@goauthentik/api 2024.8.3-1728939481 → 2024.8.3-1729167001

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (32) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/dist/apis/AdminApi.d.ts +26 -1
  3. package/dist/apis/AdminApi.js +79 -0
  4. package/dist/esm/apis/AdminApi.d.ts +26 -1
  5. package/dist/esm/apis/AdminApi.js +80 -1
  6. package/dist/esm/models/OAuth2Provider.d.ts +7 -1
  7. package/dist/esm/models/OAuth2Provider.js +2 -0
  8. package/dist/esm/models/OAuth2ProviderRequest.d.ts +7 -1
  9. package/dist/esm/models/OAuth2ProviderRequest.js +2 -0
  10. package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
  11. package/dist/esm/models/PatchedOAuth2ProviderRequest.js +2 -0
  12. package/dist/esm/models/VersionHistory.d.ts +49 -0
  13. package/dist/esm/models/VersionHistory.js +51 -0
  14. package/dist/esm/models/index.d.ts +1 -0
  15. package/dist/esm/models/index.js +1 -0
  16. package/dist/models/OAuth2Provider.d.ts +7 -1
  17. package/dist/models/OAuth2Provider.js +2 -0
  18. package/dist/models/OAuth2ProviderRequest.d.ts +7 -1
  19. package/dist/models/OAuth2ProviderRequest.js +2 -0
  20. package/dist/models/PatchedOAuth2ProviderRequest.d.ts +7 -1
  21. package/dist/models/PatchedOAuth2ProviderRequest.js +2 -0
  22. package/dist/models/VersionHistory.d.ts +49 -0
  23. package/dist/models/VersionHistory.js +58 -0
  24. package/dist/models/index.d.ts +1 -0
  25. package/dist/models/index.js +1 -0
  26. package/package.json +1 -1
  27. package/src/apis/AdminApi.ts +102 -0
  28. package/src/models/OAuth2Provider.ts +9 -1
  29. package/src/models/OAuth2ProviderRequest.ts +9 -1
  30. package/src/models/PatchedOAuth2ProviderRequest.ts +9 -1
  31. package/src/models/VersionHistory.ts +92 -0
  32. package/src/models/index.ts +1 -0
@@ -666,6 +666,7 @@ src/models/UserWriteStage.ts
666
666
  src/models/UserWriteStageRequest.ts
667
667
  src/models/ValidationError.ts
668
668
  src/models/Version.ts
669
+ src/models/VersionHistory.ts
669
670
  src/models/WebAuthnDevice.ts
670
671
  src/models/WebAuthnDeviceRequest.ts
671
672
  src/models/WebAuthnDeviceType.ts
@@ -10,13 +10,22 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import type { App, LoginMetrics, PatchedSettingsRequest, Settings, SettingsRequest, SystemInfo, Version, Workers } from '../models';
13
+ import type { App, LoginMetrics, PatchedSettingsRequest, Settings, SettingsRequest, SystemInfo, Version, VersionHistory, Workers } from '../models';
14
14
  export interface AdminSettingsPartialUpdateRequest {
15
15
  patchedSettingsRequest?: PatchedSettingsRequest;
16
16
  }
17
17
  export interface AdminSettingsUpdateRequest {
18
18
  settingsRequest?: SettingsRequest;
19
19
  }
20
+ export interface AdminVersionHistoryListRequest {
21
+ build?: string;
22
+ ordering?: string;
23
+ search?: string;
24
+ version?: string;
25
+ }
26
+ export interface AdminVersionHistoryRetrieveRequest {
27
+ id: number;
28
+ }
20
29
  /**
21
30
  *
22
31
  */
@@ -85,6 +94,22 @@ export declare class AdminApi extends runtime.BaseAPI {
85
94
  * Get system information.
86
95
  */
87
96
  adminSystemRetrieve(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<SystemInfo>;
97
+ /**
98
+ * VersionHistory Viewset
99
+ */
100
+ adminVersionHistoryListRaw(requestParameters: AdminVersionHistoryListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<VersionHistory>>>;
101
+ /**
102
+ * VersionHistory Viewset
103
+ */
104
+ adminVersionHistoryList(requestParameters?: AdminVersionHistoryListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<VersionHistory>>;
105
+ /**
106
+ * VersionHistory Viewset
107
+ */
108
+ adminVersionHistoryRetrieveRaw(requestParameters: AdminVersionHistoryRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<VersionHistory>>;
109
+ /**
110
+ * VersionHistory Viewset
111
+ */
112
+ adminVersionHistoryRetrieve(requestParameters: AdminVersionHistoryRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<VersionHistory>;
88
113
  /**
89
114
  * Get running and latest version.
