@goauthentik/api 2025.6.4-1754310573 → 2025.6.4-1754396177
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/apis/CoreApi.d.ts +6 -0
- package/dist/apis/CoreApi.d.ts.map +1 -1
- package/dist/apis/CoreApi.js +18 -0
- package/dist/apis/CoreApi.js.map +1 -1
- package/dist/esm/apis/CoreApi.d.ts +6 -0
- package/dist/esm/apis/CoreApi.d.ts.map +1 -1
- package/dist/esm/apis/CoreApi.js +18 -0
- package/dist/esm/apis/CoreApi.js.map +1 -1
- package/dist/esm/models/OAuth2Provider.d.ts +6 -0
- package/dist/esm/models/OAuth2Provider.d.ts.map +1 -1
- package/dist/esm/models/OAuth2Provider.js +2 -0
- package/dist/esm/models/OAuth2Provider.js.map +1 -1
- package/dist/esm/models/OAuth2ProviderRequest.d.ts +6 -0
- package/dist/esm/models/OAuth2ProviderRequest.d.ts.map +1 -1
- package/dist/esm/models/OAuth2ProviderRequest.js +2 -0
- package/dist/esm/models/OAuth2ProviderRequest.js.map +1 -1
- package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
- package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts.map +1 -1
- package/dist/esm/models/PatchedOAuth2ProviderRequest.js +2 -0
- package/dist/esm/models/PatchedOAuth2ProviderRequest.js.map +1 -1
- package/dist/esm/models/User.d.ts +7 -1
- package/dist/esm/models/User.d.ts.map +1 -1
- package/dist/esm/models/User.js +3 -0
- package/dist/esm/models/User.js.map +1 -1
- package/dist/models/OAuth2Provider.d.ts +6 -0
- package/dist/models/OAuth2Provider.d.ts.map +1 -1
- package/dist/models/OAuth2Provider.js +2 -0
- package/dist/models/OAuth2Provider.js.map +1 -1
- package/dist/models/OAuth2ProviderRequest.d.ts +6 -0
- package/dist/models/OAuth2ProviderRequest.d.ts.map +1 -1
- package/dist/models/OAuth2ProviderRequest.js +2 -0
- package/dist/models/OAuth2ProviderRequest.js.map +1 -1
- package/dist/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
- package/dist/models/PatchedOAuth2ProviderRequest.d.ts.map +1 -1
- package/dist/models/PatchedOAuth2ProviderRequest.js +2 -0
- package/dist/models/PatchedOAuth2ProviderRequest.js.map +1 -1
- package/dist/models/User.d.ts +7 -1
- package/dist/models/User.d.ts.map +1 -1
- package/dist/models/User.js +3 -0
- package/dist/models/User.js.map +1 -1
- package/dist/tsconfig.esm.tsbuildinfo +1 -1
- package/package.json +1 -1
- package/src/apis/CoreApi.ts +30 -0
- package/src/models/OAuth2Provider.ts +8 -0
- package/src/models/OAuth2ProviderRequest.ts +8 -0
- package/src/models/PatchedOAuth2ProviderRequest.ts +8 -0
- package/src/models/User.ts +9 -1
- package/tsconfig.tsbuildinfo +1 -1
package/package.json
CHANGED
package/src/apis/CoreApi.ts
CHANGED
|
@@ -462,12 +462,18 @@ export interface CoreUsersImpersonateCreateRequest {
|
|
|
462
462
|
|
|
463
463
|
export interface CoreUsersListRequest {
|
|
464
464
|
attributes?: string;
|
|
465
|
+
dateJoined?: Date;
|
|
466
|
+
dateJoinedGt?: Date;
|
|
467
|
+
dateJoinedLt?: Date;
|
|
465
468
|
email?: string;
|
|
466
469
|
groupsByName?: Array<string>;
|
|
467
470
|
groupsByPk?: Array<string>;
|
|
468
471
|
includeGroups?: boolean;
|
|
469
472
|
isActive?: boolean;
|
|
470
473
|
isSuperuser?: boolean;
|
|
474
|
+
lastUpdated?: Date;
|
|
475
|
+
lastUpdatedGt?: Date;
|
|
476
