@goauthentik/api 2025.2.4-1744808430 → 2025.2.4-1745325566
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +4 -0
- package/dist/apis/PoliciesApi.d.ts +90 -1
- package/dist/apis/PoliciesApi.js +283 -0
- package/dist/apis/RbacApi.d.ts +2 -0
- package/dist/apis/RbacApi.js +2 -0
- package/dist/esm/apis/PoliciesApi.d.ts +90 -1
- package/dist/esm/apis/PoliciesApi.js +284 -1
- package/dist/esm/apis/RbacApi.d.ts +2 -0
- package/dist/esm/apis/RbacApi.js +2 -0
- package/dist/esm/models/AppEnum.d.ts +1 -0
- package/dist/esm/models/AppEnum.js +1 -0
- package/dist/esm/models/IdentificationChallenge.d.ts +6 -0
- package/dist/esm/models/IdentificationChallenge.js +2 -0
- package/dist/esm/models/IdentificationStage.d.ts +6 -0
- package/dist/esm/models/IdentificationStage.js +2 -0
- package/dist/esm/models/IdentificationStageRequest.d.ts +6 -0
- package/dist/esm/models/IdentificationStageRequest.js +2 -0
- package/dist/esm/models/ModelEnum.d.ts +1 -0
- package/dist/esm/models/ModelEnum.js +1 -0
- package/dist/esm/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
- package/dist/esm/models/PaginatedUniquePasswordPolicyList.js +49 -0
- package/dist/esm/models/PatchedIdentificationStageRequest.d.ts +6 -0
- package/dist/esm/models/PatchedIdentificationStageRequest.js +2 -0
- package/dist/esm/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/esm/models/PatchedUniquePasswordPolicyRequest.js +47 -0
- package/dist/esm/models/UniquePasswordPolicy.d.ts +86 -0
- package/dist/esm/models/UniquePasswordPolicy.js +67 -0
- package/dist/esm/models/UniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/esm/models/UniquePasswordPolicyRequest.js +49 -0
- package/dist/esm/models/index.d.ts +4 -0
- package/dist/esm/models/index.js +4 -0
- package/dist/models/AppEnum.d.ts +1 -0
- package/dist/models/AppEnum.js +1 -0
- package/dist/models/IdentificationChallenge.d.ts +6 -0
- package/dist/models/IdentificationChallenge.js +2 -0
- package/dist/models/IdentificationStage.d.ts +6 -0
- package/dist/models/IdentificationStage.js +2 -0
- package/dist/models/IdentificationStageRequest.d.ts +6 -0
- package/dist/models/IdentificationStageRequest.js +2 -0
- package/dist/models/ModelEnum.d.ts +1 -0
- package/dist/models/ModelEnum.js +1 -0
- package/dist/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
- package/dist/models/PaginatedUniquePasswordPolicyList.js +56 -0
- package/dist/models/PatchedIdentificationStageRequest.d.ts +6 -0
- package/dist/models/PatchedIdentificationStageRequest.js +2 -0
- package/dist/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/models/PatchedUniquePasswordPolicyRequest.js +54 -0
- package/dist/models/UniquePasswordPolicy.d.ts +86 -0
- package/dist/models/UniquePasswordPolicy.js +74 -0
- package/dist/models/UniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/models/UniquePasswordPolicyRequest.js +56 -0
- package/dist/models/index.d.ts +4 -0
- package/dist/models/index.js +4 -0
- package/package.json +1 -1
- package/src/apis/PoliciesApi.ts +391 -0
- package/src/apis/RbacApi.ts +2 -0
- package/src/models/AppEnum.ts +1 -0
- package/src/models/IdentificationChallenge.ts +8 -0
- package/src/models/IdentificationStage.ts +8 -0
- package/src/models/IdentificationStageRequest.ts +8 -0
- package/src/models/ModelEnum.ts +1 -0
- package/src/models/PaginatedUniquePasswordPolicyList.ts +90 -0
- package/src/models/PatchedIdentificationStageRequest.ts +8 -0
- package/src/models/PatchedUniquePasswordPolicyRequest.ts +89 -0
- package/src/models/UniquePasswordPolicy.ts +138 -0
- package/src/models/UniquePasswordPolicyRequest.ts +90 -0
- package/src/models/index.ts +4 -0
package/src/apis/PoliciesApi.ts
CHANGED
|
@@ -36,6 +36,7 @@ import type {
|
|
|
36
36
|
PaginatedPolicyList,
|
|
37
37
|
PaginatedReputationList,
|
|
38
38
|
PaginatedReputationPolicyList,
|
|
39
|
+
PaginatedUniquePasswordPolicyList,
|
|
39
40
|
PasswordExpiryPolicy,
|
|
40
41
|
PasswordExpiryPolicyRequest,
|
|
41
42
|
PasswordPolicy,
|
|
@@ -48,6 +49,7 @@ import type {
|
|
|
48
49
|
PatchedPasswordPolicyRequest,