90
115
  */
@@ -289,6 +289,85 @@ class AdminApi extends runtime.BaseAPI {
289
289
  return yield response.value();
290
290
  });
291
291
  }
292
+ /**
293
+ * VersionHistory Viewset
294
+ */
295
+ adminVersionHistoryListRaw(requestParameters, initOverrides) {
296
+ return __awaiter(this, void 0, void 0, function* () {
297
+ const queryParameters = {};
298
+ if (requestParameters.build !== undefined) {
299
+ queryParameters['build'] = requestParameters.build;
300
+ }
301
+ if (requestParameters.ordering !== undefined) {
302
+ queryParameters['ordering'] = requestParameters.ordering;
303
+ }
304
+ if (requestParameters.search !== undefined) {
305
+ queryParameters['search'] = requestParameters.search;
306
+ }
307
+ if (requestParameters.version !== undefined) {
308
+ queryParameters['version'] = requestParameters.version;
309
+ }
310
+ const headerParameters = {};
311
+ if (this.configuration && this.configuration.accessToken) {
312
+ const token = this.configuration.accessToken;
313
+ const tokenString = yield token("authentik", []);
314
+ if (tokenString) {
315
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
316
+ }
317
+ }
318
+ const response = yield this.request({
319
+ path: `/admin/version/history/`,
320
+ method: 'GET',
321
+ headers: headerParameters,
322
+ query: queryParameters,
323
+ }, initOverrides);
324
+ return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(models_1.VersionHistoryFromJSON));
325
+ });
326
+ }
327
+ /**
328
+ * VersionHistory Viewset
329
+ */
330
+ adminVersionHistoryList(requestParameters = {}, initOverrides) {
331
+ return __awaiter(this, void 0, void 0, function* () {
332
+ const response = yield this.adminVersionHistoryListRaw(requestParameters, initOverrides);
333
+ return yield response.value();
334
+ });
335
+ }
336
+ /**
337
+ * VersionHistory Viewset
338
+ */
339
+ adminVersionHistoryRetrieveRaw(requestParameters, initOverrides) {
340
+ return __awaiter(this, void 0, void 0, function* () {
341
+ if (requestParameters.id === null || requestParameters.id === undefined) {
342
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling adminVersionHistoryRetrieve.');
343
+ }
344
+ const queryParameters = {};
345
+ const headerParameters = {};
346
+ if (this.configuration && this.configuration.accessToken) {
347
+ const token = this.configuration.accessToken;
348
+ const tokenString = yield token("authentik", []);
349
+ if (tokenString) {
350
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
351
+ }
352
+ }
353
+ const response = yield this.request({
354
+ path: `/admin/version/history/{id}/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
355
+ method: 'GET',
356
+ headers: headerParameters,
357
+ query: queryParameters,
358
+ }, initOverrides);
359
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.VersionHistoryFromJSON)(jsonValue));
360
+ });
361
+ }
362
+ /**
363
+ * VersionHistory Viewset
364
+ */
365
+ adminVersionHistoryRetrieve(requestParameters, initOverrides) {
366
+ return __awaiter(this, void 0, void 0, function* () {
367
+ const response = yield this.adminVersionHistoryRetrieveRaw(requestParameters, initOverrides);
368
+ return yield response.value();
369
+ });
370
+ }
292
371
  /**
293
372
  * Get running and latest version.
294
373
  */
@@ -10,13 +10,22 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import type { App, LoginMetrics, PatchedSettingsRequest, Settings, SettingsRequest, SystemInfo, Version, Workers } from '../models';
13
+ import type { App, LoginMetrics, PatchedSettingsRequest, Settings, SettingsRequest, SystemInfo, Version, VersionHistory, Workers } from '../models';
14
14
  export interface AdminSettingsPartialUpdateRequest {
15
15
  patchedSettingsRequest?: PatchedSettingsRequest;
16
16
  }
17
17
  export interface AdminSettingsUpdateRequest {
18
18
  settingsRequest?: SettingsRequest;
19
19
  }
20
+ export interface AdminVersionHistoryListRequest {
21
+ build?: string;
22
+ ordering?: string;
23
+ search?: string;
24
+ version?: string;
25
+ }
26
+ export interface AdminVersionHistoryRetrieveRequest {
27
+ id: number;
28
+ }
20
29
  /**
21
30
  *
22
31
  */
@@ -85,6 +94,22 @@ export declare class AdminApi extends runtime.BaseAPI {
85
94
  * Get system information.
86
95
  */
87
96
  adminSystemRetrieve(initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<SystemInfo>;
97
+ /**
98
+ * VersionHistory Viewset
99
+ */
100
+ adminVersionHistoryListRaw(requestParameters: AdminVersionHistoryListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<VersionHistory>>>;
101
+ /**
102
+ * VersionHistory Viewset
103
+ */
104
+ adminVersionHistoryList(requestParameters?: AdminVersionHistoryListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<VersionHistory>>;
105
+ /**
106
+ * VersionHistory Viewset
107
+ */
108
+ adminVersionHistoryRetrieveRaw(requestParameters: AdminVersionHistoryRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<VersionHistory>>;
109
+ /**
110
+ * VersionHistory Viewset
111
+ */
112
+ adminVersionHistoryRetrieve(requestParameters: AdminVersionHistoryRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<VersionHistory>;
88
113
  /**
89
114
  * Get running and latest version.
