From fef6720b3caa09f70b51fe386ba49f8bb0c87eee Mon Sep 17 00:00:00 2001 From: "authentik-automation[bot]" <135050075+authentik-automation[bot]@users.noreply.github.com> Date: Tue, 23 Jan 2024 13:48:40 +0000 Subject: [PATCH] Update API Client --- .openapi-generator/FILES | 34 +- README.md | 49 +- .../Classes/OpenAPIs/APIs/AdminAPI.swift | 133 + .../Classes/OpenAPIs/APIs/CoreAPI.swift | 623 ++- .../Classes/OpenAPIs/APIs/EventsAPI.swift | 24 +- .../Classes/OpenAPIs/APIs/RbacAPI.swift | 14 +- .../Classes/OpenAPIs/APIs/TenantsAPI.swift | 668 +++ .../Classes/OpenAPIs/Models/AppEnum.swift | 5 +- .../Classes/OpenAPIs/Models/Brand.swift | 87 + .../OpenAPIs/Models/BrandRequest.swift | 83 + .../OpenAPIs/Models/CurrentBrand.swift | 81 + .../Classes/OpenAPIs/Models/Domain.swift | 45 + .../OpenAPIs/Models/DomainRequest.swift | 41 + .../Classes/OpenAPIs/Models/Event.swift | 10 +- .../OpenAPIs/Models/EventMatcherPolicy.swift | 4 +- .../Models/EventMatcherPolicyRequest.swift | 4 +- .../OpenAPIs/Models/EventRequest.swift | 10 +- .../Classes/OpenAPIs/Models/ModelEnum.swift | 5 +- .../OpenAPIs/Models/PaginatedBrandList.swift | 36 + .../OpenAPIs/Models/PaginatedDomainList.swift | 36 + .../OpenAPIs/Models/PatchedBrandRequest.swift | 83 + .../Models/PatchedDomainRequest.swift | 41 + .../PatchedEventMatcherPolicyRequest.swift | 4 +- .../OpenAPIs/Models/PatchedEventRequest.swift | 10 +- .../Models/PatchedSettingsRequest.swift | 69 + .../Models/PatchedTenantRequest.swift | 75 +- .../Classes/OpenAPIs/Models/Settings.swift | 69 + .../OpenAPIs/Models/SettingsRequest.swift | 69 + .../Classes/OpenAPIs/Models/SystemInfo.swift | 17 +- .../Classes/OpenAPIs/Models/Tenant.swift | 73 +- .../TenantAdminGroupRequestRequest.swift | 33 + .../TenantRecoveryKeyRequestRequest.swift | 37 + .../Models/TenantRecoveryKeyResponse.swift | 37 + .../OpenAPIs/Models/TenantRequest.swift | 75 +- .../Classes/OpenAPIs/Models/UserSelf.swift | 2 +- docs/AdminAPI.md | 146 + docs/Brand.md | 23 + docs/BrandRequest.md | 22 + docs/CoreAPI.md | 366 +- docs/{CurrentTenant.md => CurrentBrand.md} | 2 +- docs/Domain.md | 13 + docs/DomainRequest.md | 12 + docs/Event.md | 2 +- docs/EventMatcherPolicy.md | 4 +- docs/EventMatcherPolicyRequest.md | 4 +- docs/EventRequest.md | 2 +- docs/EventsAPI.md | 26 +- docs/PaginatedBrandList.md | 11 + docs/PaginatedDomainList.md | 11 + docs/PatchedBrandRequest.md | 22 + docs/PatchedDomainRequest.md | 12 + docs/PatchedEventMatcherPolicyRequest.md | 4 +- docs/PatchedEventRequest.md | 2 +- docs/PatchedSettingsRequest.md | 17 + docs/PatchedTenantRequest.md | 17 +- docs/RbacAPI.md | 8 +- docs/Settings.md | 17 + docs/SettingsRequest.md | 17 + docs/SystemInfo.md | 3 +- docs/Tenant.md | 17 +- docs/TenantAdminGroupRequestRequest.md | 10 + docs/TenantRecoveryKeyRequestRequest.md | 11 + docs/TenantRecoveryKeyResponse.md | 11 + docs/TenantRequest.md | 17 +- docs/TenantsAPI.md | 732 ++++ docs/UserSelf.md | 2 +- schema.yml | 3652 ++++++++++------- 67 files changed, 5681 insertions(+), 2220 deletions(-) create mode 100644 authentikClient/Classes/OpenAPIs/APIs/TenantsAPI.