@kustodian/plugin-authelia 1.0.0 → 2.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/executor.d.ts +20 -0
- package/dist/executor.d.ts.map +1 -0
- package/dist/generator.d.ts +23 -0
- package/dist/generator.d.ts.map +1 -0
- package/dist/index.d.ts +14 -0
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +16743 -0
- package/dist/plugin.d.ts +11 -0
- package/dist/plugin.d.ts.map +1 -0
- package/dist/types.d.ts +241 -0
- package/dist/types.d.ts.map +1 -0
- package/package.json +21 -9
- package/src/executor.ts +0 -114
- package/src/generator.ts +0 -236
- package/src/index.ts +0 -36
- package/src/plugin.ts +0 -249
- package/src/types.ts +0 -181
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
import { type KustodianErrorType, type ResultType } from '@kustodian/core';
|
|
2
|
+
/**
|
|
3
|
+
* Check if authelia CLI is available
|
|
4
|
+
*/
|
|
5
|
+
export declare function check_authelia_available(): Promise<ResultType<string, KustodianErrorType>>;
|
|
6
|
+
/**
|
|
7
|
+
* Generate a hashed password using Authelia CLI
|
|
8
|
+
* @param password - Plain text password to hash
|
|
9
|
+
* @param algorithm - Hashing algorithm (pbkdf2 or argon2)
|
|
10
|
+
*/
|
|
11
|
+
export declare function hash_password(password: string, algorithm?: 'pbkdf2' | 'argon2'): Promise<ResultType<string, KustodianErrorType>>;
|
|
12
|
+
/**
|
|
13
|
+
* Generate a random secret suitable for OIDC client secrets
|
|
14
|
+
*/
|
|
15
|
+
export declare function generate_random_secret(length?: number): Promise<ResultType<string, KustodianErrorType>>;
|
|
16
|
+
/**
|
|
17
|
+
* Validate access control configuration using Authelia CLI
|
|
18
|
+
*/
|
|
19
|
+
export declare function validate_access_control(config_path: string): Promise<ResultType<boolean, KustodianErrorType>>;
|
|
20
|
+
//# sourceMappingURL=executor.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"executor.d.ts","sourceRoot":"","sources":["../src/executor.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,KAAK,kBAAkB,EAAE,KAAK,UAAU,EAAyB,MAAM,iBAAiB,CAAC;AAIlG;;GAEG;AACH,wBAAsB,wBAAwB,IAAI,OAAO,CAAC,UAAU,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC,CAehG;AAED;;;;GAIG;AACH,wBAAsB,aAAa,CACjC,QAAQ,EAAE,MAAM,EAChB,SAAS,GAAE,QAAQ,GAAG,QAAmB,GACxC,OAAO,CAAC,UAAU,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC,CAgCjD;AAED;;GAEG;AACH,wBAAsB,sBAAsB,CAC1C,MAAM,SAAK,GACV,OAAO,CAAC,UAAU,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAAC,CAmBjD;AAED;;GAEG;AACH,wBAAsB,uBAAuB,CAC3C,WAAW,EAAE,MAAM,GAClB,OAAO,CAAC,UAAU,CAAC,OAAO,EAAE,kBAAkB,CAAC,CAAC,CAclD"}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
import { type KustodianErrorType, type ResultType } from '@kustodian/core';
|
|
2
|
+
import type { AccessControlRuleType, AuthConfigType, AutheliaConfigType, AutheliaPluginOptionsType, OIDCClientConfigType } from './types.js';
|
|
3
|
+
/**
|
|
4
|
+
* Generates an OIDC client configuration from auth config
|
|
5
|
+
*/
|
|
6
|
+
export declare function generate_oidc_client(auth_config: AuthConfigType, options: AutheliaPluginOptionsType): ResultType<OIDCClientConfigType, KustodianErrorType>;
|
|
7
|
+
/**
|
|
8
|
+
* Generates access control rules from auth config
|
|
9
|
+
*/
|
|
10
|
+