|
|
49
50
|
PatchedPolicyBindingRequest,
|
|
50
51
|
PatchedReputationPolicyRequest,
|
|
52
|
+
PatchedUniquePasswordPolicyRequest,
|
|
51
53
|
Policy,
|
|
52
54
|
PolicyBinding,
|
|
53
55
|
PolicyBindingRequest,
|
|
@@ -57,6 +59,8 @@ import type {
|
|
|
57
59
|
ReputationPolicy,
|
|
58
60
|
ReputationPolicyRequest,
|
|
59
61
|
TypeCreate,
|
|
62
|
+
UniquePasswordPolicy,
|
|
63
|
+
UniquePasswordPolicyRequest,
|
|
60
64
|
UsedBy,
|
|
61
65
|
ValidationError,
|
|
62
66
|
} from '../models/index';
|
|
@@ -103,6 +107,8 @@ import {
|
|
|
103
107
|
PaginatedReputationListToJSON,
|
|
104
108
|
PaginatedReputationPolicyListFromJSON,
|
|
105
109
|
PaginatedReputationPolicyListToJSON,
|
|
110
|
+
PaginatedUniquePasswordPolicyListFromJSON,
|
|
111
|
+
PaginatedUniquePasswordPolicyListToJSON,
|
|
106
112
|
PasswordExpiryPolicyFromJSON,
|
|
107
113
|
PasswordExpiryPolicyToJSON,
|
|
108
114
|
PasswordExpiryPolicyRequestFromJSON,
|
|
@@ -127,6 +133,8 @@ import {
|
|
|
127
133
|
PatchedPolicyBindingRequestToJSON,
|
|
128
134
|
PatchedReputationPolicyRequestFromJSON,
|
|
129
135
|
PatchedReputationPolicyRequestToJSON,
|
|
136
|
+
PatchedUniquePasswordPolicyRequestFromJSON,
|
|
137
|
+
PatchedUniquePasswordPolicyRequestToJSON,
|
|
130
138
|
PolicyFromJSON,
|
|
131
139
|
PolicyToJSON,
|
|
132
140
|
PolicyBindingFromJSON,
|
|
@@ -145,6 +153,10 @@ import {
|
|
|
145
153
|
ReputationPolicyRequestToJSON,
|
|
146
154
|
TypeCreateFromJSON,
|
|
147
155
|
TypeCreateToJSON,
|
|
156
|
+
UniquePasswordPolicyFromJSON,
|
|
157
|
+
UniquePasswordPolicyToJSON,
|
|
158
|
+
UniquePasswordPolicyRequestFromJSON,
|
|
159
|
+
UniquePasswordPolicyRequestToJSON,
|
|
148
160
|
UsedByFromJSON,
|
|
149
161
|
UsedByToJSON,
|
|
150
162
|
ValidationErrorFromJSON,
|
|
@@ -528,6 +540,46 @@ export interface PoliciesReputationUsedByListRequest {
|
|
|
528
540
|
policyUuid: string;
|
|
529
541
|
}
|
|
530
542
|
|
|
543
|
+
export interface PoliciesUniquePasswordCreateRequest {
|
|
544
|
+
uniquePasswordPolicyRequest: UniquePasswordPolicyRequest;
|
|
545
|
+
}
|
|
546
|
+
|
|
547
|
+
export interface PoliciesUniquePasswordDestroyRequest {
|
|
548
|
+
policyUuid: string;
|
|
549
|
+
}
|
|
550
|
+
|
|
551
|
+
export interface PoliciesUniquePasswordListRequest {
|
|
552
|
+
created?: Date;
|
|
553
|
+
executionLogging?: boolean;
|
|
554
|
+
lastUpdated?: Date;
|
|
555
|
+
name?: string;
|
|
556
|
+
numHistoricalPasswords?: number;
|
|
557
|
+
ordering?: string;
|
|
558
|
+
page?: number;
|
|
559
|
+
pageSize?: number;
|
|
560
|
+
passwordField?: string;
|
|
561
|
+
policyUuid?: string;
|
|
562
|
+
search?: string;
|
|
563
|
+
}
|
|
564
|
+
|
|
565
|
+
export interface PoliciesUniquePasswordPartialUpdateRequest {
|
|
566
|
+
policyUuid: string;
|
|
567
|
+
patchedUniquePasswordPolicyRequest?: PatchedUniquePasswordPolicyRequest;
|
|
568
|
+
}
|
|
569
|
+
|
|
570
|
+
export interface PoliciesUniquePasswordRetrieveRequest {
|
|
571
|
+
policyUuid: string;
|
|
572
|
+
}
|
|
573
|
+
|
|
574
|
+
export interface PoliciesUniquePasswordUpdateRequest {
|
|
575
|
+
policyUuid: string;
|
|
576
|
+
uniquePasswordPolicyRequest: UniquePasswordPolicyRequest;
|
|
577
|
+
}
|
|
578
|
+
|
|
579
|
+
export interface PoliciesUniquePasswordUsedByListRequest {
|
|
580
|
+
policyUuid: string;
|
|
581
|
+
}
|
|
582
|
+
|
|
531
583
|
/**
|
|
532
584
|
*
|
|
533
585
|
*/
|
|
@@ -3831,6 +3883,345 @@ export class PoliciesApi extends runtime.BaseAPI {
|
|
|
3831
3883
|
return await response.value();
|
|
3832
3884
|
}
|
|
3833
3885
|
|
|
3886
|
+
/**
|
|
3887
|
+
* Password Uniqueness Policy Viewset
|
|
3888
|
+
*/
|
|
3889
|
+
async policiesUniquePasswordCreateRaw(requestParameters: PoliciesUniquePasswordCreateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<UniquePasswordPolicy>> {
|
|
3890
|
+
if (requestParameters['uniquePasswordPolicyRequest'] == null) {
|
|
3891
|
+
throw new runtime.RequiredError(
|
|
3892
|
+
'uniquePasswordPolicyRequest',
|
|
3893
|
+
'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordCreate().'
