@goauthentik/api 2025.2.4-1744886287 → 2025.2.4-1745519715
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +4 -0
- package/dist/apis/PoliciesApi.d.ts +90 -1
- package/dist/apis/PoliciesApi.js +283 -0
- package/dist/apis/RbacApi.d.ts +2 -0
- package/dist/apis/RbacApi.js +2 -0
- package/dist/esm/apis/PoliciesApi.d.ts +90 -1
- package/dist/esm/apis/PoliciesApi.js +284 -1
- package/dist/esm/apis/RbacApi.d.ts +2 -0
- package/dist/esm/apis/RbacApi.js +2 -0
- package/dist/esm/models/AppEnum.d.ts +1 -0
- package/dist/esm/models/AppEnum.js +1 -0
- package/dist/esm/models/ModelEnum.d.ts +1 -0
- package/dist/esm/models/ModelEnum.js +1 -0
- package/dist/esm/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
- package/dist/esm/models/PaginatedUniquePasswordPolicyList.js +49 -0
- package/dist/esm/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/esm/models/PatchedUniquePasswordPolicyRequest.js +47 -0
- package/dist/esm/models/UniquePasswordPolicy.d.ts +86 -0
- package/dist/esm/models/UniquePasswordPolicy.js +67 -0
- package/dist/esm/models/UniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/esm/models/UniquePasswordPolicyRequest.js +49 -0
- package/dist/esm/models/index.d.ts +4 -0
- package/dist/esm/models/index.js +4 -0
- package/dist/models/AppEnum.d.ts +1 -0
- package/dist/models/AppEnum.js +1 -0
- package/dist/models/ModelEnum.d.ts +1 -0
- package/dist/models/ModelEnum.js +1 -0
- package/dist/models/PaginatedUniquePasswordPolicyList.d.ts +40 -0
- package/dist/models/PaginatedUniquePasswordPolicyList.js +56 -0
- package/dist/models/PatchedUniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/models/PatchedUniquePasswordPolicyRequest.js +54 -0
- package/dist/models/UniquePasswordPolicy.d.ts +86 -0
- package/dist/models/UniquePasswordPolicy.js +74 -0
- package/dist/models/UniquePasswordPolicyRequest.d.ts +50 -0
- package/dist/models/UniquePasswordPolicyRequest.js +56 -0
- package/dist/models/index.d.ts +4 -0
- package/dist/models/index.js +4 -0
- package/package.json +1 -1
- package/src/apis/PoliciesApi.ts +391 -0
- package/src/apis/RbacApi.ts +2 -0
- package/src/models/AppEnum.ts +1 -0
- package/src/models/ModelEnum.ts +1 -0
- package/src/models/PaginatedUniquePasswordPolicyList.ts +90 -0
- package/src/models/PatchedUniquePasswordPolicyRequest.ts +89 -0
- package/src/models/UniquePasswordPolicy.ts +138 -0
- package/src/models/UniquePasswordPolicyRequest.ts +90 -0
- package/src/models/index.ts +4 -0
|
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
|
|
|
21
21
|
});
|
|
22
22
|
};
|
|
23
23
|
import * as runtime from '../runtime';
|
|
24
|
-
import { CacheFromJSON, DetailedCountryFromJSON, DummyPolicyFromJSON, DummyPolicyRequestToJSON, EventMatcherPolicyFromJSON, EventMatcherPolicyRequestToJSON, ExpressionPolicyFromJSON, ExpressionPolicyRequestToJSON, GeoIPPolicyFromJSON, GeoIPPolicyRequestToJSON, PaginatedDummyPolicyListFromJSON, PaginatedEventMatcherPolicyListFromJSON, PaginatedExpressionPolicyListFromJSON, PaginatedGeoIPPolicyListFromJSON, PaginatedPasswordExpiryPolicyListFromJSON, PaginatedPasswordPolicyListFromJSON, PaginatedPolicyBindingListFromJSON, PaginatedPolicyListFromJSON, PaginatedReputationListFromJSON, PaginatedReputationPolicyListFromJSON, PasswordExpiryPolicyFromJSON, PasswordExpiryPolicyRequestToJSON, PasswordPolicyFromJSON, PasswordPolicyRequestToJSON, PatchedDummyPolicyRequestToJSON, PatchedEventMatcherPolicyRequestToJSON, PatchedExpressionPolicyRequestToJSON, PatchedGeoIPPolicyRequestToJSON, PatchedPasswordExpiryPolicyRequestToJSON, PatchedPasswordPolicyRequestToJSON, PatchedPolicyBindingRequestToJSON, PatchedReputationPolicyRequestToJSON, PolicyFromJSON, PolicyBindingFromJSON, PolicyBindingRequestToJSON, PolicyTestRequestToJSON, PolicyTestResultFromJSON, ReputationFromJSON, ReputationPolicyFromJSON, ReputationPolicyRequestToJSON, TypeCreateFromJSON, UsedByFromJSON, } from '../models/index';
|
|
24
|
+
