(0, runtime_1.exists)(json, 'base_dn') ? undefined : json['base_dn'],
41
- 'searchGroup': !(0, runtime_1.exists)(json, 'search_group') ? undefined : json['search_group'],
42
41
  'certificate': !(0, runtime_1.exists)(json, 'certificate') ? undefined : json['certificate'],
43
42
  'tlsServerName': !(0, runtime_1.exists)(json, 'tls_server_name') ? undefined : json['tls_server_name'],
44
43
  'uidStartNumber': !(0, runtime_1.exists)(json, 'uid_start_number') ? undefined : json['uid_start_number'],
@@ -62,7 +61,6 @@ function PatchedLDAPProviderRequestToJSON(value) {
62
61
  'authorization_flow': value.authorizationFlow,
63
62
  'property_mappings': value.propertyMappings,
64
63
  'base_dn': value.baseDn,
65
- 'search_group': value.searchGroup,
66
64
  'certificate': value.certificate,
67
65
  'tls_server_name': value.tlsServerName,
68
66
  'uid_start_number': value.uidStartNumber,
@@ -108,6 +108,24 @@ export interface PatchedSAMLProviderRequest {
108
108
  * @memberof PatchedSAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof PatchedSAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof PatchedSAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof PatchedSAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -50,6 +50,9 @@ function PatchedSAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
50
50
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
51
51
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
52
52
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
53
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
54
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
55
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
53
56
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
54
57
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
55
58
  };
@@ -78,6 +81,9 @@ function PatchedSAMLProviderRequestToJSON(value) {
78
81
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
79
82
  'signing_kp': value.signingKp,
80
83
  'verification_kp': value.verificationKp,
84
+ 'encryption_kp': value.encryptionKp,
85
+ 'sign_assertion': value.signAssertion,
86
+ 'sign_response': value.signResponse,
81
87
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
82
88
  'default_relay_state': value.defaultRelayState,
83
89
  };
@@ -162,6 +162,24 @@ export interface SAMLProvider {
162
162
  * @memberof SAMLProvider
163
163
  */
164
164
  verificationKp?: string | null;
165
+ /**
166
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
167
+ * @type {string}
168
+ * @memberof SAMLProvider
169
+ */
170
+ encryptionKp?: string | null;
171
+ /**
172
+ *
173
+ * @type {boolean}
174
+ * @memberof SAMLProvider
175
+ */
176
+ signAssertion?: boolean;
177
+ /**
178
+ *
179
+ * @type {boolean}
180
+ * @memberof SAMLProvider
181
+ */
182
+ signResponse?: boolean;
165
183
  /**
166
184
  *
167
185
  * @type {SpBindingEnum}
@@ -77,6 +77,9 @@ function SAMLProviderFromJSONTyped(json, ignoreDiscriminator) {
77
77
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
78
78
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
79
79
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
80
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
81
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
82
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
80
83
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
81
84
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
82
85
  'urlDownloadMetadata': json['url_download_metadata'],
@@ -111,6 +114,9 @@ function SAMLProviderToJSON(value) {
111
114
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
112
115
  'signing_kp': value.signingKp,
113
116
  'verification_kp': value.verificationKp,
117
+ 'encryption_kp': value.encryptionKp,
118
+ 'sign_assertion': value.signAssertion,
119
+ 'sign_response': value.signResponse,
114
120
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
115
121
  'default_relay_state': value.defaultRelayState,
116
122
  };
@@ -108,6 +108,24 @@ export interface SAMLProviderRequest {
108
108
  * @memberof SAMLProviderRequest
109
109
  */
110
110
  verificationKp?: string | null;
111
+ /**
112
+ * When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.