|
|
3894
|
+
);
|
|
3895
|
+
}
|
|
3896
|
+
|
|
3897
|
+
const queryParameters: any = {};
|
|
3898
|
+
|
|
3899
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
3900
|
+
|
|
3901
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
3902
|
+
|
|
3903
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
3904
|
+
const token = this.configuration.accessToken;
|
|
3905
|
+
const tokenString = await token("authentik", []);
|
|
3906
|
+
|
|
3907
|
+
if (tokenString) {
|
|
3908
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
3909
|
+
}
|
|
3910
|
+
}
|
|
3911
|
+
const response = await this.request({
|
|
3912
|
+
path: `/policies/unique_password/`,
|
|
3913
|
+
method: 'POST',
|
|
3914
|
+
headers: headerParameters,
|
|
3915
|
+
query: queryParameters,
|
|
3916
|
+
body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
|
|
3917
|
+
}, initOverrides);
|
|
3918
|
+
|
|
3919
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
3920
|
+
}
|
|
3921
|
+
|
|
3922
|
+
/**
|
|
3923
|
+
* Password Uniqueness Policy Viewset
|
|
3924
|
+
*/
|
|
3925
|
+
async policiesUniquePasswordCreate(requestParameters: PoliciesUniquePasswordCreateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<UniquePasswordPolicy> {
|
|
3926
|
+
const response = await this.policiesUniquePasswordCreateRaw(requestParameters, initOverrides);
|
|
3927
|
+
return await response.value();
|
|
3928
|
+
}
|
|
3929
|
+
|
|
3930
|
+
/**
|
|
3931
|
+
* Password Uniqueness Policy Viewset
|
|
3932
|
+
*/
|
|
3933
|
+
async policiesUniquePasswordDestroyRaw(requestParameters: PoliciesUniquePasswordDestroyRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<void>> {
|
|
3934
|
+
if (requestParameters['policyUuid'] == null) {
|
|
3935
|
+
throw new runtime.RequiredError(
|
|
3936
|
+
'policyUuid',
|
|
3937
|
+
'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordDestroy().'
|
|
3938
|
+
);
|
|
3939
|
+
}
|
|
3940
|
+
|
|
3941
|
+
const queryParameters: any = {};
|
|
3942
|
+
|
|
3943
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
3944
|
+
|
|
3945
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
3946
|
+
const token = this.configuration.accessToken;
|
|
3947
|
+
const tokenString = await token("authentik", []);
|
|
3948
|
+
|
|
3949
|
+
if (tokenString) {
|
|
3950
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
3951
|
+
}
|
|
3952
|
+
}
|
|
3953
|
+
const response = await this.request({
|
|
3954
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
3955
|
+
method: 'DELETE',
|
|
3956
|
+
headers: headerParameters,
|
|
3957
|
+
query: queryParameters,
|
|
3958
|
+
}, initOverrides);
|
|
3959
|
+
|
|
3960
|
+
return new runtime.VoidApiResponse(response);
|
|
3961
|
+
}
|
|
3962
|
+
|
|
3963
|
+
/**
|
|
3964
|
+
* Password Uniqueness Policy Viewset
|
|
3965
|
+
*/
|
|
3966
|
+
async policiesUniquePasswordDestroy(requestParameters: PoliciesUniquePasswordDestroyRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<void> {
|
|
3967
|
+
await this.policiesUniquePasswordDestroyRaw(requestParameters, initOverrides);
|
|
3968
|
+
}
|
|
3969
|
+
|
|
3970
|
+
/**
|
|
3971
|
+
* Password Uniqueness Policy Viewset
|
|
3972
|
+
*/
|
|
3973
|
+
async policiesUniquePasswordListRaw(requestParameters: PoliciesUniquePasswordListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<PaginatedUniquePasswordPolicyList>> {
|
|
3974
|
+
const queryParameters: any = {};
|
|
3975
|
+
|
|
3976
|
+
if (requestParameters['created'] != null) {
|
|
3977
|
+
queryParameters['created'] = (requestParameters['created'] as any).toISOString();
|
|
3978
|
+
}
|
|
3979
|
+
|
|
3980
|
+
if (requestParameters['executionLogging'] != null) {
|
|
3981
|
+
queryParameters['execution_logging'] = requestParameters['executionLogging'];
|
|
3982
|
+
}
|
|
3983
|
+
|
|
3984
|
+
if (requestParameters['lastUpdated'] != null) {
|
|
3985
|
+
queryParameters['last_updated'] = (requestParameters['lastUpdated'] as any).toISOString();
|
|
3986
|
+
}
|
|
3987
|
+
|
|
3988
|
+
if (requestParameters['name'] != null) {
|
|
3989
|
+
queryParameters['name'] = requestParameters['name'];
|
|
3990
|
+
}
|
|
3991
|
+
|
|
3992
|
+
if (requestParameters['numHistoricalPasswords'] != null) {
|
|
3993
|
+
queryParameters['num_historical_passwords'] = requestParameters['numHistoricalPasswords'];
|
|
3994
|
+
}
|
|
3995
|
+
|
|
3996
|
+
if (requestParameters['ordering'] != null) {
|
|
3997
|
+
queryParameters['ordering'] = requestParameters['ordering'];
|
|
3998
|
+
}
|
|
3999
|
+
|
|