90
115
  */
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
21
21
  });
22
22
  };
23
23
  import * as runtime from '../runtime';
24
- import { AppFromJSON, LoginMetricsFromJSON, PatchedSettingsRequestToJSON, SettingsFromJSON, SettingsRequestToJSON, SystemInfoFromJSON, VersionFromJSON, WorkersFromJSON, } from '../models';
24
+ import { AppFromJSON, LoginMetricsFromJSON, PatchedSettingsRequestToJSON, SettingsFromJSON, SettingsRequestToJSON, SystemInfoFromJSON, VersionFromJSON, VersionHistoryFromJSON, WorkersFromJSON, } from '../models';
25
25
  /**
26
26
  *
27
27
  */
@@ -286,6 +286,85 @@ export class AdminApi extends runtime.BaseAPI {
286
286
  return yield response.value();
287
287
  });
288
288
  }
289
+ /**
290
+ * VersionHistory Viewset
291
+ */
292
+ adminVersionHistoryListRaw(requestParameters, initOverrides) {
293
+ return __awaiter(this, void 0, void 0, function* () {
294
+ const queryParameters = {};
295
+ if (requestParameters.build !== undefined) {
296
+ queryParameters['build'] = requestParameters.build;
297
+ }
298
+ if (requestParameters.ordering !== undefined) {
299
+ queryParameters['ordering'] = requestParameters.ordering;
300
+ }
301
+ if (requestParameters.search !== undefined) {
302
+ queryParameters['search'] = requestParameters.search;
303
+ }
304
+ if (requestParameters.version !== undefined) {
305
+ queryParameters['version'] = requestParameters.version;
306
+ }
307
+ const headerParameters = {};
308
+ if (this.configuration && this.configuration.accessToken) {
309
+ const token = this.configuration.accessToken;
310
+ const tokenString = yield token("authentik", []);
311
+ if (tokenString) {
312
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
313
+ }
314
+ }
315
+ const response = yield this.request({
316
+ path: `/admin/version/history/`,
317
+ method: 'GET',
318
+ headers: headerParameters,
319
+ query: queryParameters,
320
+ }, initOverrides);
321
+ return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(VersionHistoryFromJSON));
322
+ });
323
+ }
324
+ /**
325
+ * VersionHistory Viewset
326
+ */
327
+ adminVersionHistoryList(requestParameters = {}, initOverrides) {
328
+ return __awaiter(this, void 0, void 0, function* () {
329
+ const response = yield this.adminVersionHistoryListRaw(requestParameters, initOverrides);
330
+ return yield response.value();
331
+ });
332
+ }
333
+ /**
334
+ * VersionHistory Viewset
335
+ */
336
+ adminVersionHistoryRetrieveRaw(requestParameters, initOverrides) {
337
+ return __awaiter(this, void 0, void 0, function* () {
338
+ if (requestParameters.id === null || requestParameters.id === undefined) {
339
+ throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling adminVersionHistoryRetrieve.');
340
+ }
341
+ const queryParameters = {};
342
+ const headerParameters = {};
343
+ if (this.configuration && this.configuration.accessToken) {
344
+ const token = this.configuration.accessToken;
345
+ const tokenString = yield token("authentik", []);
346
+ if (tokenString) {
347
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
348
+ }
349
+ }
350
+ const response = yield this.request({
351
+ path: `/admin/version/history/{id}/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
352
+ method: 'GET',
353
+ headers: headerParameters,
354
+ query: queryParameters,
355
+ }, initOverrides);
356
+ return new runtime.JSONApiResponse(response, (jsonValue) => VersionHistoryFromJSON(jsonValue));
357
+ });
358
+ }
359
+ /**
360
+ * VersionHistory Viewset
361
+ */
362
+ adminVersionHistoryRetrieve(requestParameters, initOverrides) {
363
+ return __awaiter(this, void 0, void 0, function* () {
364
+ const response = yield this.adminVersionHistoryRetrieveRaw(requestParameters, initOverrides);
365
+ return yield response.value();
366
+ });
367
+ }
289
368
  /**
290
369
  * Get running and latest version.
291
370
  */
@@ -145,11 +145,17 @@ export interface OAuth2Provider {
145
145
  */
146
146
  includeClaimsInIdToken?: boolean;
147
147
  /**
148
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
148
+ * Key used to sign the tokens.
149
149
  * @type {string}
150
150
  * @memberof OAuth2Provider
151
151
  */
152
152
  signingKey?: string | null;
153
+ /**
154
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
155
+ * @type {string}
156
+ * @memberof OAuth2Provider
157
+ */
158
+ encryptionKey?: string | null;
153
159
  /**
154
160
  * Enter each URI on a new line.
155
161
  * @type {string}
@@ -64,6 +64,7 @@ export function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
64
64
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
65
65
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
66
66
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
67
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
67
68
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
68
69
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
69
70
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -91,6 +92,7 @@ export function OAuth2ProviderToJSON(value) {
91
92
  'refresh_token_validity': value.refreshTokenValidity,
92
93
  'include_claims_in_id_token': value.includeClaimsInIdToken,
93
94
  'signing_key': value.signingKey,
95
+ 'encryption_key': value.encryptionKey,
94
96
  'redirect_uris': value.redirectUris,
95
97
  'sub_mode': SubModeEnumToJSON(value.subMode),
96
98
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
@@ -91,11 +91,17 @@ export interface OAuth2ProviderRequest {
91
91
  */
92
92
  includeClaimsInIdToken?: boolean;
93
93
  /**
94
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
94
+ * Key used to sign the tokens.
95
95
  * @type {string}
96
96
  * @memberof OAuth2ProviderRequest
97
97
  */
98
98
  signingKey?: string | null;
99
+ /**
100
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
101
+ * @type {string}
102
+ * @memberof OAuth2ProviderRequest
103
+ */
104
+ encryptionKey?: string | null;
99
105
  /**
100
106
  * Enter each URI on a new line.