import { CacheFromJSON, DetailedCountryFromJSON, DummyPolicyFromJSON, DummyPolicyRequestToJSON, EventMatcherPolicyFromJSON, EventMatcherPolicyRequestToJSON, ExpressionPolicyFromJSON, ExpressionPolicyRequestToJSON, GeoIPPolicyFromJSON, GeoIPPolicyRequestToJSON, PaginatedDummyPolicyListFromJSON, PaginatedEventMatcherPolicyListFromJSON, PaginatedExpressionPolicyListFromJSON, PaginatedGeoIPPolicyListFromJSON, PaginatedPasswordExpiryPolicyListFromJSON, PaginatedPasswordPolicyListFromJSON, PaginatedPolicyBindingListFromJSON, PaginatedPolicyListFromJSON, PaginatedReputationListFromJSON, PaginatedReputationPolicyListFromJSON, PaginatedUniquePasswordPolicyListFromJSON, PasswordExpiryPolicyFromJSON, PasswordExpiryPolicyRequestToJSON, PasswordPolicyFromJSON, PasswordPolicyRequestToJSON, PatchedDummyPolicyRequestToJSON, PatchedEventMatcherPolicyRequestToJSON, PatchedExpressionPolicyRequestToJSON, PatchedGeoIPPolicyRequestToJSON, PatchedPasswordExpiryPolicyRequestToJSON, PatchedPasswordPolicyRequestToJSON, PatchedPolicyBindingRequestToJSON, PatchedReputationPolicyRequestToJSON, PatchedUniquePasswordPolicyRequestToJSON, PolicyFromJSON, PolicyBindingFromJSON, PolicyBindingRequestToJSON, PolicyTestRequestToJSON, PolicyTestResultFromJSON, ReputationFromJSON, ReputationPolicyFromJSON, ReputationPolicyRequestToJSON, TypeCreateFromJSON, UniquePasswordPolicyFromJSON, UniquePasswordPolicyRequestToJSON, UsedByFromJSON, } from '../models/index';
|
|
25
25
|
/**
|
|
26
26
|
*
|
|
27
27
|
*/
|
|
@@ -2795,6 +2795,289 @@ export class PoliciesApi extends runtime.BaseAPI {
|
|
|
2795
2795
|
return yield response.value();
|
|
2796
2796
|
});
|
|
2797
2797
|
}
|
|
2798
|
+
/**
|
|
2799
|
+
* Password Uniqueness Policy Viewset
|
|
2800
|
+
*/
|
|
2801
|
+
policiesUniquePasswordCreateRaw(requestParameters, initOverrides) {
|
|
2802
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2803
|
+
if (requestParameters['uniquePasswordPolicyRequest'] == null) {
|
|
2804
|
+
throw new runtime.RequiredError('uniquePasswordPolicyRequest', 'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordCreate().');
|
|
2805
|
+
}
|
|
2806
|
+
const queryParameters = {};
|
|
2807
|
+
const headerParameters = {};
|
|
2808
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
2809
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
2810
|
+
const token = this.configuration.accessToken;
|
|
2811
|
+
const tokenString = yield token("authentik", []);
|
|
2812
|
+
if (tokenString) {
|
|
2813
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
2814
|
+
}
|
|
2815
|
+
}
|
|
2816
|
+
const response = yield this.request({
|
|
2817
|
+
path: `/policies/unique_password/`,
|
|
2818
|
+
method: 'POST',
|
|
2819
|
+
headers: headerParameters,
|
|
2820
|
+
query: queryParameters,
|
|
2821
|
+
body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
|
|
2822
|
+
}, initOverrides);
|
|
2823
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
2824
|
+
});
|
|
2825
|
+
}
|
|
2826
|
+
/**
|
|
2827
|
+
* Password Uniqueness Policy Viewset
|
|
2828
|
+
*/
|
|
2829
|
+
policiesUniquePasswordCreate(requestParameters, initOverrides) {
|
|
2830
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2831
|
+
const response = yield this.policiesUniquePasswordCreateRaw(requestParameters, initOverrides);
|
|
2832
|
+
return yield response.value();
|
|
2833
|
+
});
|
|
2834
|
+
}
|
|
2835
|
+
/**
|
|
2836
|
+
* Password Uniqueness Policy Viewset
|
|
2837
|
+
*/
|
|
2838
|
+
policiesUniquePasswordDestroyRaw(requestParameters, initOverrides) {
|
|
2839
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2840
|
+
if (requestParameters['policyUuid'] == null) {
|
|
2841
|
+
throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordDestroy().');
|
|
2842
|
+
}
|
|
2843
|
+
const queryParameters = {};
|
|
2844
|
+
const headerParameters = {};
|
|
2845
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
2846
|
+
const token = this.configuration.accessToken;
|
|
2847
|
+
const tokenString = yield token("authentik", []);
|
|
2848
|
+
if (tokenString) {
|
|
2849
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
2850
|
+
}
|
|
2851
|
+
}
|
|
2852
|
+
const response = yield this.request({
|
|
2853
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
2854
|
+
method: 'DELETE',
|
|
2855
|
+
headers: headerParameters,
|
|
2856
|
+
query: queryParameters,
|
|
2857
|
+
}, initOverrides);
|
|
2858
|
+
return new runtime.VoidApiResponse(response);
|
|
2859
|
+
});
|
|
2860
|
+
}
|
|
2861
|
+
/**
|
|
2862
|
+
* Password Uniqueness Policy Viewset
|
|
2863
|
+
*/
|
|
2864
|
+
policiesUniquePasswordDestroy(requestParameters, initOverrides) {
|
|
2865
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2866
|
+
yield this.policiesUniquePasswordDestroyRaw(requestParameters, initOverrides);
|
|
2867
|
+
});
|
|
2868
|
+
}
|
|
2869
|
+
/**
|
|
2870
|
+
* Password Uniqueness Policy Viewset
|
|
2871
|
+
*/
|
|
2872
|
+
policiesUniquePasswordListRaw(requestParameters, initOverrides) {
|
|
2873
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2874
|
+
