@goauthentik/api 2025.6.4-1754310573 → 2025.6.4-1754396177

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (48) hide show
  1. package/dist/apis/CoreApi.d.ts +6 -0
  2. package/dist/apis/CoreApi.d.ts.map +1 -1
  3. package/dist/apis/CoreApi.js +18 -0
  4. package/dist/apis/CoreApi.js.map +1 -1
  5. package/dist/esm/apis/CoreApi.d.ts +6 -0
  6. package/dist/esm/apis/CoreApi.d.ts.map +1 -1
  7. package/dist/esm/apis/CoreApi.js +18 -0
  8. package/dist/esm/apis/CoreApi.js.map +1 -1
  9. package/dist/esm/models/OAuth2Provider.d.ts +6 -0
  10. package/dist/esm/models/OAuth2Provider.d.ts.map +1 -1
  11. package/dist/esm/models/OAuth2Provider.js +2 -0
  12. package/dist/esm/models/OAuth2Provider.js.map +1 -1
  13. package/dist/esm/models/OAuth2ProviderRequest.d.ts +6 -0
  14. package/dist/esm/models/OAuth2ProviderRequest.d.ts.map +1 -1
  15. package/dist/esm/models/OAuth2ProviderRequest.js +2 -0
  16. package/dist/esm/models/OAuth2ProviderRequest.js.map +1 -1
  17. package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
  18. package/dist/esm/models/PatchedOAuth2ProviderRequest.d.ts.map +1 -1
  19. package/dist/esm/models/PatchedOAuth2ProviderRequest.js +2 -0
  20. package/dist/esm/models/PatchedOAuth2ProviderRequest.js.map +1 -1
  21. package/dist/esm/models/User.d.ts +7 -1
  22. package/dist/esm/models/User.d.ts.map +1 -1
  23. package/dist/esm/models/User.js +3 -0
  24. package/dist/esm/models/User.js.map +1 -1
  25. package/dist/models/OAuth2Provider.d.ts +6 -0
  26. package/dist/models/OAuth2Provider.d.ts.map +1 -1
  27. package/dist/models/OAuth2Provider.js +2 -0
  28. package/dist/models/OAuth2Provider.js.map +1 -1
  29. package/dist/models/OAuth2ProviderRequest.d.ts +6 -0
  30. package/dist/models/OAuth2ProviderRequest.d.ts.map +1 -1
  31. package/dist/models/OAuth2ProviderRequest.js +2 -0
  32. package/dist/models/OAuth2ProviderRequest.js.map +1 -1
  33. package/dist/models/PatchedOAuth2ProviderRequest.d.ts +6 -0
  34. package/dist/models/PatchedOAuth2ProviderRequest.d.ts.map +1 -1
  35. package/dist/models/PatchedOAuth2ProviderRequest.js +2 -0
  36. package/dist/models/PatchedOAuth2ProviderRequest.js.map +1 -1
  37. package/dist/models/User.d.ts +7 -1
  38. package/dist/models/User.d.ts.map +1 -1
  39. package/dist/models/User.js +3 -0
  40. package/dist/models/User.js.map +1 -1
  41. package/dist/tsconfig.esm.tsbuildinfo +1 -1
  42. package/package.json +1 -1
  43. package/src/apis/CoreApi.ts +30 -0
  44. package/src/models/OAuth2Provider.ts +8 -0
  45. package/src/models/OAuth2ProviderRequest.ts +8 -0
  46. package/src/models/PatchedOAuth2ProviderRequest.ts +8 -0
  47. package/src/models/User.ts +9 -1
  48. package/tsconfig.tsbuildinfo +1 -1
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@goauthentik/api",
3
- "version": "2025.6.4-1754310573",
3
+ "version": "2025.6.4-1754396177",
4
4
  "description": "OpenAPI client for @goauthentik/api",
5
5
  "author": "OpenAPI-Generator",
6
6
  "repository": {
@@ -462,12 +462,18 @@ export interface CoreUsersImpersonateCreateRequest {
462
462
 
463
463
  export interface CoreUsersListRequest {
464
464
  attributes?: string;
465
+ dateJoined?: Date;
466
+ dateJoinedGt?: Date;
467
+ dateJoinedLt?: Date;
465
468
  email?: string;
466
469
  groupsByName?: Array<string>;
467
470
  groupsByPk?: Array<string>;
468
471
  includeGroups?: boolean;
469
472
  isActive?: boolean;
470
473
  isSuperuser?: boolean;
474
+ lastUpdated?: Date;
475
+ lastUpdatedGt?: Date;
476
+ lastUpdatedLt?: Date;
471
477
  name?: string;
472
478
  ordering?: string;
473
479
  page?: number;
@@ -3222,6 +3228,18 @@ export class CoreApi extends runtime.BaseAPI {
3222
3228
  queryParameters['attributes'] = requestParameters['attributes'];
3223
3229
  }
3224
3230
 