export declare function generate_access_control_rules(auth_config: AuthConfigType, _options: AutheliaPluginOptionsType): ResultType<AccessControlRuleType[], KustodianErrorType>;
|
|
11
|
+
/**
|
|
12
|
+
* Generates complete Authelia configuration from multiple auth configs
|
|
13
|
+
*/
|
|
14
|
+
export declare function generate_authelia_config(auth_configs: AuthConfigType[], options: AutheliaPluginOptionsType): ResultType<AutheliaConfigType, KustodianErrorType>;
|
|
15
|
+
/**
|
|
16
|
+
* Converts Authelia configuration to YAML string
|
|
17
|
+
*/
|
|
18
|
+
export declare function config_to_yaml(config: AutheliaConfigType): ResultType<string, KustodianErrorType>;
|
|
19
|
+
/**
|
|
20
|
+
* Parses YAML string to Authelia configuration
|
|
21
|
+
*/
|
|
22
|
+
export declare function yaml_to_config(yaml_string: string): ResultType<AutheliaConfigType, KustodianErrorType>;
|
|
23
|
+
//# sourceMappingURL=generator.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"generator.d.ts","sourceRoot":"","sources":["../src/generator.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,kBAAkB,EACvB,KAAK,UAAU,EAIhB,MAAM,iBAAiB,CAAC;AAEzB,OAAO,KAAK,EACV,qBAAqB,EACrB,cAAc,EACd,kBAAkB,EAClB,yBAAyB,EACzB,oBAAoB,EACrB,MAAM,YAAY,CAAC;AAEpB;;GAEG;AACH,wBAAgB,oBAAoB,CAClC,WAAW,EAAE,cAAc,EAC3B,OAAO,EAAE,yBAAyB,GACjC,UAAU,CAAC,oBAAoB,EAAE,kBAAkB,CAAC,CAwDtD;AAED;;GAEG;AACH,wBAAgB,6BAA6B,CAC3C,WAAW,EAAE,cAAc,EAC3B,QAAQ,EAAE,yBAAyB,GAClC,UAAU,CAAC,qBAAqB,EAAE,EAAE,kBAAkB,CAAC,CA0DzD;AAED;;GAEG;AACH,wBAAgB,wBAAwB,CACtC,YAAY,EAAE,cAAc,EAAE,EAC9B,OAAO,EAAE,yBAAyB,GACjC,UAAU,CAAC,kBAAkB,EAAE,kBAAkB,CAAC,CA0CpD;AAED;;GAEG;AACH,wBAAgB,cAAc,CAAC,MAAM,EAAE,kBAAkB,GAAG,UAAU,CAAC,MAAM,EAAE,kBAAkB,CAAC,CAiBjG;AAED;;GAEG;AACH,wBAAgB,cAAc,CAC5B,WAAW,EAAE,MAAM,GAClB,UAAU,CAAC,kBAAkB,EAAE,kBAAkB,CAAC,CAYpD"}
|
package/dist/index.d.ts
ADDED
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Authelia authentication provider plugin for Kustodian
|
|
3
|
+
*
|
|
4
|
+
* This plugin enables integration with Authelia for authentication and authorization.
|
|
5
|
+
* It can generate OIDC client configurations, access control rules, and manage
|
|
6
|
+
* authentication requirements for deployed applications.
|
|
7
|
+
*
|
|
8
|
+
* @packageDocumentation
|
|
9
|
+
*/
|
|
10
|
+
export { check_authelia_available, generate_random_secret, hash_password, validate_access_control, } from './executor.js';
|
|
11
|
+
export { config_to_yaml, generate_access_control_rules, generate_authelia_config, generate_oidc_client, yaml_to_config, } from './generator.js';
|
|
12
|
+
export { create_authelia_plugin, plugin as default } from './plugin.js';
|
|
13
|
+
export type { AccessControlRuleType, AuthConfigType, AutheliaPluginOptionsType, AutheliaPolicyType, AuthProviderType, ConsentModeType, OIDCClientConfigType, PKCEChallengeMethodType, ProxyAuthConfigType, TokenEndpointAuthMethodType, } from './types.js';
|
|
14
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;GAQG;AAEH,OAAO,EACL,wBAAwB,EACxB,sBAAsB,EACtB,aAAa,EACb,uBAAuB,GACxB,MAAM,eAAe,CAAC;AACvB,OAAO,EACL,cAAc,EACd,6BAA6B,EAC7B,wBAAwB,EACxB,oBAAoB,EACpB,cAAc,GACf,MAAM,gBAAgB,CAAC;AACxB,OAAO,EAAE,sBAAsB,EAAE,MAAM,IAAI,OAAO,EAAE,MAAM,aAAa,CAAC;AACxE,YAAY,EACV,qBAAqB,EACrB,cAAc,EACd,yBAAyB,EACzB,kBAAkB,EAClB,gBAAgB,EAChB,eAAe,EACf,oBAAoB,EACpB,uBAAuB,EACvB,mBAAmB,EACnB,2BAA2B,GAC5B,MAAM,YAAY,CAAC"}
|