@goauthentik/api 2025.2.4-1744886287 → 2025.2.4-1745519715

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (47) hide show
  1. package/.openapi-generator/FILES +4 -0
  2. package/dist/apis/PoliciesApi.d.ts +90 -1
  3. package/dist/apis/PoliciesApi.js +283 -0
  4. package/dist/apis/RbacApi.d.ts +2 -0
  5. package/dist/apis/RbacApi.js +2 -0
  6. package/dist/esm/apis/PoliciesApi.d.ts +90 -1
  7. package/dist/esm/apis/PoliciesApi.js +284 -1
  8. package/dist/esm/apis/RbacApi.d.ts +2 -0
  9. package/dist/esm/apis/RbacApi.js +2 -0
  10. package/dist/esm/models/AppEnum.d.ts +1 -0
  11. package/dist/esm/models/AppEnum.js +1 -0
  12. package/dist/esm/models/ModelEnum.d.ts +1 -0
  13. package/dist/esm/models/ModelEnum.js +1 -0
  14. package/dist/esm/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
  15. package/dist/esm/models/PaginatedUniquePasswordPolicyList.js +49 -0
  16. package/dist/esm/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
  17. package/dist/esm/models/PatchedUniquePasswordPolicyRequest.js +47 -0
  18. package/dist/esm/models/UniquePasswordPolicy.d.ts +86 -0
  19. package/dist/esm/models/UniquePasswordPolicy.js +67 -0
  20. package/dist/esm/models/UniquePasswordPolicyRequest.d.ts +50 -0
  21. package/dist/esm/models/UniquePasswordPolicyRequest.js +49 -0
  22. package/dist/esm/models/index.d.ts +4 -0
  23. package/dist/esm/models/index.js +4 -0
  24. package/dist/models/AppEnum.d.ts +1 -0
  25. package/dist/models/AppEnum.js +1 -0
  26. package/dist/models/ModelEnum.d.ts +1 -0
  27. package/dist/models/ModelEnum.js +1 -0
  28. package/dist/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
  29. package/dist/models/PaginatedUniquePasswordPolicyList.js +56 -0
  30. package/dist/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
  31. package/dist/models/PatchedUniquePasswordPolicyRequest.js +54 -0
  32. package/dist/models/UniquePasswordPolicy.d.ts +86 -0
  33. package/dist/models/UniquePasswordPolicy.js +74 -0
  34. package/dist/models/UniquePasswordPolicyRequest.d.ts +50 -0
  35. package/dist/models/UniquePasswordPolicyRequest.js +56 -0
  36. package/dist/models/index.d.ts +4 -0
  37. package/dist/models/index.js +4 -0
  38. package/package.json +1 -1
  39. package/src/apis/PoliciesApi.ts +391 -0
  40. package/src/apis/RbacApi.ts +2 -0
  41. package/src/models/AppEnum.ts +1 -0
  42. package/src/models/ModelEnum.ts +1 -0
  43. package/src/models/PaginatedUniquePasswordPolicyList.ts +90 -0
  44. package/src/models/PatchedUniquePasswordPolicyRequest.ts +89 -0
  45. package/src/models/UniquePasswordPolicy.ts +138 -0
  46. package/src/models/UniquePasswordPolicyRequest.ts +90 -0
  47. package/src/models/index.ts +4 -0
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
21
21
  });
22
22
  };
23
23
  import * as runtime from '../runtime';
24
- import { CacheFromJSON, DetailedCountryFromJSON, DummyPolicyFromJSON, DummyPolicyRequestToJSON, EventMatcherPolicyFromJSON, EventMatcherPolicyRequestToJSON, ExpressionPolicyFromJSON, ExpressionPolicyRequestToJSON, GeoIPPolicyFromJSON, GeoIPPolicyRequestToJSON, PaginatedDummyPolicyListFromJSON, PaginatedEventMatcherPolicyListFromJSON, PaginatedExpressionPolicyListFromJSON, PaginatedGeoIPPolicyListFromJSON, PaginatedPasswordExpiryPolicyListFromJSON, PaginatedPasswordPolicyListFromJSON, PaginatedPolicyBindingListFromJSON, PaginatedPolicyListFromJSON, PaginatedReputationListFromJSON, PaginatedReputationPolicyListFromJSON, PasswordExpiryPolicyFromJSON, PasswordExpiryPolicyRequestToJSON, PasswordPolicyFromJSON, PasswordPolicyRequestToJSON, PatchedDummyPolicyRequestToJSON, PatchedEventMatcherPolicyRequestToJSON, PatchedExpressionPolicyRequestToJSON, PatchedGeoIPPolicyRequestToJSON, PatchedPasswordExpiryPolicyRequestToJSON, PatchedPasswordPolicyRequestToJSON, PatchedPolicyBindingRequestToJSON, PatchedReputationPolicyRequestToJSON, PolicyFromJSON, PolicyBindingFromJSON, PolicyBindingRequestToJSON, PolicyTestRequestToJSON, PolicyTestResultFromJSON, ReputationFromJSON, ReputationPolicyFromJSON, ReputationPolicyRequestToJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models/index';