101
107
  * @type {string}
@@ -46,6 +46,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
46
46
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
47
47
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
48
48
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
49
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
49
50
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
50
51
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
51
52
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -73,6 +74,7 @@ export function OAuth2ProviderRequestToJSON(value) {
73
74
  'refresh_token_validity': value.refreshTokenValidity,
74
75
  'include_claims_in_id_token': value.includeClaimsInIdToken,
75
76
  'signing_key': value.signingKey,
77
+ 'encryption_key': value.encryptionKey,
76
78
  'redirect_uris': value.redirectUris,
77
79
  'sub_mode': SubModeEnumToJSON(value.subMode),
78
80
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
@@ -91,11 +91,17 @@ export interface PatchedOAuth2ProviderRequest {
91
91
  */
92
92
  includeClaimsInIdToken?: boolean;
93
93
  /**
94
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
94
+ * Key used to sign the tokens.
95
95
  * @type {string}
96
96
  * @memberof PatchedOAuth2ProviderRequest
97
97
  */
98
98
  signingKey?: string | null;
99
+ /**
100
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
101
+ * @type {string}
102
+ * @memberof PatchedOAuth2ProviderRequest
103
+ */
104
+ encryptionKey?: string | null;
99
105
  /**
100
106
  * Enter each URI on a new line.
101
107
  * @type {string}
@@ -43,6 +43,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscrimina
43
43
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
44
44
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
45
45
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
46
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
46
47
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
47
48
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
48
49
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -70,6 +71,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value) {
70
71
  'refresh_token_validity': value.refreshTokenValidity,
71
72
  'include_claims_in_id_token': value.includeClaimsInIdToken,
72
73
  'signing_key': value.signingKey,
74
+ 'encryption_key': value.encryptionKey,
73
75
  'redirect_uris': value.redirectUris,
74
76
  'sub_mode': SubModeEnumToJSON(value.subMode),
75
77
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
@@ -0,0 +1,49 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.8.3
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ * VersionHistory Serializer
14
+ * @export
15
+ * @interface VersionHistory
16
+ */
17
+ export interface VersionHistory {
18
+ /**
19
+ *
20
+ * @type {number}
21
+ * @memberof VersionHistory
22
+ */
23
+ readonly id: number;
24
+ /**
25
+ *
26
+ * @type {Date}
27
+ * @memberof VersionHistory
28
+ */
29
+ timestamp: Date;
30
+ /**
31
+ *
32
+ * @type {string}
33
+ * @memberof VersionHistory
34
+ */
35
+ version: string;
36
+ /**
37
+ *
38
+ * @type {string}
39
+ * @memberof VersionHistory
40
+ */
41
+ build: string;
42
+ }
43
+ /**
44
+ * Check if a given object implements the VersionHistory interface.
45
+ */
46
+ export declare function instanceOfVersionHistory(value: object): boolean;
47
+ export declare function VersionHistoryFromJSON(json: any): VersionHistory;
48
+ export declare function VersionHistoryFromJSONTyped(json: any, ignoreDiscriminator: boolean): VersionHistory;
49
+ export declare function VersionHistoryToJSON(value?: VersionHistory | null): any;
@@ -0,0 +1,51 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.8.3
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ /**
15
+ * Check if a given object implements the VersionHistory interface.
16
+ */
17
+ export function instanceOfVersionHistory(value) {
18
+ let isInstance = true;
19
+ isInstance = isInstance && "id" in value;
20
+ isInstance = isInstance && "timestamp" in value;
21
+ isInstance = isInstance && "version" in value;
22
+ isInstance = isInstance && "build" in value;
23
+ return isInstance;
24
+ }
25
+ export function VersionHistoryFromJSON(json) {
26
+ return VersionHistoryFromJSONTyped(json, false);
27
+ }
28
+ export function VersionHistoryFromJSONTyped(json, ignoreDiscriminator) {
29
+ if ((json === undefined) || (json === null)) {
30
+ return json;
31
+ }
32
+ return {
33
+ 'id': json['id'],
34
+ 'timestamp': (new Date(json['timestamp'])),
35
+ 'version': json['version'],
36
+ 'build': json['build'],
37
+ };
38
+ }
39
+ export function VersionHistoryToJSON(value) {
40
+ if (value === undefined) {
41
+ return undefined;
42
+ }
43
+ if (value === null) {
44
+ return null;
45
+ }
46
+ return {
47
+ 'timestamp': (value.timestamp.toISOString()),
48
+ 'version': value.version,
49
+ 'build': value.build,
50
+ };
51
+ }
@@ -639,6 +639,7 @@ export * from './UserWriteStage';
639
639
  export * from './UserWriteStageRequest';
640
640
  export * from './ValidationError';
641
641
  export * from './Version';
642
+ export * from './VersionHistory';
642
643
  export * from './WebAuthnDevice';
643
644
  export * from './WebAuthnDeviceRequest';
644
645
  export * from './WebAuthnDeviceType';
@@ -641,6 +641,7 @@ export * from './UserWriteStage';
641
641
  export * from './UserWriteStageRequest';
642
642
  export * from './ValidationError';
643
643
  export * from './Version';
644
+ export * from './VersionHistory';
644
645
  export * from './WebAuthnDevice';
645
646
  export * from './WebAuthnDeviceRequest';
646
647
  export * from './WebAuthnDeviceType';
@@ -145,11 +145,17 @@ export interface OAuth2Provider {
145
145
  */
146
146
  includeClaimsInIdToken?: boolean;
147
147
  /**
148
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
148
+ * Key used to sign the tokens.