|
+
lastUpdatedLt?: Date;
|
|
471
477
|
name?: string;
|
|
472
478
|
ordering?: string;
|
|
473
479
|
page?: number;
|
|
@@ -3222,6 +3228,18 @@ export class CoreApi extends runtime.BaseAPI {
|
|
|
3222
3228
|
queryParameters['attributes'] = requestParameters['attributes'];
|
|
3223
3229
|
}
|
|
3224
3230
|
|
|
3231
|
+
if (requestParameters['dateJoined'] != null) {
|
|
3232
|
+
queryParameters['date_joined'] = (requestParameters['dateJoined'] as any).toISOString();
|
|
3233
|
+
}
|
|
3234
|
+
|
|
3235
|
+
if (requestParameters['dateJoinedGt'] != null) {
|
|
3236
|
+
queryParameters['date_joined__gt'] = (requestParameters['dateJoinedGt'] as any).toISOString();
|
|
3237
|
+
}
|
|
3238
|
+
|
|
3239
|
+
if (requestParameters['dateJoinedLt'] != null) {
|
|
3240
|
+
queryParameters['date_joined__lt'] = (requestParameters['dateJoinedLt'] as any).toISOString();
|
|
3241
|
+
}
|
|
3242
|
+
|
|
3225
3243
|
if (requestParameters['email'] != null) {
|
|
3226
3244
|
queryParameters['email'] = requestParameters['email'];
|
|
3227
3245
|
}
|
|
@@ -3246,6 +3264,18 @@ export class CoreApi extends runtime.BaseAPI {
|
|
|
3246
3264
|
queryParameters['is_superuser'] = requestParameters['isSuperuser'];
|
|
3247
3265
|
}
|
|
3248
3266
|
|
|
3267
|
+
if (requestParameters['lastUpdated'] != null) {
|
|
3268
|
+
queryParameters['last_updated'] = (requestParameters['lastUpdated'] as any).toISOString();
|
|
3269
|
+
}
|
|
3270
|
+
|
|
3271
|
+
if (requestParameters['lastUpdatedGt'] != null) {
|
|
3272
|
+
queryParameters['last_updated__gt'] = (requestParameters['lastUpdatedGt'] as any).toISOString();
|
|
3273
|
+
}
|
|
3274
|
+
|
|
3275
|
+
if (requestParameters['lastUpdatedLt'] != null) {
|
|
3276
|
+
queryParameters['last_updated__lt'] = (requestParameters['lastUpdatedLt'] as any).toISOString();
|
|
3277
|
+
}
|
|
3278
|
+
|
|
3249
3279
|
if (requestParameters['name'] != null) {
|
|
3250
3280
|
queryParameters['name'] = requestParameters['name'];
|
|
3251
3281
|
}
|
|
@@ -192,6 +192,12 @@ export interface OAuth2Provider {
|
|
|
192
192
|
* @memberof OAuth2Provider
|
|
193
193
|
*/
|
|
194
194
|
redirectUris: Array<RedirectURI>;
|
|
195
|
+
/**
|
|
196
|
+
*
|
|
197
|
+
* @type {string}
|
|
198
|
+
* @memberof OAuth2Provider
|
|
199
|
+
*/
|
|
200
|
+
backchannelLogoutUri?: string;
|
|
195
201
|
/**
|
|
196
202
|
* Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
|
|
197
203
|
* @type {SubModeEnum}
|
|
@@ -274,6 +280,7 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
|
|
|
274
280
|
'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
|
|
275
281
|
'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
|
|
276
282
|
'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIFromJSON)),
|
|
283
|
+
'backchannelLogoutUri': json['backchannel_logout_uri'] == null ? undefined : json['backchannel_logout_uri'],
|
|
277
284
|
'subMode': json['sub_mode'] == null ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
278
285
|
'issuerMode': json['issuer_mode'] == null ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
279
286
|
'jwtFederationSources': json['jwt_federation_sources'] == null ? undefined : json['jwt_federation_sources'],