const queryParameters = {};
|
|
2875
|
+
if (requestParameters['created'] != null) {
|
|
2876
|
+
queryParameters['created'] = requestParameters['created'].toISOString();
|
|
2877
|
+
}
|
|
2878
|
+
if (requestParameters['executionLogging'] != null) {
|
|
2879
|
+
queryParameters['execution_logging'] = requestParameters['executionLogging'];
|
|
2880
|
+
}
|
|
2881
|
+
if (requestParameters['lastUpdated'] != null) {
|
|
2882
|
+
queryParameters['last_updated'] = requestParameters['lastUpdated'].toISOString();
|
|
2883
|
+
}
|
|
2884
|
+
if (requestParameters['name'] != null) {
|
|
2885
|
+
queryParameters['name'] = requestParameters['name'];
|
|
2886
|
+
}
|
|
2887
|
+
if (requestParameters['numHistoricalPasswords'] != null) {
|
|
2888
|
+
queryParameters['num_historical_passwords'] = requestParameters['numHistoricalPasswords'];
|
|
2889
|
+
}
|
|
2890
|
+
if (requestParameters['ordering'] != null) {
|
|
2891
|
+
queryParameters['ordering'] = requestParameters['ordering'];
|
|
2892
|
+
}
|
|
2893
|
+
if (requestParameters['page'] != null) {
|
|
2894
|
+
queryParameters['page'] = requestParameters['page'];
|
|
2895
|
+
}
|
|
2896
|
+
if (requestParameters['pageSize'] != null) {
|
|
2897
|
+
queryParameters['page_size'] = requestParameters['pageSize'];
|
|
2898
|
+
}
|
|
2899
|
+
if (requestParameters['passwordField'] != null) {
|
|
2900
|
+
queryParameters['password_field'] = requestParameters['passwordField'];
|
|
2901
|
+
}
|
|
2902
|
+
if (requestParameters['policyUuid'] != null) {
|
|
2903
|
+
queryParameters['policy_uuid'] = requestParameters['policyUuid'];
|
|
2904
|
+
}
|
|
2905
|
+
if (requestParameters['search'] != null) {
|
|
2906
|
+
queryParameters['search'] = requestParameters['search'];
|
|
2907
|
+
}
|
|
2908
|
+
const headerParameters = {};
|
|
2909
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
2910
|
+
const token = this.configuration.accessToken;
|
|
2911
|
+
const tokenString = yield token("authentik", []);
|
|
2912
|
+
if (tokenString) {
|
|
2913
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
2914
|
+
}
|
|
2915
|
+
}
|
|
2916
|
+
const response = yield this.request({
|
|
2917
|
+
path: `/policies/unique_password/`,
|
|
2918
|
+
method: 'GET',
|
|
2919
|
+
headers: headerParameters,
|
|
2920
|
+
query: queryParameters,
|
|
2921
|
+
}, initOverrides);
|
|
2922
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => PaginatedUniquePasswordPolicyListFromJSON(jsonValue));
|
|
2923
|
+
});
|
|
2924
|
+
}
|
|
2925
|
+
/**
|
|
2926
|
+
* Password Uniqueness Policy Viewset
|
|
2927
|
+
*/
|
|
2928
|
+
policiesUniquePasswordList() {
|
|
2929
|
+
return __awaiter(this, arguments, void 0, function* (requestParameters = {}, initOverrides) {
|
|
2930
|
+
const response = yield this.policiesUniquePasswordListRaw(requestParameters, initOverrides);
|
|
2931
|
+
return yield response.value();
|
|
2932
|
+
});
|
|
2933
|
+
}
|
|
2934
|
+
/**
|
|
2935
|
+
* Password Uniqueness Policy Viewset
|
|
2936
|
+
*/
|
|
2937
|
+
policiesUniquePasswordPartialUpdateRaw(requestParameters, initOverrides) {
|
|
2938
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2939
|
+
if (requestParameters['policyUuid'] == null) {
|
|
2940
|
+
throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordPartialUpdate().');
|
|
2941
|
+
}
|
|
2942
|
+
const queryParameters = {};
|
|
2943
|
+
const headerParameters = {};
|
|
2944
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
2945
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
2946
|
+
const token = this.configuration.accessToken;
|
|
2947
|
+
const tokenString = yield token("authentik", []);
|
|
2948
|
+
if (tokenString) {
|
|
2949
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
2950
|
+
}
|
|
2951
|
+
}
|
|
2952
|
+
const response = yield this.request({
|
|
2953
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
2954
|
+
method: 'PATCH',
|
|
2955
|
+
headers: headerParameters,
|
|
2956
|
+
query: queryParameters,
|
|
2957
|
+
body: PatchedUniquePasswordPolicyRequestToJSON(requestParameters['patchedUniquePasswordPolicyRequest']),
|
|
2958
|
+
}, initOverrides);
|
|
2959
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
2960
|
+
});
|
|
2961
|
+
}
|
|
2962
|
+
/**
|
|
2963
|
+
* Password Uniqueness Policy Viewset
|
|
2964
|
+
*/
|
|
2965
|
+
policiesUniquePasswordPartialUpdate(requestParameters, initOverrides) {
|
|
2966
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2967
|
+
const response = yield this.policiesUniquePasswordPartialUpdateRaw(requestParameters, initOverrides);