4000
|
+
if (requestParameters['page'] != null) {
|
|
4001
|
+
queryParameters['page'] = requestParameters['page'];
|
|
4002
|
+
}
|
|
4003
|
+
|
|
4004
|
+
if (requestParameters['pageSize'] != null) {
|
|
4005
|
+
queryParameters['page_size'] = requestParameters['pageSize'];
|
|
4006
|
+
}
|
|
4007
|
+
|
|
4008
|
+
if (requestParameters['passwordField'] != null) {
|
|
4009
|
+
queryParameters['password_field'] = requestParameters['passwordField'];
|
|
4010
|
+
}
|
|
4011
|
+
|
|
4012
|
+
if (requestParameters['policyUuid'] != null) {
|
|
4013
|
+
queryParameters['policy_uuid'] = requestParameters['policyUuid'];
|
|
4014
|
+
}
|
|
4015
|
+
|
|
4016
|
+
if (requestParameters['search'] != null) {
|
|
4017
|
+
queryParameters['search'] = requestParameters['search'];
|
|
4018
|
+
}
|
|
4019
|
+
|
|
4020
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
4021
|
+
|
|
4022
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
4023
|
+
const token = this.configuration.accessToken;
|
|
4024
|
+
const tokenString = await token("authentik", []);
|
|
4025
|
+
|
|
4026
|
+
if (tokenString) {
|
|
4027
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
4028
|
+
}
|
|
4029
|
+
}
|
|
4030
|
+
const response = await this.request({
|
|
4031
|
+
path: `/policies/unique_password/`,
|
|
4032
|
+
method: 'GET',
|
|
4033
|
+
headers: headerParameters,
|
|
4034
|
+
query: queryParameters,
|
|
4035
|
+
}, initOverrides);
|
|
4036
|
+
|
|
4037
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedUniquePasswordPolicyListFromJSON(jsonValue));
|
|
4038
|
+
}
|
|
4039
|
+
|
|
4040
|
+
/**
|
|
4041
|
+
* Password Uniqueness Policy Viewset
|
|
4042
|
+
*/
|
|
4043
|
+
async policiesUniquePasswordList(requestParameters: PoliciesUniquePasswordListRequest = {}, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<PaginatedUniquePasswordPolicyList> {
|
|
4044
|
+
const response = await this.policiesUniquePasswordListRaw(requestParameters, initOverrides);
|
|
4045
|
+
return await response.value();
|
|
4046
|
+
}
|
|
4047
|
+
|
|
4048
|
+
/**
|
|
4049
|
+
* Password Uniqueness Policy Viewset
|
|
4050
|
+
*/
|
|
4051
|
+
async policiesUniquePasswordPartialUpdateRaw(requestParameters: PoliciesUniquePasswordPartialUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<UniquePasswordPolicy>> {
|
|
4052
|
+
if (requestParameters['policyUuid'] == null) {
|
|
4053
|
+
throw new runtime.RequiredError(
|
|
4054
|
+
'policyUuid',
|
|
4055
|
+
'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordPartialUpdate().'
|
|
4056
|
+
);
|
|
4057
|
+
}
|
|
4058
|
+
|
|
4059
|
+
const queryParameters: any = {};
|
|
4060
|
+
|
|
4061
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
4062
|
+
|
|
4063
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
4064
|
+
|
|
4065
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
4066
|
+
const token = this.configuration.accessToken;
|
|
4067
|
+
const tokenString = await token("authentik", []);
|
|
4068
|
+
|
|
4069
|
+
if (tokenString) {
|
|
4070
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
4071
|
+
}
|
|
4072
|
+
}
|
|
4073
|
+
const response = await this.request({
|
|
4074
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
4075
|
+
method: 'PATCH',
|
|
4076
|
+
headers: headerParameters,
|
|
4077
|
+
query: queryParameters,
|
|
4078
|
+
body: PatchedUniquePasswordPolicyRequestToJSON(requestParameters['patchedUniquePasswordPolicyRequest']),
|
|
4079
|
+
}, initOverrides);
|
|
4080
|
+
|
|
4081
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
4082
|
+
}
|
|
4083
|
+
|
|
4084
|
+
/**
|
|
4085
|
+
* Password Uniqueness Policy Viewset
|
|
4086
|
+
*/
|
|
4087
|
+
async policiesUniquePasswordPartialUpdate(requestParameters: PoliciesUniquePasswordPartialUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<UniquePasswordPolicy> {
|
|
4088
|
+
const response = await this.policiesUniquePasswordPartialUpdateRaw(requestParameters, initOverrides);
|
|
4089
|
+
return await response.value();
|
|
4090
|
+
}
|
|
4091
|
+
|
|
4092
|
+
/**
|
|
4093
|
+
* Password Uniqueness Policy Viewset
|
|
4094
|
+
*/
|
|
4095
|
+
async policiesUniquePasswordRetrieveRaw(requestParameters: PoliciesUniquePasswordRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<UniquePasswordPolicy>> {
|
|
4096
|
+
if (requestParameters['policyUuid'] == null) {
|
|
4097
|
+
throw new runtime.RequiredError(
|
|
4098
|
+
'policyUuid',
|
|
4099
|
+
'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordRetrieve().'