113
+ * @type {string}
114
+ * @memberof SAMLProviderRequest
115
+ */
116
+ encryptionKp?: string | null;
117
+ /**
118
+ *
119
+ * @type {boolean}
120
+ * @memberof SAMLProviderRequest
121
+ */
122
+ signAssertion?: boolean;
123
+ /**
124
+ *
125
+ * @type {boolean}
126
+ * @memberof SAMLProviderRequest
127
+ */
128
+ signResponse?: boolean;
111
129
  /**
112
130
  *
113
131
  * @type {SpBindingEnum}
@@ -53,6 +53,9 @@ function SAMLProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
53
53
  'signatureAlgorithm': !(0, runtime_1.exists)(json, 'signature_algorithm') ? undefined : (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumFromJSON)(json['signature_algorithm']),
54
54
  'signingKp': !(0, runtime_1.exists)(json, 'signing_kp') ? undefined : json['signing_kp'],
55
55
  'verificationKp': !(0, runtime_1.exists)(json, 'verification_kp') ? undefined : json['verification_kp'],
56
+ 'encryptionKp': !(0, runtime_1.exists)(json, 'encryption_kp') ? undefined : json['encryption_kp'],
57
+ 'signAssertion': !(0, runtime_1.exists)(json, 'sign_assertion') ? undefined : json['sign_assertion'],
58
+ 'signResponse': !(0, runtime_1.exists)(json, 'sign_response') ? undefined : json['sign_response'],
56
59
  'spBinding': !(0, runtime_1.exists)(json, 'sp_binding') ? undefined : (0, SpBindingEnum_1.SpBindingEnumFromJSON)(json['sp_binding']),
57
60
  'defaultRelayState': !(0, runtime_1.exists)(json, 'default_relay_state') ? undefined : json['default_relay_state'],
58
61
  };
@@ -81,6 +84,9 @@ function SAMLProviderRequestToJSON(value) {
81
84
  'signature_algorithm': (0, SignatureAlgorithmEnum_1.SignatureAlgorithmEnumToJSON)(value.signatureAlgorithm),
82
85
  'signing_kp': value.signingKp,
83
86
  'verification_kp': value.verificationKp,
87
+ 'encryption_kp': value.encryptionKp,
88
+ 'sign_assertion': value.signAssertion,
89
+ 'sign_response': value.signResponse,
84
90
  'sp_binding': (0, SpBindingEnum_1.SpBindingEnumToJSON)(value.spBinding),
85
91
  'default_relay_state': value.defaultRelayState,
86
92
  };
@@ -177,6 +177,7 @@ export * from './IssuerModeEnum';
177
177
  export * from './KubernetesServiceConnection';
178
178
  export * from './KubernetesServiceConnectionRequest';
179
179
  export * from './LDAPAPIAccessMode';
180
+ export * from './LDAPCheckAccess';
180
181
  export * from './LDAPDebug';
181
182
  export * from './LDAPOutpostConfig';
182
183
  export * from './LDAPProvider';
@@ -195,6 +195,7 @@ __exportStar(require("./IssuerModeEnum"), exports);
195
195
  __exportStar(require("./KubernetesServiceConnection"), exports);
196
196
  __exportStar(require("./KubernetesServiceConnectionRequest"), exports);
197
197
  __exportStar(require("./LDAPAPIAccessMode"), exports);
198
+ __exportStar(require("./LDAPCheckAccess"), exports);
198
199
  __exportStar(require("./LDAPDebug"), exports);
199
200
  __exportStar(require("./LDAPOutpostConfig"), exports);
200
201
  __exportStar(require("./LDAPProvider"), exports);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.6.3-1723497462",
3
+ "version": "2024.6.3-1723921843",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -20,6 +20,7 @@ import type {
20
20
  GenericError,
21
21
  KubernetesServiceConnection,
22
22
  KubernetesServiceConnectionRequest,
23
+ LDAPCheckAccess,
23
24
  Outpost,
24
25
  OutpostDefaultConfig,
25
26
  OutpostHealth,
@@ -52,6 +53,8 @@ import {
52
53
  KubernetesServiceConnectionToJSON,
53
54
  KubernetesServiceConnectionRequestFromJSON,
54
55
  KubernetesServiceConnectionRequestToJSON,
56
+ LDAPCheckAccessFromJSON,
57
+ LDAPCheckAccessToJSON,
55
58
  OutpostFromJSON,
56
59
  OutpostToJSON,
57
60
  OutpostDefaultConfigFromJSON,
@@ -149,6 +152,11 @@ export interface OutpostsInstancesUsedByListRequest {
149
152
  uuid: string;
150
153
  }
151
154
 