|
|
2968
|
+
return yield response.value();
|
|
2969
|
+
});
|
|
2970
|
+
}
|
|
2971
|
+
/**
|
|
2972
|
+
* Password Uniqueness Policy Viewset
|
|
2973
|
+
*/
|
|
2974
|
+
policiesUniquePasswordRetrieveRaw(requestParameters, initOverrides) {
|
|
2975
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
2976
|
+
if (requestParameters['policyUuid'] == null) {
|
|
2977
|
+
throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordRetrieve().');
|
|
2978
|
+
}
|
|
2979
|
+
const queryParameters = {};
|
|
2980
|
+
const headerParameters = {};
|
|
2981
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
2982
|
+
const token = this.configuration.accessToken;
|
|
2983
|
+
const tokenString = yield token("authentik", []);
|
|
2984
|
+
if (tokenString) {
|
|
2985
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
2986
|
+
}
|
|
2987
|
+
}
|
|
2988
|
+
const response = yield this.request({
|
|
2989
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
2990
|
+
method: 'GET',
|
|
2991
|
+
headers: headerParameters,
|
|
2992
|
+
query: queryParameters,
|
|
2993
|
+
}, initOverrides);
|
|
2994
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
2995
|
+
});
|
|
2996
|
+
}
|
|
2997
|
+
/**
|
|
2998
|
+
* Password Uniqueness Policy Viewset
|
|
2999
|
+
*/
|
|
3000
|
+
policiesUniquePasswordRetrieve(requestParameters, initOverrides) {
|
|
3001
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
3002
|
+
const response = yield this.policiesUniquePasswordRetrieveRaw(requestParameters, initOverrides);
|
|
3003
|
+
return yield response.value();
|
|
3004
|
+
});
|
|
3005
|
+
}
|
|
3006
|
+
/**
|
|
3007
|
+
* Password Uniqueness Policy Viewset
|
|
3008
|
+
*/
|
|
3009
|
+
policiesUniquePasswordUpdateRaw(requestParameters, initOverrides) {
|
|
3010
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
3011
|
+
if (requestParameters['policyUuid'] == null) {
|
|
3012
|
+
throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUpdate().');
|
|
3013
|
+
}
|
|
3014
|
+
if (requestParameters['uniquePasswordPolicyRequest'] == null) {
|
|
3015
|
+
throw new runtime.RequiredError('uniquePasswordPolicyRequest', 'Required parameter "uniquePasswordPolicyRequest" was null or undefined when calling policiesUniquePasswordUpdate().');
|
|
3016
|
+
}
|
|
3017
|
+
const queryParameters = {};
|
|
3018
|
+
const headerParameters = {};
|
|
3019
|
+
headerParameters['Content-Type'] = 'application/json';
|
|
3020
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
3021
|
+
const token = this.configuration.accessToken;
|
|
3022
|
+
const tokenString = yield token("authentik", []);
|
|
3023
|
+
if (tokenString) {
|
|
3024
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
3025
|
+
}
|
|
3026
|
+
}
|
|
3027
|
+
const response = yield this.request({
|
|
3028
|
+
path: `/policies/unique_password/{policy_uuid}/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
3029
|
+
method: 'PUT',
|
|
3030
|
+
headers: headerParameters,
|
|
3031
|
+
query: queryParameters,
|
|
3032
|
+
body: UniquePasswordPolicyRequestToJSON(requestParameters['uniquePasswordPolicyRequest']),
|
|
3033
|
+
}, initOverrides);
|
|
3034
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => UniquePasswordPolicyFromJSON(jsonValue));
|
|
3035
|
+
});
|
|
3036
|
+
}
|
|
3037
|
+
/**
|
|
3038
|
+
* Password Uniqueness Policy Viewset
|
|
3039
|
+
*/
|
|
3040
|
+
policiesUniquePasswordUpdate(requestParameters, initOverrides) {
|
|
3041
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
3042
|
+
const response = yield this.policiesUniquePasswordUpdateRaw(requestParameters, initOverrides);
|
|
3043
|
+
return yield response.value();
|
|
3044
|
+
});
|
|
3045
|
+
}
|
|
3046
|
+
/**
|
|
3047
|
+
* Get a list of all objects that use this object
|
|
3048
|
+
*/
|
|
3049
|
+
policiesUniquePasswordUsedByListRaw(requestParameters, initOverrides) {
|
|
3050
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
3051
|
+
if (requestParameters['policyUuid'] == null) {
|
|
3052
|
+
throw new runtime.RequiredError('policyUuid', 'Required parameter "policyUuid" was null or undefined when calling policiesUniquePasswordUsedByList().');
|
|
3053
|
+
}
|
|
3054
|
+
const queryParameters = {};
|
|
3055
|
+
const headerParameters = {};
|
|
3056
|
+
if (this.configuration && this.configuration.accessToken) {
|
|
3057
|
+
const token = this.configuration.accessToken;
|
|
3058
|
+
const tokenString = yield token("authentik", []);
|
|
3059
|
+
if (tokenString) {
|
|