24
+ import { CacheFromJSON, DetailedCountryFromJSON, DummyPolicyFromJSON, DummyPolicyRequestToJSON, EventMatcherPolicyFromJSON, EventMatcherPolicyRequestToJSON, ExpressionPolicyFromJSON, ExpressionPolicyRequestToJSON, GeoIPPolicyFromJSON, GeoIPPolicyRequestToJSON, PaginatedDummyPolicyListFromJSON, PaginatedEventMatcherPolicyListFromJSON, PaginatedExpressionPolicyListFromJSON, PaginatedGeoIPPolicyListFromJSON, PaginatedPasswordExpiryPolicyListFromJSON, PaginatedPasswordPolicyListFromJSON, PaginatedPolicyBindingListFromJSON, PaginatedPolicyListFromJSON, PaginatedReputationListFromJSON, PaginatedReputationPolicyListFromJSON, PaginatedUniquePasswordPolicyListFromJSON, PasswordExpiryPolicyFromJSON, PasswordExpiryPolicyRequestToJSON, PasswordPolicyFromJSON, PasswordPolicyRequestToJSON, PatchedDummyPolicyRequestToJSON, PatchedEventMatcherPolicyRequestToJSON, PatchedExpressionPolicyRequestToJSON, PatchedGeoIPPolicyRequestToJSON, PatchedPasswordExpiryPolicyRequestToJSON, PatchedPasswordPolicyRequestToJSON, PatchedPolicyBindingRequestToJSON, PatchedReputationPolicyRequestToJSON, PatchedUniquePasswordPolicyRequestToJSON, PolicyFromJSON, PolicyBindingFromJSON, PolicyBindingRequestToJSON, PolicyTestRequestToJSON, PolicyTestResultFromJSON, ReputationFromJSON, ReputationPolicyFromJSON, ReputationPolicyRequestToJSON, TypeCreateFromJSON, UniquePasswordPolicyFromJSON, UniquePasswordPolicyRequestToJSON, UsedByFromJSON, } from '../models/index';
25
25
  /**
26
26
  *
27
27
  */
@@ -2795,6 +2795,289 @@ export class PoliciesApi extends runtime.BaseAPI {
2795
2795
  return yield response.value();
2796
2796
  });
2797
2797
  }
2798
+ /**
2799
+ * Password Uniqueness Policy Viewset
2800
+ */
2801
+ policiesUniquePasswordCreateRaw(requestParameters, initOverrides) {
2802
+ return __awaiter(this, void 0, void 0, function* () {
2803
+ if (requestParameters['uniquePasswordPolicyRequest'] == null) {
2804
+ throw new runtime.RequiredError('uniquePasswordPolicyRequest', 'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordCreate().');
2805
+ }
2806
+ const queryParameters = {};
2807
+ const headerParameters = {};
2808
+ headerParameters['Content-Type'] = 'application/json';
2809
+ if (this.configuration && this.configuration.accessToken) {
2810
+ const token = this.configuration.accessToken;
2811
+ const tokenString = yield token("authentik", []);
2812
+ if (tokenString) {
2813
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
2814
+ }
2815
+ }
2816
+ const response = yield this.request({
2817
+ path: `/policies/unique_password/`,
2818
+ method: 'POST',
2819
+ headers: headerParameters,
2820
+ query: queryParameters,
2821
+ body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
2822
+ }, initOverrides);
2823
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
2824
+ });
2825
+ }
2826
+ /**
2827
+ * Password Uniqueness Policy Viewset
2828
+ */
2829
+ policiesUniquePasswordCreate(requestParameters, initOverrides) {
2830
+ return __awaiter(this, void 0, void 0, function* () {
2831
+ const response = yield this.policiesUniquePasswordCreateRaw(requestParameters, initOverrides);
2832
+ return yield response.value();
2833
+ });
2834
+ }
2835
+ /**
2836
+ * Password Uniqueness Policy Viewset
2837
+ */
2838
+ policiesUniquePasswordDestroyRaw(requestParameters, initOverrides) {
2839
+ return __awaiter(this, void 0, void 0, function* () {
2840
+ if (requestParameters['policyUuid'] == null) {
2841
+ throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordDestroy().');
2842
+ }
2843
+ const queryParameters = {};
2844
+ const headerParameters = {};
2845
+ if (this.configuration && this.configuration.accessToken) {
2846
+ const token = this.configuration.accessToken;
2847
+ const tokenString = yield token("authentik", []);
2848
+ if (tokenString) {
2849
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
2850
+ }
2851
+ }
2852
+ const response = yield this.request({
2853