149
149
  * @type {string}
150
150
  * @memberof OAuth2Provider
151
151
  */
152
152
  signingKey?: string | null;
153
+ /**
154
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
155
+ * @type {string}
156
+ * @memberof OAuth2Provider
157
+ */
158
+ encryptionKey?: string | null;
153
159
  /**
154
160
  * Enter each URI on a new line.
155
161
  * @type {string}
@@ -69,6 +69,7 @@ function OAuth2ProviderFromJSONTyped(json, ignoreDiscriminator) {
69
69
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
70
70
  'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
71
71
  'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
72
+ 'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
72
73
  'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
73
74
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
74
75
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
@@ -97,6 +98,7 @@ function OAuth2ProviderToJSON(value) {
97
98
  'refresh_token_validity': value.refreshTokenValidity,
98
99
  'include_claims_in_id_token': value.includeClaimsInIdToken,
99
100
  'signing_key': value.signingKey,
101
+ 'encryption_key': value.encryptionKey,
100
102
  'redirect_uris': value.redirectUris,
101
103
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
102
104
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
@@ -91,11 +91,17 @@ export interface OAuth2ProviderRequest {
91
91
  */
92
92
  includeClaimsInIdToken?: boolean;
93
93
  /**
94
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
94
+ * Key used to sign the tokens.
95
95
  * @type {string}
96
96
  * @memberof OAuth2ProviderRequest
97
97
  */
98
98
  signingKey?: string | null;
99
+ /**
100
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
101
+ * @type {string}
102
+ * @memberof OAuth2ProviderRequest
103
+ */
104
+ encryptionKey?: string | null;
99
105
  /**
100
106
  * Enter each URI on a new line.
101
107
  * @type {string}
@@ -51,6 +51,7 @@ function OAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
51
51
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
52
52
  'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
53
53
  'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
54
+ 'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
54
55
  'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
55
56
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
56
57
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
@@ -79,6 +80,7 @@ function OAuth2ProviderRequestToJSON(value) {
79
80
  'refresh_token_validity': value.refreshTokenValidity,
80
81
  'include_claims_in_id_token': value.includeClaimsInIdToken,
81
82
  'signing_key': value.signingKey,
83
+ 'encryption_key': value.encryptionKey,
82
84
  'redirect_uris': value.redirectUris,
83
85
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
84
86
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
@@ -91,11 +91,17 @@ export interface PatchedOAuth2ProviderRequest {
91
91
  */
92
92
  includeClaimsInIdToken?: boolean;
93
93
  /**
94
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
94
+ * Key used to sign the tokens.
95
95
  * @type {string}
96
96
  * @memberof PatchedOAuth2ProviderRequest
97
97
  */
98
98
  signingKey?: string | null;
99
+ /**
100
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
101
+ * @type {string}
102
+ * @memberof PatchedOAuth2ProviderRequest
103
+ */
104
+ encryptionKey?: string | null;
99
105
  /**
100
106
  * Enter each URI on a new line.
101
107
  * @type {string}
@@ -48,6 +48,7 @@ function PatchedOAuth2ProviderRequestFromJSONTyped(json, ignoreDiscriminator) {
48
48
  'refreshTokenValidity': !(0, runtime_1.exists)(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
49
49
  'includeClaimsInIdToken': !(0, runtime_1.exists)(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
50
50
  'signingKey': !(0, runtime_1.exists)(json, 'signing_key') ? undefined : json['signing_key'],
51
+ 'encryptionKey': !(0, runtime_1.exists)(json, 'encryption_key') ? undefined : json['encryption_key'],
51
52
  'redirectUris': !(0, runtime_1.exists)(json, 'redirect_uris') ? undefined : json['redirect_uris'],
52
53
  'subMode': !(0, runtime_1.exists)(json, 'sub_mode') ? undefined : (0, SubModeEnum_1.SubModeEnumFromJSON)(json['sub_mode']),
53
54
  'issuerMode': !(0, runtime_1.exists)(json, 'issuer_mode') ? undefined : (0, IssuerModeEnum_1.IssuerModeEnumFromJSON)(json['issuer_mode']),
@@ -76,6 +77,7 @@ function PatchedOAuth2ProviderRequestToJSON(value) {
76
77
  'refresh_token_validity': value.refreshTokenValidity,
77
78
  'include_claims_in_id_token': value.includeClaimsInIdToken,
78
79
  'signing_key': value.signingKey,
80
+ 'encryption_key': value.encryptionKey,
79
81
  'redirect_uris': value.redirectUris,
80
82
  'sub_mode': (0, SubModeEnum_1.SubModeEnumToJSON)(value.subMode),
81
83
  'issuer_mode': (0, IssuerModeEnum_1.IssuerModeEnumToJSON)(value.issuerMode),
@@ -0,0 +1,49 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2024.8.3
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ * VersionHistory Serializer
14
+ * @export
15
+ * @interface VersionHistory
16
+ */
17
+ export interface VersionHistory {
18
+ /**
19
+ *
20
+ * @type {number}
21
+ * @memberof VersionHistory
22
+ */
23
+ readonly id: number;
24
+ /**
25
+ *
26
+ * @type {Date}
27
+ * @memberof VersionHistory
28
+ */
29
+ timestamp: Date;
30
+ /**
31
+ *
32
+ * @type {string}
33
+ * @memberof VersionHistory
34
+ */
35
+ version: string;
36
+ /**
37
+ *
38
+ * @type {string}
39
+ * @memberof VersionHistory
40
+ */
41
+ build: string;
42
+ }
43
+ /**
44
+ * Check if a given object implements the VersionHistory interface.