3060
|
+
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
|
3061
|
+
}
|
|
3062
|
+
}
|
|
3063
|
+
const response = yield this.request({
|
|
3064
|
+
path: `/policies/unique_password/{policy_uuid}/used_by/`.replace(`{${"policy_uuid"}}`, encodeURIComponent(String(requestParameters['policyUuid']))),
|
|
3065
|
+
method: 'GET',
|
|
3066
|
+
headers: headerParameters,
|
|
3067
|
+
query: queryParameters,
|
|
3068
|
+
}, initOverrides);
|
|
3069
|
+
return new runtime.JSONApiResponse(response, (jsonValue) => jsonValue.map(UsedByFromJSON));
|
|
3070
|
+
});
|
|
3071
|
+
}
|
|
3072
|
+
/**
|
|
3073
|
+
* Get a list of all objects that use this object
|
|
3074
|
+
*/
|
|
3075
|
+
policiesUniquePasswordUsedByList(requestParameters, initOverrides) {
|
|
3076
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
3077
|
+
const response = yield this.policiesUniquePasswordUsedByListRaw(requestParameters, initOverrides);
|
|
3078
|
+
return yield response.value();
|
|
3079
|
+
});
|
|
3080
|
+
}
|
|
2798
3081
|
}
|
|
2799
3082
|
/**
|
|
2800
3083
|
* @export
|
|
@@ -445,6 +445,7 @@ export declare const RbacPermissionsAssignedByRolesListModelEnum: {
|
|
|
445
445
|
readonly AuthentikPoliciesGeoipGeoippolicy: "authentik_policies_geoip.geoippolicy";
|
|
446
446
|
readonly AuthentikPoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
|
|
447
447
|
readonly AuthentikPoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
|
|
448
|
+
readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
|
|
448
449
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
|
|
449
450
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
|
|
450
451
|
readonly AuthentikProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
|
|
@@ -554,6 +555,7 @@ export declare const RbacPermissionsAssignedByUsersListModelEnum: {
|
|
|
554
555
|
readonly AuthentikPoliciesGeoipGeoippolicy: "authentik_policies_geoip.geoippolicy";
|
|
555
556
|
readonly AuthentikPoliciesPasswordPasswordpolicy: "authentik_policies_password.passwordpolicy";
|
|
556
557
|
readonly AuthentikPoliciesReputationReputationpolicy: "authentik_policies_reputation.reputationpolicy";
|
|
558
|
+
readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
|
|
557
559
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
|
|
558
560
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
|
|
559
561
|
readonly AuthentikProvidersLdapLdapprovider: "authentik_providers_ldap.ldapprovider";
|
package/dist/esm/apis/RbacApi.js
CHANGED
|
@@ -1326,6 +1326,7 @@ export const RbacPermissionsAssignedByRolesListModelEnum = {
|
|
|
1326
1326
|
AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
|
|
1327
1327
|
AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
1328
1328
|
AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
1329
|
+
AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
|
|
1329
1330
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
|
|
1330
1331
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
|
|
1331
1332
|
AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
|
@@ -1434,6 +1435,7 @@ export const RbacPermissionsAssignedByUsersListModelEnum = {
|
|
|
1434
1435
|
AuthentikPoliciesGeoipGeoippolicy: 'authentik_policies_geoip.geoippolicy',
|
|
1435
1436
|
AuthentikPoliciesPasswordPasswordpolicy: 'authentik_policies_password.passwordpolicy',
|
|
1436
1437
|
AuthentikPoliciesReputationReputationpolicy: 'authentik_policies_reputation.reputationpolicy',
|
|
1438
|
+
AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
|
|
1437
1439
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
|
|
1438
1440
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
|
|
1439
1441
|
AuthentikProvidersLdapLdapprovider: 'authentik_providers_ldap.ldapprovider',
|
|
@@ -70,6 +70,7 @@ export declare const AppEnum: {
|
|
|
70
70
|
readonly AuthentikCore: "authentik.core";
|
|
71
71
|
readonly AuthentikEnterprise: "authentik.enterprise";
|
|
72
72
|
readonly AuthentikEnterpriseAudit: "authentik.enterprise.audit";
|
|
73
|
+
readonly AuthentikEnterprisePoliciesUniquePassword: "authentik.enterprise.policies.unique_password";
|
|
73
74
|
readonly AuthentikEnterpriseProvidersGoogleWorkspace: "authentik.enterprise.providers.google_workspace";
|
|
74
75
|
readonly AuthentikEnterpriseProvidersMicrosoftEntra: "authentik.enterprise.providers.microsoft_entra";
|
|
75
76
|
readonly AuthentikEnterpriseProvidersSsf: "authentik.enterprise.providers.ssf";
|
|
@@ -72,6 +72,7 @@ export const AppEnum = {
|
|