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
2854
+ method: 'DELETE',
2855
+ headers: headerParameters,
2856
+ query: queryParameters,
2857
+ }, initOverrides);
2858
+ return new runtime.VoidApiResponse(response);
2859
+ });
2860
+ }
2861
+ /**
2862
+ * Password Uniqueness Policy Viewset
2863
+ */
2864
+ policiesUniquePasswordDestroy(requestParameters, initOverrides) {
2865
+ return __awaiter(this, void 0, void 0, function* () {
2866
+ yield this.policiesUniquePasswordDestroyRaw(requestParameters, initOverrides);
2867
+ });
2868
+ }
2869
+ /**
2870
+ * Password Uniqueness Policy Viewset
2871
+ */
2872
+ policiesUniquePasswordListRaw(requestParameters, initOverrides) {
2873
+ return __awaiter(this, void 0, void 0, function* () {
2874
+ const queryParameters = {};
2875
+ if (requestParameters['created'] != null) {
2876
+ queryParameters['created'] = requestParameters['created'].toISOString();
2877
+ }
2878
+ if (requestParameters['executionLogging'] != null) {
2879
+ queryParameters['execution_logging'] = requestParameters['executionLogging'];
2880
+ }
2881
+ if (requestParameters['lastUpdated'] != null) {
2882
+ queryParameters['last_updated'] = requestParameters['lastUpdated'].toISOString();
2883
+ }
2884
+ if (requestParameters['name'] != null) {
2885
+ queryParameters['name'] = requestParameters['name'];
2886
+ }
2887
+ if (requestParameters['numHistoricalPasswords'] != null) {
2888
+ queryParameters['num_historical_passwords'] = requestParameters['numHistoricalPasswords'];
2889
+ }
2890
+ if (requestParameters['ordering'] != null) {
2891
+ queryParameters['ordering'] = requestParameters['ordering'];
2892
+ }
2893
+ if (requestParameters['page'] != null) {
2894
+ queryParameters['page'] = requestParameters['page'];
2895
+ }
2896
+ if (requestParameters['pageSize'] != null) {
2897
+ queryParameters['page_size'] = requestParameters['pageSize'];
2898
+ }
2899
+ if (requestParameters['passwordField'] != null) {
2900
+ queryParameters['password_field'] = requestParameters['passwordField'];
2901
+ }
2902
+ if (requestParameters['policyUuid'] != null) {
2903
+ queryParameters['policy_uuid'] = requestParameters['policyUuid'];
2904
+ }
2905
+ if (requestParameters['search'] != null) {
2906
+ queryParameters['search'] = requestParameters['search'];
2907
+ }
2908
+ const headerParameters = {};
2909
+ if (this.configuration && this.configuration.accessToken) {
2910
+ const token = this.configuration.accessToken;
2911
+ const tokenString = yield token("authentik", []);
2912
+ if (tokenString) {
2913
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
2914
+ }
2915
+ }
2916
+ const response = yield this.request({
2917
+ path: `/policies/unique_password/`,
2918
+ method: 'GET',
2919
+ headers: headerParameters,
2920
+ query: queryParameters,
2921
+ }, initOverrides);
2922
+ return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedUniquePasswordPolicyListFromJSON(jsonValue));
2923
+ });
2924
+ }
2925
+ /**
2926
+ * Password Uniqueness Policy Viewset
2927
+ */
2928
+ policiesUniquePasswordList() {
2929
+ return __awaiter(this, arguments, void 0, function* (requestParameters = {}, initOverrides) {
2930
+ const response = yield this.policiesUniquePasswordListRaw(requestParameters, initOverrides);
2931
+ return yield response.value();
2932
+ });
2933
+ }
2934
+ /**
2935
+ * Password Uniqueness Policy Viewset
2936
+ */
2937
+ policiesUniquePasswordPartialUpdateRaw(requestParameters, initOverrides) {
2938
+ return __awaiter(this, void 0, void 0, function* () {
2939
+ if (requestParameters['policyUuid'] == null) {
2940
+ throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordPartialUpdate().');
2941
+ }
2942
+ const queryParameters = {};
2943
+ const headerParameters = {};
2944
+ headerParameters['Content-Type'] = 'application/json';
2945
+ if (this.configuration && this.configuration.accessToken) {
2946
+ const token = this.configuration.accessToken;
2947
+ const tokenString = yield token("authentik", []);
2948
+ if (tokenString) {
2949
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