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/Brand.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/BrandRequest.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/CurrentBrand.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/Domain.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/DomainRequest.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/PaginatedBrandList.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/PaginatedDomainList.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/PatchedBrandRequest.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/PatchedDomainRequest.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/PatchedSettingsRequest.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/Settings.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/SettingsRequest.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/TenantAdminGroupRequestRequest.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/TenantRecoveryKeyRequestRequest.swift create mode 100644 authentikClient/Classes/OpenAPIs/Models/TenantRecoveryKeyResponse.swift create mode 100644 docs/Brand.md create mode 100644 docs/BrandRequest.md rename docs/{CurrentTenant.md => CurrentBrand.md} (98%) create mode 100644 docs/Domain.md create mode 100644 docs/DomainRequest.md create mode 100644 docs/PaginatedBrandList.md create mode 100644 docs/PaginatedDomainList.md create mode 100644 docs/PatchedBrandRequest.md create mode 100644 docs/PatchedDomainRequest.md create mode 100644 docs/PatchedSettingsRequest.md create mode 100644 docs/Settings.md create mode 100644 docs/SettingsRequest.md create mode 100644 docs/TenantAdminGroupRequestRequest.md create mode 100644 docs/TenantRecoveryKeyRequestRequest.md create mode 100644 docs/TenantRecoveryKeyResponse.md create mode 100644 docs/TenantsAPI.md diff --git a/.openapi-generator/FILES b/.openapi-generator/FILES index b19d3b3..bae925e 100644 --- a/.openapi-generator/FILES +++ b/.openapi-generator/FILES @@ -25,6 +25,7 @@ authentikClient/Classes/OpenAPIs/APIs/RootAPI.swift authentikClient/Classes/OpenAPIs/APIs/SchemaAPI.swift authentikClient/Classes/OpenAPIs/APIs/SourcesAPI.swift authentikClient/Classes/OpenAPIs/APIs/StagesAPI.swift +authentikClient/Classes/OpenAPIs/APIs/TenantsAPI.swift authentikClient/Classes/OpenAPIs/CodableHelper.swift authentikClient/Classes/OpenAPIs/Configuration.swift authentikClient/Classes/OpenAPIs/Extensions.swift @@ -83,6 +84,8 @@ authentikClient/Classes/OpenAPIs/Models/BlueprintFile.swift authentikClient/Classes/OpenAPIs/Models/BlueprintInstance.swift authentikClient/Classes/OpenAPIs/Models/BlueprintInstanceRequest.swift authentikClient/Classes/OpenAPIs/Models/BlueprintInstanceStatusEnum.swift +authentikClient/Classes/OpenAPIs/Models/Brand.swift +authentikClient/Classes/OpenAPIs/Models/BrandRequest.swift authentikClient/Classes/OpenAPIs/Models/Cache.swift authentikClient/Classes/OpenAPIs/Models/CapabilitiesEnum.swift authentikClient/Classes/OpenAPIs/Models/CaptchaChallenge.swift @@ -106,7 +109,7 @@ authentikClient/Classes/OpenAPIs/Models/ConsentStageRequest.swift authentikClient/Classes/OpenAPIs/Models/ContextualFlowInfo.swift authentikClient/Classes/OpenAPIs/Models/ContextualFlowInfoLayoutEnum.swift authentikClient/Classes/OpenAPIs/Models/Coordinate.swift -authentikClient/Classes/OpenAPIs/Models/CurrentTenant.swift +authentikClient/Classes/OpenAPIs/Models/CurrentBrand.swift authentikClient/Classes/OpenAPIs/Models/DeniedActionEnum.swift authentikClient/Classes/OpenAPIs/Models/DenyStage.swift authentikClient/Classes/OpenAPIs/Models/DenyStageRequest.swift @@ -118,6 +121,8 @@ authentikClient/Classes/OpenAPIs/Models/DigestAlgorithmEnum.swift authentikClient/Classes/OpenAPIs/Models/DigitsEnum.swift authentikClient/Classes/OpenAPIs/Models/DockerServiceConnection.swift authentikClient/Classes/OpenAPIs/Models/DockerServiceConnectionRequest.swift +authentikClient/Classes/OpenAPIs/Models/Domain.swift +authentikClient/Classes/OpenAPIs/Models/DomainRequest.swift authentikClient/Classes/OpenAPIs/Models/DummyChallenge.swift authentikClient/Classes/OpenAPIs/Models/DummyChallengeResponseRequest.swift authentikClient/Classes/OpenAPIs/Models/DummyPolicy.swift @@ -241,11 +246,13 @@ authentikClient/Classes/OpenAPIs/Models/PaginatedAuthenticatorStaticStageList.sw authentikClient/Classes/OpenAPIs/Models/PaginatedAuthenticatorTOTPStageList.swift authentikClient/Classes/OpenAPIs/Models/PaginatedAuthenticatorValidateStageList.swift authentikClient/Classes/OpenAPIs/Models/PaginatedBlueprintInstanceList.swift +authentikClient/Classes/OpenAPIs/Models/PaginatedBrandList.swift authentikClient/Classes/OpenAPIs/Models/PaginatedCaptchaStageList.swift authentikClient/Classes/OpenAPIs/Models/PaginatedCertificateKeyPairList.swift authentikClient/Classes/OpenAPIs/Models/PaginatedConsentStageList.swift authentikClient/Classes/OpenAPIs/Models/PaginatedDenyStageList.swift authentikClient/Classes/OpenAPIs/Models/PaginatedDockerServiceConnectionList.swift +authentikClient/Classes/OpenAPIs/Models/PaginatedDomainList.swift authentikClient/Classes/OpenAPIs/Models/PaginatedDummyPolicyList.swift authentikClient/Classes/OpenAPIs/Models/PaginatedDummyStageList.swift authentikClient/Classes/OpenAPIs/Models/PaginatedDuoDeviceList.swift @@ -341,11 +348,13 @@ authentikClient/Classes/OpenAPIs/Models/PatchedAuthenticatorStaticStageRequest.s authentikClient/Classes/OpenAPIs/Models/PatchedAuthenticatorTOTPStageRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedAuthenticatorValidateStageRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedBlueprintInstanceRequest.swift +authentikClient/Classes/OpenAPIs/Models/PatchedBrandRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedCaptchaStageRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedCertificateKeyPairRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedConsentStageRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedDenyStageRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedDockerServiceConnectionRequest.swift +authentikClient/Classes/OpenAPIs/Models/PatchedDomainRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedDummyPolicyRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedDummyStageRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedDuoDeviceRequest.swift @@ -394,6 +403,7 @@ authentikClient/Classes/OpenAPIs/Models/PatchedSCIMMappingRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedSCIMProviderRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedSMSDeviceRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedScopeMappingRequest.swift +authentikClient/Classes/OpenAPIs/Models/PatchedSettingsRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedStaticDeviceRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedTOTPDeviceRequest.swift authentikClient/Classes/OpenAPIs/Models/PatchedTenantRequest.swift @@ -479,6 +489,8 @@ authentikClient/Classes/OpenAPIs/Models/ServiceConnection.swift authentikClient/Classes/OpenAPIs/Models/ServiceConnectionRequest.swift authentikClient/Classes/OpenAPIs/Models/ServiceConnectionState.swift authentikClient/Classes/OpenAPIs/Models/SessionUser.swift +authentikClient/Classes/OpenAPIs/Models/Settings.swift +authentikClient/Classes/OpenAPIs/Models/SettingsRequest.swift authentikClient/Classes/OpenAPIs/Models/SeverityEnum.swift authentikClient/Classes/OpenAPIs/Models/ShellChallenge.swift authentikClient/Classes/OpenAPIs/Models/SignatureAlgorithmEnum.swift @@ -501,6 +513,9 @@ authentikClient/Classes/OpenAPIs/Models/TOTPDeviceRequest.swift authentikClient/Classes/OpenAPIs/Models/Task.swift authentikClient/Classes/OpenAPIs/Models/TaskStatusEnum.swift authentikClient/Classes/OpenAPIs/Models/Tenant.swift +authentikClient/Classes/OpenAPIs/Models/TenantAdminGroupRequestRequest.swift +authentikClient/Classes/OpenAPIs/Models/TenantRecoveryKeyRequestRequest.swift +authentikClient/Classes/OpenAPIs/Models/TenantRecoveryKeyResponse.swift authentikClient/Classes/OpenAPIs/Models/TenantRequest.swift authentikClient/Classes/OpenAPIs/Models/Token.swift authentikClient/Classes/OpenAPIs/Models/TokenModel.swift @@ -611,6 +626,8 @@ docs/BlueprintFile.md docs/BlueprintInstance.md docs/BlueprintInstanceRequest.md docs/BlueprintInstanceStatusEnum.md +docs/Brand.md +docs/BrandRequest.md docs/Cache.md docs/CapabilitiesEnum.md docs/CaptchaChallenge.md @@ -636,7 +653,7 @@ docs/ContextualFlowInfoLayoutEnum.md docs/Coordinate.md docs/CoreAPI.md docs/CryptoAPI.md -docs/CurrentTenant.md +docs/CurrentBrand.md docs/DeniedActionEnum.md docs/DenyStage.md docs/DenyStageRequest.md @@ -648,6 +665,8 @@ docs/DigestAlgorithmEnum.md docs/DigitsEnum.md docs/DockerServiceConnection.md docs/DockerServiceConnectionRequest.md +docs/Domain.md +docs/DomainRequest.md docs/DummyChallenge.md docs/DummyChallengeResponseRequest.md docs/DummyPolicy.md @@ -777,11 +796,13 @@ docs/PaginatedAuthenticatorStaticStageList.md docs/PaginatedAuthenticatorTOTPStageList.md docs/PaginatedAuthenticatorValidateStageList.md docs/PaginatedBlueprintInstanceList.md +docs/PaginatedBrandList.md docs/PaginatedCaptchaStageList.md docs/PaginatedCertificateKeyPairList.md