|
72
72
|
AuthentikCore: 'authentik.core',
|
|
73
73
|
AuthentikEnterprise: 'authentik.enterprise',
|
|
74
74
|
AuthentikEnterpriseAudit: 'authentik.enterprise.audit',
|
|
75
|
+
AuthentikEnterprisePoliciesUniquePassword: 'authentik.enterprise.policies.unique_password',
|
|
75
76
|
AuthentikEnterpriseProvidersGoogleWorkspace: 'authentik.enterprise.providers.google_workspace',
|
|
76
77
|
AuthentikEnterpriseProvidersMicrosoftEntra: 'authentik.enterprise.providers.microsoft_entra',
|
|
77
78
|
AuthentikEnterpriseProvidersSsf: 'authentik.enterprise.providers.ssf',
|
|
@@ -104,6 +104,7 @@ export declare const ModelEnum: {
|
|
|
104
104
|
readonly AuthentikCoreApplicationentitlement: "authentik_core.applicationentitlement";
|
|
105
105
|
readonly AuthentikCoreToken: "authentik_core.token";
|
|
106
106
|
readonly AuthentikEnterpriseLicense: "authentik_enterprise.license";
|
|
107
|
+
readonly AuthentikPoliciesUniquePasswordUniquepasswordpolicy: "authentik_policies_unique_password.uniquepasswordpolicy";
|
|
107
108
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: "authentik_providers_google_workspace.googleworkspaceprovider";
|
|
108
109
|
readonly AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: "authentik_providers_google_workspace.googleworkspaceprovidermapping";
|
|
109
110
|
readonly AuthentikProvidersMicrosoftEntraMicrosoftentraprovider: "authentik_providers_microsoft_entra.microsoftentraprovider";
|
|
@@ -106,6 +106,7 @@ export const ModelEnum = {
|
|
|
106
106
|
AuthentikCoreApplicationentitlement: 'authentik_core.applicationentitlement',
|
|
107
107
|
AuthentikCoreToken: 'authentik_core.token',
|
|
108
108
|
AuthentikEnterpriseLicense: 'authentik_enterprise.license',
|
|
109
|
+
AuthentikPoliciesUniquePasswordUniquepasswordpolicy: 'authentik_policies_unique_password.uniquepasswordpolicy',
|
|
109
110
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovider: 'authentik_providers_google_workspace.googleworkspaceprovider',
|
|
110
111
|
AuthentikProvidersGoogleWorkspaceGoogleworkspaceprovidermapping: 'authentik_providers_google_workspace.googleworkspaceprovidermapping',
|
|
111
112
|
AuthentikProvidersMicrosoftEntraMicrosoftentraprovider: 'authentik_providers_microsoft_entra.microsoftentraprovider',
|
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2025.2.4
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import type { Pagination } from './Pagination';
|
|
13
|
+
import type { UniquePasswordPolicy } from './UniquePasswordPolicy';
|
|
14
|
+
/**
|
|
15
|
+
*
|
|
16
|
+
* @export
|
|
17
|
+
* @interface PaginatedUniquePasswordPolicyList
|
|
18
|
+
*/
|
|
19
|
+
export interface PaginatedUniquePasswordPolicyList {
|
|
20
|
+
/**
|
|
21
|
+
*
|
|
22
|
+
* @type {Pagination}
|
|
23
|
+
* @memberof PaginatedUniquePasswordPolicyList
|
|
24
|
+
*/
|
|
25
|
+
pagination: Pagination;
|
|
26
|
+
/**
|
|
27
|
+
*
|
|
28
|
+
* @type {Array<UniquePasswordPolicy>}
|
|
29
|
+
* @memberof PaginatedUniquePasswordPolicyList
|
|
30
|
+
*/
|
|
31
|
+
results: Array<UniquePasswordPolicy>;
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* Check if a given object implements the PaginatedUniquePasswordPolicyList interface.
|
|
35
|
+
*/
|
|
36
|
+
export declare function instanceOfPaginatedUniquePasswordPolicyList(value: object): value is PaginatedUniquePasswordPolicyList;
|
|
37
|
+
export declare function PaginatedUniquePasswordPolicyListFromJSON(json: any): PaginatedUniquePasswordPolicyList;
|
|
38
|
+
export declare function PaginatedUniquePasswordPolicyListFromJSONTyped(json: any, ignoreDiscriminator: boolean): PaginatedUniquePasswordPolicyList;
|
|
39
|
+
export declare function PaginatedUniquePasswordPolicyListToJSON(json: any): PaginatedUniquePasswordPolicyList;
|
|
40
|
+
export declare function PaginatedUniquePasswordPolicyListToJSONTyped(value?: PaginatedUniquePasswordPolicyList | null, ignoreDiscriminator?: boolean): any;
|
|
@@ -0,0 +1,49 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* authentik
|
|
5
|
+
* Making authentication simple.
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 2025.2.4
|
|
8
|
+
* Contact: hello@goauthentik.io
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
import { PaginationFromJSON, PaginationToJSON, } from './Pagination';
|
|
15
|
+
import { UniquePasswordPolicyFromJSON, UniquePasswordPolicyToJSON, } from './UniquePasswordPolicy';
|
|
16
|
+
/**
|
|
17
|
+
* Check if a given object implements the PaginatedUniquePasswordPolicyList interface.