2950
+ }
2951
+ }
2952
+ const response = yield this.request({
2953
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
2954
+ method: 'PATCH',
2955
+ headers: headerParameters,
2956
+ query: queryParameters,
2957
+ body: PatchedUniquePasswordPolicyRequestToJSON(requestParameters['patchedUniquePasswordPolicyRequest']),
2958
+ }, initOverrides);
2959
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
2960
+ });
2961
+ }
2962
+ /**
2963
+ * Password Uniqueness Policy Viewset
2964
+ */
2965
+ policiesUniquePasswordPartialUpdate(requestParameters, initOverrides) {
2966
+ return __awaiter(this, void 0, void 0, function* () {
2967
+ const response = yield this.policiesUniquePasswordPartialUpdateRaw(requestParameters, initOverrides);
2968
+ return yield response.value();
2969
+ });
2970
+ }
2971
+ /**
2972
+ * Password Uniqueness Policy Viewset
2973
+ */
2974
+ policiesUniquePasswordRetrieveRaw(requestParameters, initOverrides) {
2975
+ return __awaiter(this, void 0, void 0, function* () {
2976
+ if (requestParameters['policyUuid'] == null) {
2977
+ throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordRetrieve().');
2978
+ }
2979
+ const queryParameters = {};
2980
+ const headerParameters = {};
2981
+ if (this.configuration && this.configuration.accessToken) {
2982
+ const token = this.configuration.accessToken;
2983
+ const tokenString = yield token("authentik", []);
2984
+ if (tokenString) {
2985
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
2986
+ }
2987
+ }
2988
+ const response = yield this.request({
2989
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
2990
+ method: 'GET',
2991
+ headers: headerParameters,
2992
+ query: queryParameters,
2993
+ }, initOverrides);
2994
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
2995
+ });
2996
+ }
2997
+ /**
2998
+ * Password Uniqueness Policy Viewset
2999
+ */
3000
+ policiesUniquePasswordRetrieve(requestParameters, initOverrides) {
3001
+ return __awaiter(this, void 0, void 0, function* () {
3002
+ const response = yield this.policiesUniquePasswordRetrieveRaw(requestParameters, initOverrides);
3003
+ return yield response.value();
3004
+ });
3005
+ }
3006
+ /**
3007
+ * Password Uniqueness Policy Viewset
3008
+ */
3009
+ policiesUniquePasswordUpdateRaw(requestParameters, initOverrides) {
3010
+ return __awaiter(this, void 0, void 0, function* () {
3011
+ if (requestParameters['policyUuid'] == null) {
3012
+ throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUpdate().');
3013
+ }
3014
+ if (requestParameters['uniquePasswordPolicyRequest'] == null) {
3015
+ throw new runtime.RequiredError('uniquePasswordPolicyRequest', 'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordUpdate().');
3016
+ }
3017
+ const queryParameters = {};
3018
+ const headerParameters = {};
3019
+ headerParameters['Content-Type'] = 'application/json';
3020
+ if (this.configuration && this.configuration.accessToken) {
3021
+ const token = this.configuration.accessToken;
3022
+ const tokenString = yield token("authentik", []);
3023
+ if (tokenString) {
3024
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
3025
+ }
3026
+ }
3027
+ const response = yield this.request({
3028
+ path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
3029
+ method: 'PUT',
3030
+ headers: headerParameters,
3031
+ query: queryParameters,
3032
+ body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
3033
+ }, initOverrides);
3034
+ return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
3035
+ });
3036
+ }
3037
+ /**
3038
+ * Password Uniqueness Policy Viewset
3039
+ */
3040
+ policiesUniquePasswordUpdate(requestParameters, initOverrides) {
3041
+ return __awaiter(this, void 0, void 0, function* () {
3042
+ const response = yield this.policiesUniquePasswordUpdateRaw(requestParameters, initOverrides);
3043
+ return yield response.value();
3044
+ });
3045
+ }
3046
+ /**
3047
+ * Get a list of all objects that use this object
3048
+ */
3049
+ policiesUniquePasswordUsedByListRaw(requestParameters, initOverrides) {