45
+ */
46
+ export declare function instanceOfVersionHistory(value: object): boolean;
47
+ export declare function VersionHistoryFromJSON(json: any): VersionHistory;
48
+ export declare function VersionHistoryFromJSONTyped(json: any, ignoreDiscriminator: boolean): VersionHistory;
49
+ export declare function VersionHistoryToJSON(value?: VersionHistory | null): any;
@@ -0,0 +1,58 @@
1
+ "use strict";
2
+ /* tslint:disable */
3
+ /* eslint-disable */
4
+ /**
5
+ * authentik
6
+ * Making authentication simple.
7
+ *
8
+ * The version of the OpenAPI document: 2024.8.3
9
+ * Contact: hello@goauthentik.io
10
+ *
11
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
12
+ * https://openapi-generator.tech
13
+ * Do not edit the class manually.
14
+ */
15
+ Object.defineProperty(exports, "__esModule", { value: true });
16
+ exports.VersionHistoryToJSON = exports.VersionHistoryFromJSONTyped = exports.VersionHistoryFromJSON = exports.instanceOfVersionHistory = void 0;
17
+ /**
18
+ * Check if a given object implements the VersionHistory interface.
19
+ */
20
+ function instanceOfVersionHistory(value) {
21
+ let isInstance = true;
22
+ isInstance = isInstance && "id" in value;
23
+ isInstance = isInstance && "timestamp" in value;
24
+ isInstance = isInstance && "version" in value;
25
+ isInstance = isInstance && "build" in value;
26
+ return isInstance;
27
+ }
28
+ exports.instanceOfVersionHistory = instanceOfVersionHistory;
29
+ function VersionHistoryFromJSON(json) {
30
+ return VersionHistoryFromJSONTyped(json, false);
31
+ }
32
+ exports.VersionHistoryFromJSON = VersionHistoryFromJSON;
33
+ function VersionHistoryFromJSONTyped(json, ignoreDiscriminator) {
34
+ if ((json === undefined) || (json === null)) {
35
+ return json;
36
+ }
37
+ return {
38
+ 'id': json['id'],
39
+ 'timestamp': (new Date(json['timestamp'])),
40
+ 'version': json['version'],
41
+ 'build': json['build'],
42
+ };
43
+ }
44
+ exports.VersionHistoryFromJSONTyped = VersionHistoryFromJSONTyped;
45
+ function VersionHistoryToJSON(value) {
46
+ if (value === undefined) {
47
+ return undefined;
48
+ }
49
+ if (value === null) {
50
+ return null;
51
+ }
52
+ return {
53
+ 'timestamp': (value.timestamp.toISOString()),
54
+ 'version': value.version,
55
+ 'build': value.build,
56
+ };
57
+ }
58
+ exports.VersionHistoryToJSON = VersionHistoryToJSON;
@@ -639,6 +639,7 @@ export * from './UserWriteStage';
639
639
  export * from './UserWriteStageRequest';
640
640
  export * from './ValidationError';
641
641
  export * from './Version';
642
+ export * from './VersionHistory';
642
643
  export * from './WebAuthnDevice';
643
644
  export * from './WebAuthnDeviceRequest';
644
645
  export * from './WebAuthnDeviceType';
@@ -657,6 +657,7 @@ __exportStar(require("./UserWriteStage"), exports);
657
657
  __exportStar(require("./UserWriteStageRequest"), exports);
658
658
  __exportStar(require("./ValidationError"), exports);
659
659
  __exportStar(require("./Version"), exports);
660
+ __exportStar(require("./VersionHistory"), exports);
660
661
  __exportStar(require("./WebAuthnDevice"), exports);
661
662
  __exportStar(require("./WebAuthnDeviceRequest"), exports);
662
663
  __exportStar(require("./WebAuthnDeviceType"), exports);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2024.8.3-1728939481",
3
+ "version": "2024.8.3-1729167001",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -24,6 +24,7 @@ import type {
24
24
  SystemInfo,
25
25
  ValidationError,
26
26
  Version,
27
+ VersionHistory,
27
28
  Workers,
28
29
  } from '../models';
29
30
  import {
@@ -45,6 +46,8 @@ import {
45
46
  ValidationErrorToJSON,
46
47
  VersionFromJSON,
47
48
  VersionToJSON,
49
+ VersionHistoryFromJSON,
50
+ VersionHistoryToJSON,
48
51
  WorkersFromJSON,
49
52
  WorkersToJSON,
50
53
  } from '../models';
@@ -57,6 +60,17 @@ export interface AdminSettingsUpdateRequest {
57
60
  settingsRequest?: SettingsRequest;
58
61
  }
59
62
 
63
+ export interface AdminVersionHistoryListRequest {
64
+ build?: string;
65
+ ordering?: string;
66
+ search?: string;
67
+ version?: string;
68
+ }
69
+
70
+ export interface AdminVersionHistoryRetrieveRequest {
71
+ id: number;
72
+ }
73
+
60
74
  /**
61
75
  *
62
76
  */
@@ -340,6 +354,94 @@ export class AdminApi extends runtime.BaseAPI {
340
354
  return await response.value();
341
355
  }
342
356
 
357
+ /**
358
+ * VersionHistory Viewset
359
+ */
360
+ async adminVersionHistoryListRaw(requestParameters: AdminVersionHistoryListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<VersionHistory>>> {
361
+ const queryParameters: any = {};
362
+
363
+ if (requestParameters.build !== undefined) {
364
+ queryParameters['build'] = requestParameters.build;
365
+ }
366
+
367
+ if (requestParameters.ordering !== undefined) {
368
+ queryParameters['ordering'] = requestParameters.ordering;
369
+ }
370
+
371
+ if (requestParameters.search !== undefined) {
372
+ queryParameters['search'] = requestParameters.search;