|
|
18
|
+
*/
|
|
19
|
+
export function instanceOfPaginatedUniquePasswordPolicyList(value) {
|
|
20
|
+
if (!('pagination' in value) || value['pagination'] === undefined)
|
|
21
|
+
return false;
|
|
22
|
+
if (!('results' in value) || value['results'] === undefined)
|
|
23
|
+
return false;
|
|
24
|
+
return true;
|
|
25
|
+
}
|
|
26
|
+
export function PaginatedUniquePasswordPolicyListFromJSON(json) {
|
|
27
|
+
return PaginatedUniquePasswordPolicyListFromJSONTyped(json, false);
|
|
28
|
+
}
|
|
29
|
+
export function PaginatedUniquePasswordPolicyListFromJSONTyped(json, ignoreDiscriminator) {
|
|
30
|
+
if (json == null) {
|
|
31
|
+
return json;
|
|
32
|
+
}
|
|
33
|
+
return {
|
|
34
|
+
'pagination': PaginationFromJSON(json['pagination']),
|
|
35
|
+
'results': (json['results'].map(UniquePasswordPolicyFromJSON)),
|
|
36
|
+
};
|
|
37
|
+
}
|
|
38
|
+
export function PaginatedUniquePasswordPolicyListToJSON(json) {
|
|
39
|
+
return PaginatedUniquePasswordPolicyListToJSONTyped(json, false);
|
|
40
|
+
}
|
|
41
|
+
export function PaginatedUniquePasswordPolicyListToJSONTyped(value, ignoreDiscriminator = false) {
|
|
42
|
+
if (value == null) {
|
|
43
|
+
return value;
|
|
44
|
+
}
|
|
45
|
+
return {
|
|
46
|
+
'pagination': PaginationToJSON(value['pagination']),
|
|
47
|
+
'results': (value['results'].map(UniquePasswordPolicyToJSON)),
|
|
48
|
+
};
|
|
49
|
+
}
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2025.2.4
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
* Password Uniqueness Policy Serializer
|
|
14
|
+
* @export
|
|
15
|
+
* @interface PatchedUniquePasswordPolicyRequest
|
|
16
|
+
*/
|
|
17
|
+
export interface PatchedUniquePasswordPolicyRequest {
|
|
18
|
+
/**
|
|
19
|
+
*
|
|
20
|
+
* @type {string}
|
|
21
|
+
* @memberof PatchedUniquePasswordPolicyRequest
|
|
22
|
+
*/
|
|
23
|
+
name?: string;
|
|
24
|
+
/**
|
|
25
|
+
* When this option is enabled, all executions of this policy will be logged. By default, only execution errors are logged.
|
|
26
|
+
* @type {boolean}
|
|
27
|
+
* @memberof PatchedUniquePasswordPolicyRequest
|
|
28
|
+
*/
|
|
29
|
+
executionLogging?: boolean;
|
|
30
|
+
/**
|
|
31
|
+
* Field key to check, field keys defined in Prompt stages are available.
|
|
32
|
+
* @type {string}
|
|
33
|
+
* @memberof PatchedUniquePasswordPolicyRequest
|
|
34
|
+
*/
|
|
35
|
+
passwordField?: string;
|
|
36
|
+
/**
|
|
37
|
+
* Number of passwords to check against.
|
|
38
|
+
* @type {number}
|
|
39
|
+
* @memberof PatchedUniquePasswordPolicyRequest
|
|
40
|
+
*/
|
|
41
|
+
numHistoricalPasswords?: number;
|
|
42
|
+
}
|
|
43
|
+
/**
|
|
44
|
+
* Check if a given object implements the PatchedUniquePasswordPolicyRequest interface.
|
|
45
|
+
*/
|
|
46
|
+
export declare function instanceOfPatchedUniquePasswordPolicyRequest(value: object): value is PatchedUniquePasswordPolicyRequest;
|
|
47
|
+
export declare function PatchedUniquePasswordPolicyRequestFromJSON(json: any): PatchedUniquePasswordPolicyRequest;
|
|
48
|
+
export declare function PatchedUniquePasswordPolicyRequestFromJSONTyped(json: any, ignoreDiscriminator: boolean): PatchedUniquePasswordPolicyRequest;
|
|
49
|
+
export declare function PatchedUniquePasswordPolicyRequestToJSON(json: any): PatchedUniquePasswordPolicyRequest;
|
|
50
|
+
export declare function PatchedUniquePasswordPolicyRequestToJSONTyped(value?: PatchedUniquePasswordPolicyRequest | null, ignoreDiscriminator?: boolean): any;
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
/* tslint:disable */
|
|
2
|
+
/* eslint-disable */
|
|
3
|
+
/**
|
|
4
|
+
* authentik
|
|
5
|
+
* Making authentication simple.
|
|
6
|
+
*
|
|
7
|
+
* The version of the OpenAPI document: 2025.2.4
|
|
8
|
+
* Contact: hello@goauthentik.io
|
|
9
|
+
*
|
|
10
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
11
|
+
* https://openapi-generator.tech
|
|
12
|
+
* Do not edit the class manually.
|
|
13
|
+
*/
|
|
14
|
+
/**
|
|
15
|
+
* Check if a given object implements the PatchedUniquePasswordPolicyRequest interface.