3050
+ return __awaiter(this, void 0, void 0, function* () {
3051
+ if (requestParameters['policyUuid'] == null) {
3052
+ throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUsedByList().');
3053
+ }
3054
+ const queryParameters = {};
3055
+ const headerParameters = {};
3056
+ if (this.configuration && this.configuration.accessToken) {
3057
+ const token = this.configuration.accessToken;
3058
+ const tokenString = yield token("authentik", []);
3059
+ if (tokenString) {
3060
+ headerParameters["Authorization"] = `Bearer ${tokenString}`;
3061
+ }
3062
+ }
3063
+ const response = yield this.request({
3064
+ path: `/policies/unique_password/{policy_uuid}/used_by/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
3065
+ method: 'GET',
3066
+ headers: headerParameters,
3067
+ query: queryParameters,
3068
+ }, initOverrides);
3069
+ return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(UsedByFromJSON));
3070
+ });
3071
+ }
3072
+ /**
3073
+ * Get a list of all objects that use this object
3074
+ */
3075
+ policiesUniquePasswordUsedByList(requestParameters, initOverrides) {
3076
+ return __awaiter(this, void 0, void 0, function* () {
3077
+ const response = yield this.policiesUniquePasswordUsedByListRaw(requestParameters, initOverrides);
3078
+ return yield response.value();
3079
+ });
3080
+ }
2798
3081
  }
2799
3082
  /**
2800
3083
  * @export
@@ -445,6 +445,7 @@ export declare const RbacPermissionsAssignedByRolesListModelEnum: {
445
445
  readonly AuthentikPoliciesGeoipGeoippolicy: "authentik_policies_geoip.geoippolicy";
446
446
  readonly AuthentikPoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
447
447
  readonly AuthentikPoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
448
+ readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
448
449
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
449
450
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
450
451
  readonly AuthentikProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
@@ -554,6 +555,7 @@ export declare const RbacPermissionsAssignedByUsersListModelEnum: {
554
555
  readonly AuthentikPoliciesGeoipGeoippolicy: "authentik_policies_geoip.geoippolicy";
555
556
  readonly AuthentikPoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
556
557
  readonly AuthentikPoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
558
+ readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
557
559
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
558
560
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
559
561
  readonly AuthentikProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
@@ -1326,6 +1326,7 @@ export const RbacPermissionsAssignedByRolesListModelEnum = {
1326
1326
  AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
1327
1327
  AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
1328
1328
  AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
1329
+ AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
1329
1330
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
1330
1331
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
1331
1332
  AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
@@ -1434,6 +1435,7 @@ export const RbacPermissionsAssignedByUsersListModelEnum = {
1434
1435
  AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
1435
1436
  AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
1436
1437
  AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
1438
+ AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
1437
1439
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
1438
1440
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
1439
1441
  AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
@@ -70,6 +70,7 @@ export declare const AppEnum: {
70
70
  readonly AuthentikCore: "authentik.core";
71
71
  readonly AuthentikEnterprise: "authentik.enterprise";
72
72
  readonly AuthentikEnterpriseAudit: "authentik.enterprise.audit";
73
+ readonly AuthentikEnterprisePoliciesUniquePassword: "authentik.enterprise.policies.unique_password";