373
+ }
374
+
375
+ if (requestParameters.version !== undefined) {
376
+ queryParameters['version'] = requestParameters.version;
377
+ }
378
+
379
+ const headerParameters: runtime.HTTPHeaders = {};
380
+
381
+ if (this.configuration && this.configuration.accessToken) {
382
+ const token = this.configuration.accessToken;
383
+ const tokenString = await token("authentik", []);
384
+
385
+ if (tokenString) {
386
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
387
+ }
388
+ }
389
+ const response = await this.request({
390
+ path: `/admin/version/history/`,
391
+ method: 'GET',
392
+ headers: headerParameters,
393
+ query: queryParameters,
394
+ }, initOverrides);
395
+
396
+ return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(VersionHistoryFromJSON));
397
+ }
398
+
399
+ /**
400
+ * VersionHistory Viewset
401
+ */
402
+ async adminVersionHistoryList(requestParameters: AdminVersionHistoryListRequest = {}, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<VersionHistory>> {
403
+ const response = await this.adminVersionHistoryListRaw(requestParameters, initOverrides);
404
+ return await response.value();
405
+ }
406
+
407
+ /**
408
+ * VersionHistory Viewset
409
+ */
410
+ async adminVersionHistoryRetrieveRaw(requestParameters: AdminVersionHistoryRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<VersionHistory>> {
411
+ if (requestParameters.id === null || requestParameters.id === undefined) {
412
+ throw new runtime.RequiredError('id','Required parameter requestParameters.id was null or undefined when calling adminVersionHistoryRetrieve.');
413
+ }
414
+
415
+ const queryParameters: any = {};
416
+
417
+ const headerParameters: runtime.HTTPHeaders = {};
418
+
419
+ if (this.configuration && this.configuration.accessToken) {
420
+ const token = this.configuration.accessToken;
421
+ const tokenString = await token("authentik", []);
422
+
423
+ if (tokenString) {
424
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
425
+ }
426
+ }
427
+ const response = await this.request({
428
+ path: `/admin/version/history/{id}/`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
429
+ method: 'GET',
430
+ headers: headerParameters,
431
+ query: queryParameters,
432
+ }, initOverrides);
433
+
434
+ return new runtime.JSONApiResponse(response, (jsonValue) => VersionHistoryFromJSON(jsonValue));
435
+ }
436
+
437
+ /**
438
+ * VersionHistory Viewset
439
+ */
440
+ async adminVersionHistoryRetrieve(requestParameters: AdminVersionHistoryRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<VersionHistory> {
441
+ const response = await this.adminVersionHistoryRetrieveRaw(requestParameters, initOverrides);
442
+ return await response.value();
443
+ }
444
+
343
445
  /**
344
446
  * Get running and latest version.
345
447
  */
@@ -165,11 +165,17 @@ export interface OAuth2Provider {
165
165
  */
166
166
  includeClaimsInIdToken?: boolean;
167
167
  /**
168
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
168
+ * Key used to sign the tokens.
169
169
  * @type {string}
170
170
  * @memberof OAuth2Provider
171
171
  */
172
172
  signingKey?: string | null;
173
+ /**
174
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
175
+ * @type {string}
176
+ * @memberof OAuth2Provider
177
+ */
178
+ encryptionKey?: string | null;
173
179
  /**
174
180
  * Enter each URI on a new line.
175
181
  * @type {string}
@@ -249,6 +255,7 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
249
255
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
250
256
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
251
257
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
258
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
252
259
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
253
260
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
254
261
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -278,6 +285,7 @@ export function OAuth2ProviderToJSON(value?: OAuth2Provider | null): any {
278
285
  'refresh_token_validity': value.refreshTokenValidity,
279
286
  'include_claims_in_id_token': value.includeClaimsInIdToken,
280
287
  'signing_key': value.signingKey,
288
+ 'encryption_key': value.encryptionKey,
281
289
  'redirect_uris': value.redirectUris,
282
290
  'sub_mode': SubModeEnumToJSON(value.subMode),
283
291
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
@@ -111,11 +111,17 @@ export interface OAuth2ProviderRequest {
111
111
  */
112
112
  includeClaimsInIdToken?: boolean;
113
113
  /**
114
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
114
+ * Key used to sign the tokens.
115
115
  * @type {string}
116
116
  * @memberof OAuth2ProviderRequest
117
117
  */
118
118
  signingKey?: string | null;
119
+ /**
120
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
121
+ * @type {string}
122
+ * @memberof OAuth2ProviderRequest
123
+ */
124
+ encryptionKey?: string | null;
119
125
  /**
120
126
  * Enter each URI on a new line.