|
|
4100
|
+
);
|
|
4101
|
+
}
|
|
4102
|
+
|
|
4103
|
+
const queryParameters: any = {};
|
|
4104
|
+
|
|
4105
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
4106
|
+
|
|
4107
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
4108
|
+
const token = this.configuration.accessToken;
|
|
4109
|
+
const tokenString = await token("authentik", []);
|
|
4110
|
+
|
|
4111
|
+
if (tokenString) {
|
|
4112
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
4113
|
+
}
|
|
4114
|
+
}
|
|
4115
|
+
const response = await this.request({
|
|
4116
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
4117
|
+
method: 'GET',
|
|
4118
|
+
headers: headerParameters,
|
|
4119
|
+
query: queryParameters,
|
|
4120
|
+
}, initOverrides);
|
|
4121
|
+
|
|
4122
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
4123
|
+
}
|
|
4124
|
+
|
|
4125
|
+
/**
|
|
4126
|
+
* Password Uniqueness Policy Viewset
|
|
4127
|
+
*/
|
|
4128
|
+
async policiesUniquePasswordRetrieve(requestParameters: PoliciesUniquePasswordRetrieveRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<UniquePasswordPolicy> {
|
|
4129
|
+
const response = await this.policiesUniquePasswordRetrieveRaw(requestParameters, initOverrides);
|
|
4130
|
+
return await response.value();
|
|
4131
|
+
}
|
|
4132
|
+
|
|
4133
|
+
/**
|
|
4134
|
+
* Password Uniqueness Policy Viewset
|
|
4135
|
+
*/
|
|
4136
|
+
async policiesUniquePasswordUpdateRaw(requestParameters: PoliciesUniquePasswordUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<UniquePasswordPolicy>> {
|
|
4137
|
+
if (requestParameters['policyUuid'] == null) {
|
|
4138
|
+
throw new runtime.RequiredError(
|
|
4139
|
+
'policyUuid',
|
|
4140
|
+
'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUpdate().'
|
|
4141
|
+
);
|
|
4142
|
+
}
|
|
4143
|
+
|
|
4144
|
+
if (requestParameters['uniquePasswordPolicyRequest'] == null) {
|
|
4145
|
+
throw new runtime.RequiredError(
|
|
4146
|
+
'uniquePasswordPolicyRequest',
|
|
4147
|
+
'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordUpdate().'
|
|
4148
|
+
);
|
|
4149
|
+
}
|
|
4150
|
+
|
|
4151
|
+
const queryParameters: any = {};
|
|
4152
|
+
|
|
4153
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
4154
|
+
|
|
4155
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
4156
|
+
|
|
4157
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
4158
|
+
const token = this.configuration.accessToken;
|
|
4159
|
+
const tokenString = await token("authentik", []);
|
|
4160
|
+
|
|
4161
|
+
if (tokenString) {
|
|
4162
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
4163
|
+
}
|
|
4164
|
+
}
|
|
4165
|
+
const response = await this.request({
|
|
4166
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
4167
|
+
method: 'PUT',
|
|
4168
|
+
headers: headerParameters,
|
|
4169
|
+
query: queryParameters,
|
|
4170
|
+
body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
|
|
4171
|
+
}, initOverrides);
|
|
4172
|
+
|
|
4173
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
4174
|
+
}
|
|
4175
|
+
|
|
4176
|
+
/**
|
|
4177
|
+
* Password Uniqueness Policy Viewset
|
|
4178
|
+
*/
|
|
4179
|
+
async policiesUniquePasswordUpdate(requestParameters: PoliciesUniquePasswordUpdateRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<UniquePasswordPolicy> {
|
|
4180
|
+
const response = await this.policiesUniquePasswordUpdateRaw(requestParameters, initOverrides);
|
|
4181
|
+
return await response.value();
|
|
4182
|
+
}
|
|
4183
|
+
|
|
4184
|
+
/**
|
|
4185
|
+
* Get a list of all objects that use this object
|
|
4186
|
+
*/
|
|
4187
|
+
async policiesUniquePasswordUsedByListRaw(requestParameters: PoliciesUniquePasswordUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<Array<UsedBy>>> {
|
|
4188
|
+
if (requestParameters['policyUuid'] == null) {
|
|
4189
|
+
throw new runtime.RequiredError(
|
|
4190
|
+
'policyUuid',
|
|
4191
|
+
'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUsedByList().'