73
74
  readonly AuthentikEnterpriseProvidersGoogleWorkspace: "authentik.enterprise.providers.google_workspace";
74
75
  readonly AuthentikEnterpriseProvidersMicrosoftEntra: "authentik.enterprise.providers.microsoft_entra";
75
76
  readonly AuthentikEnterpriseProvidersSsf: "authentik.enterprise.providers.ssf";
@@ -72,6 +72,7 @@ export const AppEnum = {
72
72
  AuthentikCore: 'authentik.core',
73
73
  AuthentikEnterprise: 'authentik.enterprise',
74
74
  AuthentikEnterpriseAudit: 'authentik.enterprise.audit',
75
+ AuthentikEnterprisePoliciesUniquePassword: 'authentik.enterprise.policies.unique_password',
75
76
  AuthentikEnterpriseProvidersGoogleWorkspace: 'authentik.enterprise.providers.google_workspace',
76
77
  AuthentikEnterpriseProvidersMicrosoftEntra: 'authentik.enterprise.providers.microsoft_entra',
77
78
  AuthentikEnterpriseProvidersSsf: 'authentik.enterprise.providers.ssf',
@@ -104,6 +104,7 @@ export declare const ModelEnum: {
104
104
  readonly AuthentikCoreApplicationentitlement: "authentik_core.applicationentitlement";
105
105
  readonly AuthentikCoreToken: "authentik_core.token";
106
106
  readonly AuthentikEnterpriseLicense: "authentik_enterprise.license";
107
+ readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
107
108
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
108
109
  readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
109
110
  readonly AuthentikProvidersMicrosoftEntraMicrosoftentraprovider: "authentik_providers_microsoft_entra.microsoftentraprovider";
@@ -106,6 +106,7 @@ export const ModelEnum = {
106
106
  AuthentikCoreApplicationentitlement: 'authentik_core.applicationentitlement',
107
107
  AuthentikCoreToken: 'authentik_core.token',
108
108
  AuthentikEnterpriseLicense: 'authentik_enterprise.license',
109
+ AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
109
110
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
110
111
  AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
111
112
  AuthentikProvidersMicrosoftEntraMicrosoftentraprovider: 'authentik_providers_microsoft_entra.microsoftentraprovider',
@@ -0,0 +1,40 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2025.2.4
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ import type { Pagination } from './Pagination';
13
+ import type { UniquePasswordPolicy } from './UniquePasswordPolicy';
14
+ /**
15
+ *
16
+ * @export
17
+ * @interface PaginatedUniquePasswordPolicyList
18
+ */
19
+ export interface PaginatedUniquePasswordPolicyList {
20
+ /**
21
+ *
22
+ * @type {Pagination}
23
+ * @memberof PaginatedUniquePasswordPolicyList
24
+ */
25
+ pagination: Pagination;
26
+ /**
27
+ *
28
+ * @type {Array<UniquePasswordPolicy>}
29
+ * @memberof PaginatedUniquePasswordPolicyList
30
+ */
31
+ results: Array<UniquePasswordPolicy>;
32
+ }
33
+ /**
34
+ * Check if a given object implements the PaginatedUniquePasswordPolicyList interface.
35
+ */
36
+ export declare function instanceOfPaginatedUniquePasswordPolicyList(value: object): value is PaginatedUniquePasswordPolicyList;
37
+ export declare function PaginatedUniquePasswordPolicyListFromJSON(json: any): PaginatedUniquePasswordPolicyList;
38
+ export declare function PaginatedUniquePasswordPolicyListFromJSONTyped(json: any, ignoreDiscriminator: boolean): PaginatedUniquePasswordPolicyList;
39
+ export declare function PaginatedUniquePasswordPolicyListToJSON(json: any): PaginatedUniquePasswordPolicyList;
40
+ export declare function PaginatedUniquePasswordPolicyListToJSONTyped(value?: PaginatedUniquePasswordPolicyList | null, ignoreDiscriminator?: boolean): any;
@@ -0,0 +1,49 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2025.2.4
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ import { PaginationFromJSON, PaginationToJSON, } from './Pagination';
15
+ import { UniquePasswordPolicyFromJSON, UniquePasswordPolicyToJSON, } from './UniquePasswordPolicy';
16
+ /**
17
+ * Check if a given object implements the PaginatedUniquePasswordPolicyList interface.