121
127
  * @type {string}
@@ -177,6 +183,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
177
183
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
178
184
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
179
185
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
186
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
180
187
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
181
188
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
182
189
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -206,6 +213,7 @@ export function OAuth2ProviderRequestToJSON(value?: OAuth2ProviderRequest | null
206
213
  'refresh_token_validity': value.refreshTokenValidity,
207
214
  'include_claims_in_id_token': value.includeClaimsInIdToken,
208
215
  'signing_key': value.signingKey,
216
+ 'encryption_key': value.encryptionKey,
209
217
  'redirect_uris': value.redirectUris,
210
218
  'sub_mode': SubModeEnumToJSON(value.subMode),
211
219
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
@@ -111,11 +111,17 @@ export interface PatchedOAuth2ProviderRequest {
111
111
  */
112
112
  includeClaimsInIdToken?: boolean;
113
113
  /**
114
- * Key used to sign the tokens. Only required when JWT Algorithm is set to RS256.
114
+ * Key used to sign the tokens.
115
115
  * @type {string}
116
116
  * @memberof PatchedOAuth2ProviderRequest
117
117
  */
118
118
  signingKey?: string | null;
119
+ /**
120
+ * Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.
121
+ * @type {string}
122
+ * @memberof PatchedOAuth2ProviderRequest
123
+ */
124
+ encryptionKey?: string | null;
119
125
  /**
120
126
  * Enter each URI on a new line.
121
127
  * @type {string}
@@ -174,6 +180,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
174
180
  'refreshTokenValidity': !exists(json, 'refresh_token_validity') ? undefined : json['refresh_token_validity'],
175
181
  'includeClaimsInIdToken': !exists(json, 'include_claims_in_id_token') ? undefined : json['include_claims_in_id_token'],
176
182
  'signingKey': !exists(json, 'signing_key') ? undefined : json['signing_key'],
183
+ 'encryptionKey': !exists(json, 'encryption_key') ? undefined : json['encryption_key'],
177
184
  'redirectUris': !exists(json, 'redirect_uris') ? undefined : json['redirect_uris'],
178
185
  'subMode': !exists(json, 'sub_mode') ? undefined : SubModeEnumFromJSON(json['sub_mode']),
179
186
  'issuerMode': !exists(json, 'issuer_mode') ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
@@ -203,6 +210,7 @@ export function PatchedOAuth2ProviderRequestToJSON(value?: PatchedOAuth2Provider
203
210
  'refresh_token_validity': value.refreshTokenValidity,
204
211
  'include_claims_in_id_token': value.includeClaimsInIdToken,
205
212
  'signing_key': value.signingKey,
213
+ 'encryption_key': value.encryptionKey,
206
214
  'redirect_uris': value.redirectUris,
207
215
  'sub_mode': SubModeEnumToJSON(value.subMode),
208
216
  'issuer_mode': IssuerModeEnumToJSON(value.issuerMode),
@@ -0,0 +1,92 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2024.8.3
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+
15
+ import { exists, mapValues } from '../runtime';
16
+ /**
17
+ * VersionHistory Serializer
18
+ * @export
19
+ * @interface VersionHistory
20
+ */
21
+ export interface VersionHistory {
22
+ /**
23
+ *
24
+ * @type {number}
25
+ * @memberof VersionHistory
26
+ */
27
+ readonly id: number;
28
+ /**
29
+ *
30
+ * @type {Date}
31
+ * @memberof VersionHistory
32
+ */
33
+ timestamp: Date;
34
+ /**
35
+ *
36
+ * @type {string}
37
+ * @memberof VersionHistory
38
+ */
39
+ version: string;
40
+ /**
41
+ *
42
+ * @type {string}
43
+ * @memberof VersionHistory
44
+ */
45
+ build: string;
46
+ }
47
+
48
+ /**
49
+ * Check if a given object implements the VersionHistory interface.
50
+ */
51
+ export function instanceOfVersionHistory(value: object): boolean {
52
+ let isInstance = true;
53
+ isInstance = isInstance && "id" in value;
54
+ isInstance = isInstance && "timestamp" in value;
55
+ isInstance = isInstance && "version" in value;
56
+ isInstance = isInstance && "build" in value;
57
+
58
+ return isInstance;
59
+ }
60
+
61
+ export function VersionHistoryFromJSON(json: any): VersionHistory {
62
+ return VersionHistoryFromJSONTyped(json, false);
63
+ }
64
+
65
+ export function VersionHistoryFromJSONTyped(json: any, ignoreDiscriminator: boolean): VersionHistory {
66
+ if ((json === undefined) || (json === null)) {
67
+ return json;
68
+ }
69
+ return {
70
+
71
+ 'id': json['id'],
72
+ 'timestamp': (new Date(json['timestamp'])),
73
+ 'version': json['version'],
74
+ 'build': json['build'],
75
+ };
76
+ }
77
+
78
+ export function VersionHistoryToJSON(value?: VersionHistory | null): any {
79
+ if (value === undefined) {
80
+ return undefined;
81
+ }
82
+ if (value === null) {
83
+ return null;
84
+ }
85
+ return {
86
+
87
+ 'timestamp': (value.timestamp.toISOString()),
88
+ 'version': value.version,
89
+ 'build': value.build,
90
+ };
91
+ }
92
+
@@ -641,6 +641,7 @@ export * from './UserWriteStage';
641
641
  export * from './UserWriteStageRequest';
642
642
  export * from './ValidationError';
643
643
  export * from './Version';
644
+ export * from './VersionHistory';
644
645
  export * from './WebAuthnDevice';
645
646
  export * from './WebAuthnDeviceRequest';
646
647
  export * from './WebAuthnDeviceType';