|
|
4192
|
+
);
|
|
4193
|
+
}
|
|
4194
|
+
|
|
4195
|
+
const queryParameters: any = {};
|
|
4196
|
+
|
|
4197
|
+
const headerParameters: runtime.HTTPHeaders = {};
|
|
4198
|
+
|
|
4199
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
4200
|
+
const token = this.configuration.accessToken;
|
|
4201
|
+
const tokenString = await token("authentik", []);
|
|
4202
|
+
|
|
4203
|
+
if (tokenString) {
|
|
4204
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
4205
|
+
}
|
|
4206
|
+
}
|
|
4207
|
+
const response = await this.request({
|
|
4208
|
+
path: `/policies/unique_password/{policy_uuid}/used_by/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
4209
|
+
method: 'GET',
|
|
4210
|
+
headers: headerParameters,
|
|
4211
|
+
query: queryParameters,
|
|
4212
|
+
}, initOverrides);
|
|
4213
|
+
|
|
4214
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(UsedByFromJSON));
|
|
4215
|
+
}
|
|
4216
|
+
|
|
4217
|
+
/**
|
|
4218
|
+
* Get a list of all objects that use this object
|
|
4219
|
+
*/
|
|
4220
|
+
async policiesUniquePasswordUsedByList(requestParameters: PoliciesUniquePasswordUsedByListRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<Array<UsedBy>> {
|
|
4221
|
+
const response = await this.policiesUniquePasswordUsedByListRaw(requestParameters, initOverrides);
|
|
4222
|
+
return await response.value();
|
|
4223
|
+
}
|
|
4224
|
+
|
|
3834
4225
|
}
|
|
3835
4226
|
|
|
3836
4227
|
/**
|
package/src/apis/RbacApi.ts
CHANGED
|
@@ -1828,6 +1828,7 @@ export const RbacPermissionsAssignedByRolesListModelEnum = {
|
|
|
1828
1828
|
AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
|
|
1829
1829
|
AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
1830
1830
|
AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
1831
|
+
AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
|
|
1831
1832
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
|
|
1832
1833
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
|
|
1833
1834
|
AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
|
@@ -1937,6 +1938,7 @@ export const RbacPermissionsAssignedByUsersListModelEnum = {
|
|
|
1937
1938
|
AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
|
|
1938
1939
|
AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
1939
1940
|
AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
1941
|
+
AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
|
|
1940
1942
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
|
|
1941
1943
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
|
|
1942
1944
|
AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
package/src/models/AppEnum.ts
CHANGED
|
@@ -74,6 +74,7 @@ export const AppEnum = {
|
|
|
74
74
|
AuthentikCore: 'authentik.core',
|
|
75
75
|
AuthentikEnterprise: 'authentik.enterprise',
|
|
76
76
|
AuthentikEnterpriseAudit: 'authentik.enterprise.audit',
|
|
77
|
+
AuthentikEnterprisePoliciesUniquePassword: 'authentik.enterprise.policies.unique_password',
|
|
77
78
|
AuthentikEnterpriseProvidersGoogleWorkspace: 'authentik.enterprise.providers.google_workspace',
|
|
78
79
|
AuthentikEnterpriseProvidersMicrosoftEntra: 'authentik.enterprise.providers.microsoft_entra',
|
|
79
80
|
AuthentikEnterpriseProvidersSsf: 'authentik.enterprise.providers.ssf',
|
|
@@ -145,6 +145,12 @@ export interface IdentificationChallenge {
|
|
|
145
145
|
* @memberof IdentificationChallenge
|
|
146
146
|
*/
|
|
147
147
|
showSourceLabels: boolean;
|
|
148
|
+
/**
|
|
149
|
+
*
|
|
150
|
+
* @type {boolean}
|
|
151
|
+
* @memberof IdentificationChallenge
|
|
152
|
+
*/
|
|
153
|
+
enableRememberMe?: boolean;
|
|
148
154
|
}
|
|
149
155
|
|
|
150
156
|
|
|
@@ -186,6 +192,7 @@ export function IdentificationChallengeFromJSONTyped(json: any, ignoreDiscrimina
|
|
|
186
192
|
'primaryAction': json['primary_action'],
|
|
187
193
|
'sources': json['sources'] == null ? undefined : ((json['sources'] as Array<any>).map(LoginSourceFromJSON)),
|
|
188
194
|
'showSourceLabels': json['show_source_labels'],
|
|
195
|
+
'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
|
|
189
196
|
};
|
|
190
197
|
}
|
|
191
198
|
|
|
@@ -215,6 +222,7 @@ export function IdentificationChallengeToJSONTyped(value?: IdentificationChallen
|
|
|
215
222
|
'primary_action': value['primaryAction'],
|
|
216
223
|
'sources': value['sources'] == null ? undefined : ((value['sources'] as Array<any>).map(LoginSourceToJSON)),
|
|
217
224
|
'show_source_labels': value['showSourceLabels'],
|
|
225
|
+
'enable_remember_me': value['enableRememberMe'],
|
|
218
226
|
};
|
|
219
227
|
}
|
|
220
228
|
|
|
@@ -142,6 +142,12 @@ export interface IdentificationStage {
|
|
|
142
142
|
* @memberof IdentificationStage