18
+ */
19
+ export function instanceOfPaginatedUniquePasswordPolicyList(value) {
20
+ if (!('pagination' in value) || value['pagination'] === undefined)
21
+ return false;
22
+ if (!('results' in value) || value['results'] === undefined)
23
+ return false;
24
+ return true;
25
+ }
26
+ export function PaginatedUniquePasswordPolicyListFromJSON(json) {
27
+ return PaginatedUniquePasswordPolicyListFromJSONTyped(json, false);
28
+ }
29
+ export function PaginatedUniquePasswordPolicyListFromJSONTyped(json, ignoreDiscriminator) {
30
+ if (json == null) {
31
+ return json;
32
+ }
33
+ return {
34
+ 'pagination': PaginationFromJSON(json['pagination']),
35
+ 'results': (json['results'].map(UniquePasswordPolicyFromJSON)),
36
+ };
37
+ }
38
+ export function PaginatedUniquePasswordPolicyListToJSON(json) {
39
+ return PaginatedUniquePasswordPolicyListToJSONTyped(json, false);
40
+ }
41
+ export function PaginatedUniquePasswordPolicyListToJSONTyped(value, ignoreDiscriminator = false) {
42
+ if (value == null) {
43
+ return value;
44
+ }
45
+ return {
46
+ 'pagination': PaginationToJSON(value['pagination']),
47
+ 'results': (value['results'].map(UniquePasswordPolicyToJSON)),
48
+ };
49
+ }
@@ -0,0 +1,50 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2025.2.4
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ * Password Uniqueness Policy Serializer
14
+ * @export
15
+ * @interface PatchedUniquePasswordPolicyRequest
16
+ */
17
+ export interface PatchedUniquePasswordPolicyRequest {
18
+ /**
19
+ *
20
+ * @type {string}
21
+ * @memberof PatchedUniquePasswordPolicyRequest
22
+ */
23
+ name?: string;
24
+ /**
25
+ * When this option is enabled, all executions of this policy will be logged. By default, only execution errors are logged.
26
+ * @type {boolean}
27
+ * @memberof PatchedUniquePasswordPolicyRequest
28
+ */
29
+ executionLogging?: boolean;
30
+ /**
31
+ * Field key to check, field keys defined in Prompt stages are available.
32
+ * @type {string}
33
+ * @memberof PatchedUniquePasswordPolicyRequest
34
+ */
35
+ passwordField?: string;
36
+ /**
37
+ * Number of passwords to check against.
38
+ * @type {number}
39
+ * @memberof PatchedUniquePasswordPolicyRequest
40
+ */
41
+ numHistoricalPasswords?: number;
42
+ }
43
+ /**
44
+ * Check if a given object implements the PatchedUniquePasswordPolicyRequest interface.
45
+ */
46
+ export declare function instanceOfPatchedUniquePasswordPolicyRequest(value: object): value is PatchedUniquePasswordPolicyRequest;
47
+ export declare function PatchedUniquePasswordPolicyRequestFromJSON(json: any): PatchedUniquePasswordPolicyRequest;
48
+ export declare function PatchedUniquePasswordPolicyRequestFromJSONTyped(json: any, ignoreDiscriminator: boolean): PatchedUniquePasswordPolicyRequest;
49
+ export declare function PatchedUniquePasswordPolicyRequestToJSON(json: any): PatchedUniquePasswordPolicyRequest;
50
+ export declare function PatchedUniquePasswordPolicyRequestToJSONTyped(value?: PatchedUniquePasswordPolicyRequest | null, ignoreDiscriminator?: boolean): any;
@@ -0,0 +1,47 @@
1
+ /* tslint:disable */
2
+ /* eslint-disable */
3
+ /**
4
+ * authentik
5
+ * Making authentication simple.
6
+ *
7
+ * The version of the OpenAPI document: 2025.2.4
8
+ * Contact: hello@goauthentik.io
9
+ *
10
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
11
+ * https://openapi-generator.tech
12
+ * Do not edit the class manually.
13
+ */
14
+ /**
15
+ * Check if a given object implements the PatchedUniquePasswordPolicyRequest interface.