3231
+ if (requestParameters['dateJoined'] != null) {
3232
+ queryParameters['date_joined'] = (requestParameters['dateJoined'] as any).toISOString();
3233
+ }
3234
+
3235
+ if (requestParameters['dateJoinedGt'] != null) {
3236
+ queryParameters['date_joined__gt'] = (requestParameters['dateJoinedGt'] as any).toISOString();
3237
+ }
3238
+
3239
+ if (requestParameters['dateJoinedLt'] != null) {
3240
+ queryParameters['date_joined__lt'] = (requestParameters['dateJoinedLt'] as any).toISOString();
3241
+ }
3242
+
3225
3243
  if (requestParameters['email'] != null) {
3226
3244
  queryParameters['email'] = requestParameters['email'];
3227
3245
  }
@@ -3246,6 +3264,18 @@ export class CoreApi extends runtime.BaseAPI {
3246
3264
  queryParameters['is_superuser'] = requestParameters['isSuperuser'];
3247
3265
  }
3248
3266
 
3267
+ if (requestParameters['lastUpdated'] != null) {
3268
+ queryParameters['last_updated'] = (requestParameters['lastUpdated'] as any).toISOString();
3269
+ }
3270
+
3271
+ if (requestParameters['lastUpdatedGt'] != null) {
3272
+ queryParameters['last_updated__gt'] = (requestParameters['lastUpdatedGt'] as any).toISOString();
3273
+ }
3274
+
3275
+ if (requestParameters['lastUpdatedLt'] != null) {
3276
+ queryParameters['last_updated__lt'] = (requestParameters['lastUpdatedLt'] as any).toISOString();
3277
+ }
3278
+
3249
3279
  if (requestParameters['name'] != null) {
3250
3280
  queryParameters['name'] = requestParameters['name'];
3251
3281
  }
@@ -192,6 +192,12 @@ export interface OAuth2Provider {
192
192
  * @memberof OAuth2Provider
193
193
  */
194
194
  redirectUris: Array<RedirectURI>;
195
+ /**
196
+ *
197
+ * @type {string}
198
+ * @memberof OAuth2Provider
199
+ */
200
+ backchannelLogoutUri?: string;
195
201
  /**
196
202
  * Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
197
203
  * @type {SubModeEnum}
@@ -274,6 +280,7 @@ export function OAuth2ProviderFromJSONTyped(json: any, ignoreDiscriminator: bool
274
280
  'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
275
281
  'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
276
282
  'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIFromJSON)),
283
+ 'backchannelLogoutUri': json['backchannel_logout_uri'] == null ? undefined : json['backchannel_logout_uri'],
277
284
  'subMode': json['sub_mode'] == null ? undefined : SubModeEnumFromJSON(json['sub_mode']),
278
285
  'issuerMode': json['issuer_mode'] == null ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
279
286
  'jwtFederationSources': json['jwt_federation_sources'] == null ? undefined : json['jwt_federation_sources'],
@@ -307,6 +314,7 @@ export function OAuth2ProviderToJSONTyped(value?: Omit<OAuth2Provider, 'pk'|'com
307
314
  'signing_key': value['signingKey'],
308
315
  'encryption_key': value['encryptionKey'],
309
316
  'redirect_uris': ((value['redirectUris'] as Array<any>).map(RedirectURIToJSON)),
317
+ 'backchannel_logout_uri': value['backchannelLogoutUri'],
310
318
  'sub_mode': SubModeEnumToJSON(value['subMode']),
311
319
  'issuer_mode': IssuerModeEnumToJSON(value['issuerMode']),
312
320
  'jwt_federation_sources': value['jwtFederationSources'],
@@ -138,6 +138,12 @@ export interface OAuth2ProviderRequest {
138
138
  * @memberof OAuth2ProviderRequest
139
139
  */
140
140
  redirectUris: Array<RedirectURIRequest>;
141
+ /**
142
+ *
143
+ * @type {string}
144
+ * @memberof OAuth2ProviderRequest
145
+ */
146
+ backchannelLogoutUri?: string;
141
147
  /**
142
148
  * Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
143
149
  * @type {SubModeEnum}
@@ -202,6 +208,7 @@ export function OAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscriminato
202
208
  'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
203
209
  'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
204
210
  'redirectUris': ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
211
+ 'backchannelLogoutUri': json['backchannel_logout_uri'] == null ? undefined : json['backchannel_logout_uri'],
205
212
  'subMode': json['sub_mode'] == null ? undefined : SubModeEnumFromJSON(json['sub_mode']),
206
213
  'issuerMode': json['issuer_mode'] == null ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
207
214
  'jwtFederationSources': json['jwt_federation_sources'] == null ? undefined : json['jwt_federation_sources'],
@@ -235,6 +242,7 @@ export function OAuth2ProviderRequestToJSONTyped(value?: OAuth2ProviderRequest |
235
242
  'signing_key': value['signingKey'],
236
243
  'encryption_key': value['encryptionKey'],
237
244
  'redirect_uris': ((value['redirectUris'] as Array<any>).map(RedirectURIRequestToJSON)),
245
+ 'backchannel_logout_uri': value['backchannelLogoutUri'],
238
246
  'sub_mode': SubModeEnumToJSON(value['subMode']),
239
247
  'issuer_mode': IssuerModeEnumToJSON(value['issuerMode']),
240
248
  'jwt_federation_sources': value['jwtFederationSources'],
@@ -138,6 +138,12 @@ export interface PatchedOAuth2ProviderRequest {
138
138
  * @memberof PatchedOAuth2ProviderRequest
139
139
  */
140
140
  redirectUris?: Array<RedirectURIRequest>;
141
+ /**
142
+ *
143
+ * @type {string}
144
+ * @memberof PatchedOAuth2ProviderRequest
145
+ */
146
+ backchannelLogoutUri?: string;
141
147
  /**
142
148
  * Configure what data should be used as unique User Identifier. For most cases, the default should be fine.
143
149
  * @type {SubModeEnum}
@@ -198,6 +204,7 @@ export function PatchedOAuth2ProviderRequestFromJSONTyped(json: any, ignoreDiscr
198
204
  'signingKey': json['signing_key'] == null ? undefined : json['signing_key'],
199
205
  'encryptionKey': json['encryption_key'] == null ? undefined : json['encryption_key'],
200
206
  'redirectUris': json['redirect_uris'] == null ? undefined : ((json['redirect_uris'] as Array<any>).map(RedirectURIRequestFromJSON)),
207
+ 'backchannelLogoutUri': json['backchannel_logout_uri'] == null ? undefined : json['backchannel_logout_uri'],
201
208
  'subMode': json['sub_mode'] == null ? undefined : SubModeEnumFromJSON(json['sub_mode']),
202
209
  'issuerMode': json['issuer_mode'] == null ? undefined : IssuerModeEnumFromJSON(json['issuer_mode']),
203
210
  'jwtFederationSources': json['jwt_federation_sources'] == null ? undefined : json['jwt_federation_sources'],
@@ -231,6 +238,7 @@ export function PatchedOAuth2ProviderRequestToJSONTyped(value?: PatchedOAuth2Pro
231
238
  'signing_key': value['signingKey'],
232
239
  'encryption_key': value['encryptionKey'],
233
240
  'redirect_uris': value['redirectUris'] == null ? undefined : ((value['redirectUris'] as Array<any>).map(RedirectURIRequestToJSON)),
241
+ 'backchannel_logout_uri': value['backchannelLogoutUri'],
234
242
  'sub_mode': SubModeEnumToJSON(value['subMode']),
235
243
  'issuer_mode': IssuerModeEnumToJSON(value['issuerMode']),
236
244
  'jwt_federation_sources': value['jwtFederationSources'],
@@ -136,6 +136,12 @@ export interface User {
136
136
  * @memberof User
137
137
  */
138
138
  readonly passwordChangeDate: Date;
139
+ /**
140
+ *
141
+ * @type {Date}
142
+ * @memberof User
143
+ */
144
+ readonly lastUpdated: Date;
139
145
  }
140
146
 