|
|
@@ -307,6 +314,7 @@ export function OAuth2ProviderToJSONTyped(value?: Omit<OAuth2Provider, 'pk'|'com
|
|
|
307
314
|
'signing_key': value['signingKey'],
|
|
308
315
|
'encryption_key': value['encryptionKey'],
|
|
309
316
|
'redirect_uris': ((value['redirectUris'] as Array<any>).map(RedirectURIToJSON)),
|
|
317
|
+
'backchannel_logout_uri': value['backchannelLogoutUri'],
|
|
310
318
|
'sub_mode': SubModeEnumToJSON(value['subMode']),
|
|
311
319
|
'issuer_mode': IssuerModeEnumToJSON(value['issuerMode']),
|
|
312
320
|
'jwt_federation_sources': value['jwtFederationSources'],
|
|
@@ -138,6 +138,12 @@ export interface OAuth2ProviderRequest {
|
|
|
138
138
|
* @memberof OAuth2ProviderRequest
|
|
139
139
|
*/
|
|
140
140
|
redirectUris: Array<RedirectURIRequest>;
|
|
141
|
+
/**
|
|
142
|
+
*
|
|
143
|
+
* @type {string}
|
|
144
|
+
* @memberof OAuth2ProviderRequest
|
|
145
|
+
*/
|
|
146
|
+
backchannelLogoutUri?: string;
|
|
141
147
|
/**
|
|
142
148
|
* Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
|
|
143
149
|
* @type {SubModeEnum}
|
|
@@ -202,6 +208,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
|
|
|
202
208
|
'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
|
|
203
209
|
'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
|
|
204
210
|
'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
|
|
211
|
+
'backchannelLogoutUri': json['backchannel_logout_uri'] == null ? undefined : json['backchannel_logout_uri'],
|
|
205
212
|
'subMode': json['sub_mode'] == null ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
206
213
|
'issuerMode': json['issuer_mode'] == null ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
207
214
|
'jwtFederationSources': json['jwt_federation_sources'] == null ? undefined : json['jwt_federation_sources'],
|
|
@@ -235,6 +242,7 @@ export function OAuth2ProviderRequestToJSONTyped(value?: OAuth2ProviderRequest |
|
|
|
235
242
|
'signing_key': value['signingKey'],
|
|
236
243
|
'encryption_key': value['encryptionKey'],
|
|
237
244
|
'redirect_uris': ((value['redirectUris'] as Array<any>).map(RedirectURIRequestToJSON)),
|
|
245
|
+
'backchannel_logout_uri': value['backchannelLogoutUri'],
|
|
238
246
|
'sub_mode': SubModeEnumToJSON(value['subMode']),
|
|
239
247
|
'issuer_mode': IssuerModeEnumToJSON(value['issuerMode']),
|
|
240
248
|
'jwt_federation_sources': value['jwtFederationSources'],
|
|
@@ -138,6 +138,12 @@ export interface PatchedOAuth2ProviderRequest {
|
|
|
138
138
|
* @memberof PatchedOAuth2ProviderRequest
|
|
139
139
|
*/
|
|
140
140
|
redirectUris?: Array<RedirectURIRequest>;
|
|
141
|
+
/**
|
|
142
|
+
*
|
|
143
|
+
* @type {string}
|
|
144
|
+
* @memberof PatchedOAuth2ProviderRequest
|
|
145
|
+
*/
|
|
146
|
+
backchannelLogoutUri?: string;
|
|
141
147
|
/**
|
|
142
148
|
* Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
|
|
143
149
|
* @type {SubModeEnum}
|
|
@@ -198,6 +204,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
|
|
|
198
204
|
'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
|
|
199
205
|
'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
|
|
200
206
|