155
+ export interface OutpostsLdapAccessCheckRequest {
156
+ id: number;
157
+ appSlug?: string;
158
+ }
159
+
152
160
  export interface OutpostsLdapListRequest {
153
161
  name?: string;
154
162
  ordering?: string;
@@ -165,7 +173,7 @@ export interface OutpostsProxyListRequest {
165
173
  search?: string;
166
174
  }
167
175
 
168
- export interface OutpostsRadiusCheckAccessRetrieveRequest {
176
+ export interface OutpostsRadiusAccessCheckRequest {
169
177
  id: number;
170
178
  appSlug?: string;
171
179
  }
@@ -714,6 +722,48 @@ export class OutpostsApi extends runtime.BaseAPI {
714
722
  return await response.value();
715
723
  }
716
724
 
725
+ /**
726
+ * Check access to a single application by slug
727
+ */
728
+ async outpostsLdapAccessCheckRaw(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<LDAPCheckAccess>> {
729
+ if (requestParameters.id === null || requestParameters.id === undefined) {
730
+ throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsLdapAccessCheck.');
731
+ }
732
+
733
+ const queryParameters: any = {};
734
+
735
+ if (requestParameters.appSlug !== undefined) {
736
+ queryParameters['app_slug'] = requestParameters.appSlug;
737
+ }
738
+
739
+ const headerParameters: runtime.HTTPHeaders = {};
740
+
741
+ if (this.configuration && this.configuration.accessToken) {
742
+ const token = this.configuration.accessToken;
743
+ const tokenString = await token("authentik", []);
744
+
745
+ if (tokenString) {
746
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
747
+ }
748
+ }
749
+ const response = await this.request({
750
+ path: `/outposts/ldap/{id}/check_access/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
751
+ method: 'GET',
752
+ headers: headerParameters,
753
+ query: queryParameters,
754
+ }, initOverrides);
755
+
756
+ return new runtime.JSONApiResponse(response, (jsonValue) => LDAPCheckAccessFromJSON(jsonValue));
757
+ }
758
+
759
+ /**
760
+ * Check access to a single application by slug
761
+ */
762
+ async outpostsLdapAccessCheck(requestParameters: OutpostsLdapAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<LDAPCheckAccess> {
763
+ const response = await this.outpostsLdapAccessCheckRaw(requestParameters, initOverrides);
764
+ return await response.value();
765
+ }
766
+
717
767
  /**
718
768
  * LDAPProvider Viewset
719
769
  */
@@ -825,9 +875,9 @@ export class OutpostsApi extends runtime.BaseAPI {
825
875
  /**
826
876
  * Check access to a single application by slug
827
877
  */
828
- async outpostsRadiusCheckAccessRetrieveRaw(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>> {
878
+ async outpostsRadiusAccessCheckRaw(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<RadiusCheckAccess>> {
829
879
  if (requestParameters.id === null || requestParameters.id === undefined) {
830
- throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsRadiusCheckAccessRetrieve.');
880
+ throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling outpostsRadiusAccessCheck.');
831
881
  }
832
882
 
833
883
  const queryParameters: any = {};
@@ -859,8 +909,8 @@ export class OutpostsApi extends runtime.BaseAPI {
859
909
  /**
860
910
  * Check access to a single application by slug
861
911
  */
862
- async outpostsRadiusCheckAccessRetrieve(requestParameters: OutpostsRadiusCheckAccessRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess> {
863
- const response = await this.outpostsRadiusCheckAccessRetrieveRaw(requestParameters, initOverrides);
912
+ async outpostsRadiusAccessCheck(requestParameters: OutpostsRadiusAccessCheckRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<RadiusCheckAccess> {
913
+ const response = await this.outpostsRadiusAccessCheckRaw(requestParameters, initOverrides);
864
914
  return await response.value();
865
915
  }
866
916