|
|
143
143
|
*/
|
|
144
144
|
pretendUserExists?: boolean;
|
|
145
|
+
/**
|
|
146
|
+
* Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
|
|
147
|
+
* @type {boolean}
|
|
148
|
+
* @memberof IdentificationStage
|
|
149
|
+
*/
|
|
150
|
+
enableRememberMe?: boolean;
|
|
145
151
|
}
|
|
146
152
|
|
|
147
153
|
/**
|
|
@@ -185,6 +191,7 @@ export function IdentificationStageFromJSONTyped(json: any, ignoreDiscriminator:
|
|
|
185
191
|
'sources': json['sources'] == null ? undefined : json['sources'],
|
|
186
192
|
'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
|
|
187
193
|
'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
|
|
194
|
+
'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
|
|
188
195
|
};
|
|
189
196
|
}
|
|
190
197
|
|
|
@@ -212,6 +219,7 @@ export function IdentificationStageToJSONTyped(value?: Omit<IdentificationStage,
|
|
|
212
219
|
'sources': value['sources'],
|
|
213
220
|
'show_source_labels': value['showSourceLabels'],
|
|
214
221
|
'pretend_user_exists': value['pretendUserExists'],
|
|
222
|
+
'enable_remember_me': value['enableRememberMe'],
|
|
215
223
|
};
|
|
216
224
|
}
|
|
217
225
|
|
|
@@ -112,6 +112,12 @@ export interface IdentificationStageRequest {
|
|
|
112
112
|
* @memberof IdentificationStageRequest
|
|
113
113
|
*/
|
|
114
114
|
pretendUserExists?: boolean;
|
|
115
|
+
/**
|
|
116
|
+
* Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
|
|
117
|
+
* @type {boolean}
|
|
118
|
+
* @memberof IdentificationStageRequest
|
|
119
|
+
*/
|
|
120
|
+
enableRememberMe?: boolean;
|
|
115
121
|
}
|
|
116
122
|
|
|
117
123
|
/**
|
|
@@ -145,6 +151,7 @@ export function IdentificationStageRequestFromJSONTyped(json: any, ignoreDiscrim
|
|
|
145
151
|
'sources': json['sources'] == null ? undefined : json['sources'],
|
|
146
152
|
'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
|
|
147
153
|
'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
|
|
154
|
+
'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
|
|
148
155
|
};
|
|
149
156
|
}
|
|
150
157
|
|
|
@@ -172,6 +179,7 @@ export function IdentificationStageRequestToJSONTyped(value?: IdentificationStag
|
|
|
172
179
|
'sources': value['sources'],
|
|
173
180
|
'show_source_labels': value['showSourceLabels'],
|
|
174
181
|
'pretend_user_exists': value['pretendUserExists'],
|
|
182
|
+
'enable_remember_me': value['enableRememberMe'],
|
|
175
183
|
};
|
|
176
184
|
}
|
|
177
185
|
|
package/src/models/ModelEnum.ts
CHANGED
|
@@ -108,6 +108,7 @@ export const ModelEnum = {
|
|
|
108
108
|
AuthentikCoreApplicationentitlement: 'authentik_core.applicationentitlement',
|
|
109
109
|
AuthentikCoreToken: 'authentik_core.token',
|
|
110
110
|
AuthentikEnterpriseLicense: 'authentik_enterprise.license',
|
|
111
|
+
AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
|
|
111
112
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
|
|
112
113
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
|
|
113
114
|
AuthentikProvidersMicrosoftEntraMicrosoftentraprovider: 'authentik_providers_microsoft_entra.microsoftentraprovider',
|
|
@@ -0,0 +1,90 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* authentik
|
|
5
|
+
* Making authentication simple.
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 2025.2.4
|
|
8
|
+
* Contact: hello@goauthentik.io
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
|
|
15
|
+
import { mapValues } from '../runtime';
|
|
16
|
+
import type { Pagination } from './Pagination';
|
|
17
|
+
import {
|
|
18
|
+
PaginationFromJSON,
|
|
19
|
+
PaginationFromJSONTyped,
|
|
20
|
+
PaginationToJSON,
|
|
21
|
+
PaginationToJSONTyped,
|
|
22
|
+
} from './Pagination';
|
|
23
|
+
import type { UniquePasswordPolicy } from './UniquePasswordPolicy';
|
|
24
|
+
import {
|
|
25
|
+
UniquePasswordPolicyFromJSON,
|
|
26
|
+
UniquePasswordPolicyFromJSONTyped,
|
|
27
|
+
UniquePasswordPolicyToJSON,
|
|
28
|
+
UniquePasswordPolicyToJSONTyped,
|
|
29
|
+
} from './UniquePasswordPolicy';
|
|
30
|
+
|
|
31
|
+
/**
|
|
32
|
+
*
|
|
33
|
+
* @export
|
|
34
|
+
* @interface PaginatedUniquePasswordPolicyList
|
|
35
|
+
*/
|
|
36
|
+
export interface PaginatedUniquePasswordPolicyList {
|
|
37
|
+
/**
|
|
38
|
+
*
|
|
39
|
+
* @type {Pagination}
|
|
40
|
+
* @memberof PaginatedUniquePasswordPolicyList
|
|
41
|
+
*/
|
|
42
|
+
pagination: Pagination;
|
|
43
|
+
/**
|
|
44
|
+
*
|
|
45
|
+
* @type {Array<UniquePasswordPolicy>}
|
|
46
|
+
* @memberof PaginatedUniquePasswordPolicyList
|
|
47
|
+
*/
|
|
48
|
+
results: Array<UniquePasswordPolicy>;
|
|
49
|
+
}
|
|
50
|
+
|
|
51
|
+
/**
|
|
52
|
+
* Check if a given object implements the PaginatedUniquePasswordPolicyList interface.