'redirectUris': json['redirect_uris'] == null ? undefined : ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
|
|
207
|
+
'backchannelLogoutUri': json['backchannel_logout_uri'] == null ? undefined : json['backchannel_logout_uri'],
|
|
201
208
|
'subMode': json['sub_mode'] == null ? undefined : SubModeEnumFromJSON(json['sub_mode']),
|
|
202
209
|
'issuerMode': json['issuer_mode'] == null ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
|
|
203
210
|
'jwtFederationSources': json['jwt_federation_sources'] == null ? undefined : json['jwt_federation_sources'],
|
|
@@ -231,6 +238,7 @@ export function PatchedOAuth2ProviderRequestToJSONTyped(value?: PatchedOAuth2Pro
|
|
|
231
238
|
'signing_key': value['signingKey'],
|
|
232
239
|
'encryption_key': value['encryptionKey'],
|
|
233
240
|
'redirect_uris': value['redirectUris'] == null ? undefined : ((value['redirectUris'] as Array<any>).map(RedirectURIRequestToJSON)),
|
|
241
|
+
'backchannel_logout_uri': value['backchannelLogoutUri'],
|
|
234
242
|
'sub_mode': SubModeEnumToJSON(value['subMode']),
|
|
235
243
|
'issuer_mode': IssuerModeEnumToJSON(value['issuerMode']),
|
|
236
244
|
'jwt_federation_sources': value['jwtFederationSources'],
|
package/src/models/User.ts
CHANGED
|
@@ -136,6 +136,12 @@ export interface User {
|
|
|
136
136
|
* @memberof User
|
|
137
137
|
*/
|
|
138
138
|
readonly passwordChangeDate: Date;
|
|
139
|
+
/**
|
|
140
|
+
*
|
|
141
|
+
* @type {Date}
|
|
142
|
+
* @memberof User
|
|
143
|
+
*/
|
|
144
|
+
readonly lastUpdated: Date;
|
|
139
145
|
}
|
|
140
146
|
|
|
141
147
|
|
|
@@ -154,6 +160,7 @@ export function instanceOfUser(value: object): value is User {
|
|
|
154
160
|
if (!('uid' in value) || value['uid'] === undefined) return false;
|
|
155
161
|
if (!('uuid' in value) || value['uuid'] === undefined) return false;
|
|
156
162
|
if (!('passwordChangeDate' in value) || value['passwordChangeDate'] === undefined) return false;
|
|
163
|
+
if (!('lastUpdated' in value) || value['lastUpdated'] === undefined) return false;
|
|
157
164
|
return true;
|
|
158
165
|
}
|
|
159
166
|
|
|
@@ -184,6 +191,7 @@ export function UserFromJSONTyped(json: any, ignoreDiscriminator: boolean): User
|
|
|
184
191
|
'type': json['type'] == null ? undefined : UserTypeEnumFromJSON(json['type']),
|
|
185
192
|
'uuid': json['uuid'],
|
|
186
193
|
'passwordChangeDate': (new Date(json['password_change_date'])),
|
|
194
|
+
'lastUpdated': (new Date(json['last_updated'])),
|
|
187
195
|
};
|
|
188
196
|
}
|
|
189
197
|
|
|
@@ -191,7 +199,7 @@ export function UserToJSON(json: any): User {
|
|
|
191
199
|
return UserToJSONTyped(json, false);
|
|
192
200
|
}
|
|
193
201
|
|
|
194
|
-
export function UserToJSONTyped(value?: Omit<User, 'pk'|'date_joined'|'is_superuser'|'groups_obj'|'avatar'|'uid'|'uuid'|'password_change_date'> | null, ignoreDiscriminator: boolean = false): any {
|
|
202
|
+
export function UserToJSONTyped(value?: Omit<User, 'pk'|'date_joined'|'is_superuser'|'groups_obj'|'avatar'|'uid'|'uuid'|'password_change_date'|'last_updated'> | null, ignoreDiscriminator: boolean = false): any {
|
|
195
203
|
if (value == null) {
|
|
196
204
|
return value;
|
|
197
205
|
}
|