16
+ */
17
+ export function instanceOfPatchedUniquePasswordPolicyRequest(value) {
18
+ return true;
19
+ }
20
+ export function PatchedUniquePasswordPolicyRequestFromJSON(json) {
21
+ return PatchedUniquePasswordPolicyRequestFromJSONTyped(json, false);
22
+ }
23
+ export function PatchedUniquePasswordPolicyRequestFromJSONTyped(json, ignoreDiscriminator) {
24
+ if (json == null) {
25
+ return json;
26
+ }
27
+ return {
28
+ 'name': json['name'] == null ? undefined : json['name'],
29
+ 'executionLogging': json['execution_logging'] == null ? undefined : json['execution_logging'],
30
+ 'passwordField': json['password_field'] == null ? undefined : json['password_field'],
31
+ 'numHistoricalPasswords': json['num_historical_passwords'] == null ? undefined : json['num_historical_passwords'],
32
+ };
33
+ }
34
+ export function PatchedUniquePasswordPolicyRequestToJSON(json) {
35
+ return PatchedUniquePasswordPolicyRequestToJSONTyped(json, false);
36
+ }
37
+ export function PatchedUniquePasswordPolicyRequestToJSONTyped(value, ignoreDiscriminator = false) {
38
+ if (value == null) {
39
+ return value;
40
+ }
41
+ return {
42
+ 'name': value['name'],
43
+ 'execution_logging': value['executionLogging'],
44
+ 'password_field': value['passwordField'],
45
+ 'num_historical_passwords': value['numHistoricalPasswords'],
46
+ };
47
+ }
@@ -0,0 +1,86 @@
1
+ /**
2
+ * authentik
3
+ * Making authentication simple.
4
+ *
5
+ * The version of the OpenAPI document: 2025.2.4
6
+ * Contact: hello@goauthentik.io
7
+ *
8
+ * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
9
+ * https://openapi-generator.tech
10
+ * Do not edit the class manually.
11
+ */
12
+ /**
13
+ * Password Uniqueness Policy Serializer
14
+ * @export
15
+ * @interface UniquePasswordPolicy
16
+ */
17
+ export interface UniquePasswordPolicy {
18
+ /**
19
+ *
20
+ * @type {string}
21
+ * @memberof UniquePasswordPolicy
22
+ */
23
+ readonly pk: string;
24
+ /**
25
+ *
26
+ * @type {string}
27
+ * @memberof UniquePasswordPolicy
28
+ */
29
+ name: string;
30
+ /**
31
+ * When this option is enabled, all executions of this policy will be logged. By default, only execution errors are logged.
32
+ * @type {boolean}
33
+ * @memberof UniquePasswordPolicy
34
+ */
35
+ executionLogging?: boolean;
36
+ /**
37
+ * Get object component so that we know how to edit the object
38
+ * @type {string}
39
+ * @memberof UniquePasswordPolicy
40
+ */
41
+ readonly component: string;
42
+ /**
43
+ * Return object's verbose_name
44
+ * @type {string}
45
+ * @memberof UniquePasswordPolicy
46
+ */
47
+ readonly verboseName: string;
48
+ /**
49
+ * Return object's plural verbose_name
50
+ * @type {string}
51
+ * @memberof UniquePasswordPolicy
52
+ */
53
+ readonly verboseNamePlural: string;
54
+ /**
55
+ * Return internal model name
56
+ * @type {string}
57
+ * @memberof UniquePasswordPolicy
58
+ */
59
+ readonly metaModelName: string;
60
+ /**
61
+ * Return objects policy is bound to
62
+ * @type {number}
63
+ * @memberof UniquePasswordPolicy
64
+ */
65
+ readonly boundTo: number;
66
+ /**
67
+ * Field key to check, field keys defined in Prompt stages are available.
68
+ * @type {string}
69
+ * @memberof UniquePasswordPolicy
70
+ */
71
+ passwordField?: string;
72
+ /**
73
+ * Number of passwords to check against.
74
+ * @type {number}
75
+ * @memberof UniquePasswordPolicy
76
+ */
77
+ numHistoricalPasswords?: number;
78
+ }
79
+ /**
80
+ * Check if a given object implements the UniquePasswordPolicy interface.
81
+ */
82
+ export declare function instanceOfUniquePasswordPolicy(value: object): value is UniquePasswordPolicy;
83
+ export declare function UniquePasswordPolicyFromJSON(json: any): UniquePasswordPolicy;
84
+ export declare function UniquePasswordPolicyFromJSONTyped(json: any, ignoreDiscriminator: boolean): UniquePasswordPolicy;
85
+ export declare function UniquePasswordPolicyToJSON(json: any): UniquePasswordPolicy;
86
+ export declare function UniquePasswordPolicyToJSONTyped(value?: Omit<UniquePasswordPolicy, 'pk' | 'component' | 'verbose_name' | 'verbose_name_plural' | 'meta_model_name' | 'bound_to'> | null, ignoreDiscriminator?: boolean): any;