|
|
53
|
+
*/
|
|
54
|
+
export function instanceOfPaginatedUniquePasswordPolicyList(value: object): value is PaginatedUniquePasswordPolicyList {
|
|
55
|
+
if (!('pagination' in value) || value['pagination'] === undefined) return false;
|
|
56
|
+
if (!('results' in value) || value['results'] === undefined) return false;
|
|
57
|
+
return true;
|
|
58
|
+
}
|
|
59
|
+
|
|
60
|
+
export function PaginatedUniquePasswordPolicyListFromJSON(json: any): PaginatedUniquePasswordPolicyList {
|
|
61
|
+
return PaginatedUniquePasswordPolicyListFromJSONTyped(json, false);
|
|
62
|
+
}
|
|
63
|
+
|
|
64
|
+
export function PaginatedUniquePasswordPolicyListFromJSONTyped(json: any, ignoreDiscriminator: boolean): PaginatedUniquePasswordPolicyList {
|
|
65
|
+
if (json == null) {
|
|
66
|
+
return json;
|
|
67
|
+
}
|
|
68
|
+
return {
|
|
69
|
+
|
|
70
|
+
'pagination': PaginationFromJSON(json['pagination']),
|
|
71
|
+
'results': ((json['results'] as Array<any>).map(UniquePasswordPolicyFromJSON)),
|
|
72
|
+
};
|
|
73
|
+
}
|
|
74
|
+
|
|
75
|
+
export function PaginatedUniquePasswordPolicyListToJSON(json: any): PaginatedUniquePasswordPolicyList {
|
|
76
|
+
return PaginatedUniquePasswordPolicyListToJSONTyped(json, false);
|
|
77
|
+
}
|
|
78
|
+
|
|
79
|
+
export function PaginatedUniquePasswordPolicyListToJSONTyped(value?: PaginatedUniquePasswordPolicyList | null, ignoreDiscriminator: boolean = false): any {
|
|
80
|
+
if (value == null) {
|
|
81
|
+
return value;
|
|
82
|
+
}
|
|
83
|
+
|
|
84
|
+
return {
|
|
85
|
+
|
|
86
|
+
'pagination': PaginationToJSON(value['pagination']),
|
|
87
|
+
'results': ((value['results'] as Array<any>).map(UniquePasswordPolicyToJSON)),
|
|
88
|
+
};
|
|
89
|
+
}
|
|
90
|
+
|
|
@@ -112,6 +112,12 @@ export interface PatchedIdentificationStageRequest {
|
|
|
112
112
|
* @memberof PatchedIdentificationStageRequest
|
|
113
113
|
*/
|
|
114
114
|
pretendUserExists?: boolean;
|
|
115
|
+
/**
|
|
116
|
+
* Show the user the 'Remember me on this device' toggle, allowing repeat users to skip straight to entering their password.
|
|
117
|
+
* @type {boolean}
|
|
118
|
+
* @memberof PatchedIdentificationStageRequest
|
|
119
|
+
*/
|
|
120
|
+
enableRememberMe?: boolean;
|
|
115
121
|
}
|
|
116
122
|
|
|
117
123
|
/**
|
|
@@ -144,6 +150,7 @@ export function PatchedIdentificationStageRequestFromJSONTyped(json: any, ignore
|
|
|
144
150
|
'sources': json['sources'] == null ? undefined : json['sources'],
|
|
145
151
|
'showSourceLabels': json['show_source_labels'] == null ? undefined : json['show_source_labels'],
|
|
146
152
|
'pretendUserExists': json['pretend_user_exists'] == null ? undefined : json['pretend_user_exists'],
|
|
153
|
+
'enableRememberMe': json['enable_remember_me'] == null ? undefined : json['enable_remember_me'],
|
|
147
154
|
};
|
|
148
155
|
}
|
|
149
156
|
|
|
@@ -171,6 +178,7 @@ export function PatchedIdentificationStageRequestToJSONTyped(value?: PatchedIden
|
|
|
171
178
|
'sources': value['sources'],
|
|
172
179
|
'show_source_labels': value['showSourceLabels'],
|
|
173
180
|
'pretend_user_exists': value['pretendUserExists'],
|
|
181
|
+
'enable_remember_me': value['enableRememberMe'],
|
|
174
182
|
};
|
|
175
183
|
}
|
|
176
184
|
|