141
147
 
@@ -154,6 +160,7 @@ export function instanceOfUser(value: object): value is User {
154
160
  if (!('uid' in value) || value['uid'] === undefined) return false;
155
161
  if (!('uuid' in value) || value['uuid'] === undefined) return false;
156
162
  if (!('passwordChangeDate' in value) || value['passwordChangeDate'] === undefined) return false;
163
+ if (!('lastUpdated' in value) || value['lastUpdated'] === undefined) return false;
157
164
  return true;
158
165
  }
159
166
 
@@ -184,6 +191,7 @@ export function UserFromJSONTyped(json: any, ignoreDiscriminator: boolean): User
184
191
  'type': json['type'] == null ? undefined : UserTypeEnumFromJSON(json['type']),
185
192
  'uuid': json['uuid'],
186
193
  'passwordChangeDate': (new Date(json['password_change_date'])),
194
+ 'lastUpdated': (new Date(json['last_updated'])),
187
195
  };
188
196
  }
189
197
 
@@ -191,7 +199,7 @@ export function UserToJSON(json: any): User {
191
199
  return UserToJSONTyped(json, false);
192
200
  }
193
201
 
194
- export function UserToJSONTyped(value?: Omit<User, 'pk'|'date_joined'|'is_superuser'|'groups_obj'|'avatar'|'uid'|'uuid'|'password_change_date'> | null, ignoreDiscriminator: boolean = false): any {
202
+ export function UserToJSONTyped(value?: Omit<User, 'pk'|'date_joined'|'is_superuser'|'groups_obj'|'avatar'|'uid'|'uuid'|'password_change_date'|'last_updated'> | null, ignoreDiscriminator: boolean = false): any {
195
203
  if (value == null) {
196
204
  return value;
197
205
  }