|
|
16
|
+
*/
|
|
17
|
+
export function instanceOfPatchedUniquePasswordPolicyRequest(value) {
|
|
18
|
+
return true;
|
|
19
|
+
}
|
|
20
|
+
export function PatchedUniquePasswordPolicyRequestFromJSON(json) {
|
|
21
|
+
return PatchedUniquePasswordPolicyRequestFromJSONTyped(json, false);
|
|
22
|
+
}
|
|
23
|
+
export function PatchedUniquePasswordPolicyRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
24
|
+
if (json == null) {
|
|
25
|
+
return json;
|
|
26
|
+
}
|
|
27
|
+
return {
|
|
28
|
+
'name': json['name'] == null ? undefined : json['name'],
|
|
29
|
+
'executionLogging': json['execution_logging'] == null ? undefined : json['execution_logging'],
|
|
30
|
+
'passwordField': json['password_field'] == null ? undefined : json['password_field'],
|
|
31
|
+
'numHistoricalPasswords': json['num_historical_passwords'] == null ? undefined : json['num_historical_passwords'],
|
|
32
|
+
};
|
|
33
|
+
}
|
|
34
|
+
export function PatchedUniquePasswordPolicyRequestToJSON(json) {
|
|
35
|
+
return PatchedUniquePasswordPolicyRequestToJSONTyped(json, false);
|
|
36
|
+
}
|
|
37
|
+
export function PatchedUniquePasswordPolicyRequestToJSONTyped(value, ignoreDiscriminator = false) {
|
|
38
|
+
if (value == null) {
|
|
39
|
+
return value;
|
|
40
|
+
}
|
|
41
|
+
return {
|
|
42
|
+
'name': value['name'],
|
|
43
|
+
'execution_logging': value['executionLogging'],
|
|
44
|
+
'password_field': value['passwordField'],
|
|
45
|
+
'num_historical_passwords': value['numHistoricalPasswords'],
|
|
46
|
+
};
|
|
47
|
+
}
|
|
@@ -0,0 +1,86 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* authentik
|
|
3
|
+
* Making authentication simple.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 2025.2.4
|
|
6
|
+
* Contact: hello@goauthentik.io
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
/**
|
|
13
|
+
* Password Uniqueness Policy Serializer
|
|
14
|
+
* @export
|
|
15
|
+
* @interface UniquePasswordPolicy
|
|
16
|
+
*/
|
|
17
|
+
export interface UniquePasswordPolicy {
|
|
18
|
+
/**
|
|
19
|
+
*
|
|
20
|
+
* @type {string}
|
|
21
|
+
* @memberof UniquePasswordPolicy
|
|
22
|
+
*/
|
|
23
|
+
readonly pk: string;
|
|
24
|
+
/**
|
|
25
|
+
*
|
|
26
|
+
* @type {string}
|
|
27
|
+
* @memberof UniquePasswordPolicy
|
|
28
|
+
*/
|
|
29
|
+
name: string;
|
|
30
|
+
/**
|
|
31
|
+
* When this option is enabled, all executions of this policy will be logged. By default, only execution errors are logged.
|
|
32
|
+
* @type {boolean}
|
|
33
|
+
* @memberof UniquePasswordPolicy
|
|
34
|
+
*/
|
|
35
|
+
executionLogging?: boolean;
|
|
36
|
+
/**
|
|
37
|
+
* Get object component so that we know how to edit the object
|
|
38
|
+
* @type {string}
|
|
39
|
+
* @memberof UniquePasswordPolicy
|
|
40
|
+
*/
|
|
41
|
+
readonly component: string;
|
|
42
|
+
/**
|
|
43
|
+
* Return object's verbose_name
|
|
44
|
+
* @type {string}
|
|
45
|
+
* @memberof UniquePasswordPolicy
|
|
46
|
+
*/
|
|
47
|
+
readonly verboseName: string;
|
|
48
|
+
/**
|
|
49
|
+
* Return object's plural verbose_name
|
|
50
|
+
* @type {string}
|
|
51
|
+
* @memberof UniquePasswordPolicy
|
|
52
|
+
*/
|
|
53
|
+
readonly verboseNamePlural: string;
|
|
54
|
+
/**
|
|
55
|
+
* Return internal model name
|
|
56
|
+
* @type {string}
|
|
57
|
+
* @memberof UniquePasswordPolicy
|
|
58
|
+
*/
|
|
59
|
+
readonly metaModelName: string;
|
|
60
|
+
/**
|
|
61
|
+
* Return objects policy is bound to
|
|
62
|
+
* @type {number}
|
|
63
|
+
* @memberof UniquePasswordPolicy
|
|
64
|
+
*/
|
|
65
|
+
readonly boundTo: number;
|
|
66
|
+
/**
|
|
67
|
+
* Field key to check, field keys defined in Prompt stages are available.
|
|
68
|
+
* @type {string}
|
|
69
|
+
* @memberof UniquePasswordPolicy
|
|
70
|
+
*/
|
|
71
|
+
passwordField?: string;
|
|
72
|
+
/**
|
|
73
|
+
* Number of passwords to check against.
|
|
74
|
+
* @type {number}
|
|
75
|
+
* @memberof UniquePasswordPolicy
|
|
76
|
+
*/
|
|
77
|
+
numHistoricalPasswords?: number;
|
|
78
|
+
}
|
|
79
|
+
/**
|
|
80
|
+
* Check if a given object implements the UniquePasswordPolicy interface.
|
|
81
|
+
*/
|
|
82
|
+
export declare function instanceOfUniquePasswordPolicy(value: object): value is UniquePasswordPolicy;
|
|
83
|
+
export declare function UniquePasswordPolicyFromJSON(json: any): UniquePasswordPolicy;
|
|
84
|
+
export declare function UniquePasswordPolicyFromJSONTyped(json: any, ignoreDiscriminator: boolean): UniquePasswordPolicy;
|
|
85
|
+
export declare function UniquePasswordPolicyToJSON(json: any): UniquePasswordPolicy;
|
|
86
|
+
export declare function UniquePasswordPolicyToJSONTyped(value?: Omit<UniquePasswordPolicy, 'pk' | 'component' | 'verbose_name' | 'verbose_name_plural' | 'meta_model_name' | 'bound_to'> | null, ignoreDiscriminator?: boolean): any;
|