docs/PaginatedConsentStageList.md docs/PaginatedDenyStageList.md docs/PaginatedDockerServiceConnectionList.md +docs/PaginatedDomainList.md docs/PaginatedDummyPolicyList.md docs/PaginatedDummyStageList.md docs/PaginatedDuoDeviceList.md @@ -877,11 +898,13 @@ docs/PatchedAuthenticatorStaticStageRequest.md docs/PatchedAuthenticatorTOTPStageRequest.md docs/PatchedAuthenticatorValidateStageRequest.md docs/PatchedBlueprintInstanceRequest.md +docs/PatchedBrandRequest.md docs/PatchedCaptchaStageRequest.md docs/PatchedCertificateKeyPairRequest.md docs/PatchedConsentStageRequest.md docs/PatchedDenyStageRequest.md docs/PatchedDockerServiceConnectionRequest.md +docs/PatchedDomainRequest.md docs/PatchedDummyPolicyRequest.md docs/PatchedDummyStageRequest.md docs/PatchedDuoDeviceRequest.md @@ -930,6 +953,7 @@ docs/PatchedSCIMMappingRequest.md docs/PatchedSCIMProviderRequest.md docs/PatchedSMSDeviceRequest.md docs/PatchedScopeMappingRequest.md +docs/PatchedSettingsRequest.md docs/PatchedStaticDeviceRequest.md docs/PatchedTOTPDeviceRequest.md docs/PatchedTenantRequest.md @@ -1022,6 +1046,8 @@ docs/ServiceConnection.md docs/ServiceConnectionRequest.md docs/ServiceConnectionState.md docs/SessionUser.md +docs/Settings.md +docs/SettingsRequest.md docs/SeverityEnum.md docs/ShellChallenge.md docs/SignatureAlgorithmEnum.md @@ -1046,7 +1072,11 @@ docs/TOTPDeviceRequest.md docs/Task.md docs/TaskStatusEnum.md docs/Tenant.md +docs/TenantAdminGroupRequestRequest.md +docs/TenantRecoveryKeyRequestRequest.md +docs/TenantRecoveryKeyResponse.md docs/TenantRequest.md +docs/TenantsAPI.md docs/Token.md docs/TokenModel.md docs/TokenRequest.md diff --git a/README.md b/README.md index 68927df..7b68e91 100644 --- a/README.md +++ b/README.md @@ -26,6 +26,9 @@ Class | Method | HTTP request | Description *AdminAPI* | [**adminAppsList**](docs/AdminAPI.md#adminappslist) | **GET** /admin/apps/ | *AdminAPI* | [**adminMetricsRetrieve**](docs/AdminAPI.md#adminmetricsretrieve) | **GET** /admin/metrics/ | *AdminAPI* | [**adminModelsList**](docs/AdminAPI.md#adminmodelslist) | **GET** /admin/models/ | +*AdminAPI* | [**adminSettingsPartialUpdate**](docs/AdminAPI.md#adminsettingspartialupdate) | **PATCH** /admin/settings/ | +*AdminAPI* | [**adminSettingsRetrieve**](docs/AdminAPI.md#adminsettingsretrieve) | **GET** /admin/settings/ | +*AdminAPI* | [**adminSettingsUpdate**](docs/AdminAPI.md#adminsettingsupdate) | **PUT** /admin/settings/ | *AdminAPI* | [**adminSystemCreate**](docs/AdminAPI.md#adminsystemcreate) | **POST** /admin/system/ | *AdminAPI* | [**adminSystemRetrieve**](docs/AdminAPI.md#adminsystemretrieve) | **GET** /admin/system/ | *AdminAPI* | [**adminSystemTasksList**](docs/AdminAPI.md#adminsystemtaskslist) | **GET** /admin/system_tasks/ | @@ -110,6 +113,14 @@ Class | Method | HTTP request | Description *CoreAPI* | [**coreAuthenticatedSessionsList**](docs/CoreAPI.md#coreauthenticatedsessionslist) | **GET** /core/authenticated_sessions/ | *CoreAPI* | [**coreAuthenticatedSessionsRetrieve**](docs/CoreAPI.md#coreauthenticatedsessionsretrieve) | **GET** /core/authenticated_sessions/{uuid}/ | *CoreAPI* | [**coreAuthenticatedSessionsUsedByList**](docs/CoreAPI.md#coreauthenticatedsessionsusedbylist) | **GET** /core/authenticated_sessions/{uuid}/used_by/ | +*CoreAPI* | [**coreBrandsCreate**](docs/CoreAPI.md#corebrandscreate) | **POST** /core/brands/ | +*CoreAPI* | [**coreBrandsCurrentRetrieve**](docs/CoreAPI.md#corebrandscurrentretrieve) | **GET** /core/brands/current/ | +*CoreAPI* | [**coreBrandsDestroy**](docs/CoreAPI.md#corebrandsdestroy) | **DELETE** /core/brands/{brand_uuid}/ | +*CoreAPI* | [**coreBrandsList**](docs/CoreAPI.md#corebrandslist) | **GET** /core/brands/ | +*CoreAPI* | [**coreBrandsPartialUpdate**](docs/CoreAPI.md#corebrandspartialupdate) | **PATCH** /core/brands/{brand_uuid}/ | +*CoreAPI* | [**coreBrandsRetrieve**](docs/CoreAPI.md#corebrandsretrieve) | **GET** /core/brands/{brand_uuid}/ | +*CoreAPI* | [**coreBrandsUpdate**](docs/CoreAPI.md#corebrandsupdate) | **PUT** /core/brands/{brand_uuid}/ | +*CoreAPI* | [**coreBrandsUsedByList**](docs/CoreAPI.md#corebrandsusedbylist) | **GET** /core/brands/{brand_uuid}/used_by/ | *CoreAPI* | [**coreGroupsAddUserCreate**](docs/CoreAPI.md#coregroupsaddusercreate) | **POST** /core/groups/{group_uuid}/add_user/ | *CoreAPI* | [**coreGroupsCreate**](docs/CoreAPI.md#coregroupscreate) | **POST** /core/groups/ | *CoreAPI* | [**coreGroupsDestroy**](docs/CoreAPI.md#coregroupsdestroy) | **DELETE** /core/groups/{group_uuid}/ | @@ -119,14 +130,6 @@ Class | Method | HTTP request | Description *CoreAPI* | [**coreGroupsRetrieve**](docs/CoreAPI.md#coregroupsretrieve) | **GET** /core/groups/{group_uuid}/ | *CoreAPI* | [**coreGroupsUpdate**](docs/CoreAPI.md#coregroupsupdate) | **PUT** /core/groups/{group_uuid}/ | *CoreAPI* | [**coreGroupsUsedByList**](docs/CoreAPI.md#coregroupsusedbylist) | **GET** /core/groups/{group_uuid}/used_by/ | -*CoreAPI* | [**coreTenantsCreate**](docs/CoreAPI.md#coretenantscreate) | **POST** /core/tenants/ | -*CoreAPI* | [**coreTenantsCurrentRetrieve**](docs/CoreAPI.md#coretenantscurrentretrieve) | **GET** /core/tenants/current/ | -*CoreAPI* | [**coreTenantsDestroy**](docs/CoreAPI.md#coretenantsdestroy) | **DELETE** /core/tenants/{tenant_uuid}/ | -*CoreAPI* | [**coreTenantsList**](docs/CoreAPI.md#coretenantslist) | **GET** /core/tenants/ | -*CoreAPI* | [**coreTenantsPartialUpdate**](docs/CoreAPI.md#coretenantspartialupdate) | **PATCH** /core/tenants/{tenant_uuid}/ | -*CoreAPI* | [**coreTenantsRetrieve**](docs/CoreAPI.md#coretenantsretrieve) | **GET** /core/tenants/{tenant_uuid}/ | -*CoreAPI* | [**coreTenantsUpdate**](docs/CoreAPI.md#coretenantsupdate) | **PUT** /core/tenants/{tenant_uuid}/ | -*CoreAPI* | [**coreTenantsUsedByList**](docs/CoreAPI.md#coretenantsusedbylist) | **GET** /core/tenants/{tenant_uuid}/used_by/ | *CoreAPI* | [**coreTokensCreate**](docs/CoreAPI.md#coretokenscreate) | **POST** /core/tokens/ | *CoreAPI* | [**coreTokensDestroy**](docs/CoreAPI.md#coretokensdestroy) | **DELETE** /core/tokens/{identifier}/ | *CoreAPI* | [**coreTokensList**](docs/CoreAPI.md#coretokenslist) | **GET** /core/tokens/ | @@ -712,6 +715,20 @@ Class | Method | HTTP request | Description *StagesAPI* | [**stagesUserWriteRetrieve**](docs/StagesAPI.md#stagesuserwriteretrieve) | **GET** /stages/user_write/{stage_uuid}/ | *StagesAPI* | [**stagesUserWriteUpdate**](docs/StagesAPI.md#stagesuserwriteupdate) | **PUT** /stages/user_write/{stage_uuid}/ | *StagesAPI* | [**stagesUserWriteUsedByList**](docs/StagesAPI.md#stagesuserwriteusedbylist) | **GET** /stages/user_write/{stage_uuid}/used_by/ | +*TenantsAPI* | [**tenantsDomainsCreate**](docs/TenantsAPI.md#tenantsdomainscreate) | **POST** /tenants/domains/ | +*TenantsAPI* | [**tenantsDomainsDestroy**](docs/TenantsAPI.md#tenantsdomainsdestroy) | **DELETE** /tenants/domains/{id}/ | +*TenantsAPI* | [**tenantsDomainsList**](docs/TenantsAPI.md#tenantsdomainslist) | **GET** /tenants/domains/ | +*TenantsAPI* | [**tenantsDomainsPartialUpdate**](docs/TenantsAPI.md#tenantsdomainspartialupdate) | **PATCH** /tenants/domains/{id}/ | +*TenantsAPI* | [**tenantsDomainsRetrieve**](docs/TenantsAPI.md#tenantsdomainsretrieve) | **GET** /tenants/domains/{id}/ | +*TenantsAPI* | [**tenantsDomainsUpdate**](docs/TenantsAPI.md#tenantsdomainsupdate) | **PUT** /tenants/domains/{id}/ | +*TenantsAPI* | [**tenantsTenantsCreate**](docs/TenantsAPI.md#tenantstenantscreate) | **POST** /tenants/tenants/ | +*TenantsAPI* | [**tenantsTenantsCreateAdminGroupCreate**](docs/TenantsAPI.md#tenantstenantscreateadmingroupcreate) | **POST** /tenants/tenants/{tenant_uuid}/create_admin_group/ | +*TenantsAPI* | [**tenantsTenantsCreateRecoveryKeyCreate**](docs/TenantsAPI.md#tenantstenantscreaterecoverykeycreate) | **POST** /tenants/tenants/{tenant_uuid}/create_recovery_key/ | +*TenantsAPI* | [**tenantsTenantsDestroy**](docs/TenantsAPI.md#tenantstenantsdestroy) | **DELETE** /tenants/tenants/{tenant_uuid}/ | +*TenantsAPI* | [**tenantsTenantsList**](docs/TenantsAPI.md#tenantstenantslist) | **GET** /tenants/tenants/ | +*TenantsAPI* | [**tenantsTenantsPartialUpdate**](docs/TenantsAPI.md#tenantstenantspartialupdate) | **PATCH** /tenants/tenants/{tenant_uuid}/ | +*TenantsAPI* | [**tenantsTenantsRetrieve**](docs/TenantsAPI.md#tenantstenantsretrieve) | **GET** /tenants/tenants/{tenant_uuid}/ | +*TenantsAPI* | [**tenantsTenantsUpdate**](docs/TenantsAPI.md#tenantstenantsupdate) | **PUT** /tenants/tenants/{tenant_uuid}/ | ## Documentation For Models @@ -768,6 +785,8 @@ Class | Method | HTTP request | Description - [BlueprintInstance](docs/BlueprintInstance.md) - [BlueprintInstanceRequest](docs/BlueprintInstanceRequest.md) - [BlueprintInstanceStatusEnum](docs/BlueprintInstanceStatusEnum.md) + - [Brand](docs/Brand.md) + - [BrandRequest](docs/BrandRequest.md) - [Cache](docs/Cache.md) - [CapabilitiesEnum](docs/CapabilitiesEnum.md) - [CaptchaChallenge](docs/CaptchaChallenge.md) @@ -791,7 +810,7 @@ Class | Method | HTTP request | Description - [ContextualFlowInfo](docs/ContextualFlowInfo.md) - [ContextualFlowInfoLayoutEnum](docs/ContextualFlowInfoLayoutEnum.md) - [Coordinate](docs/Coordinate.md) - - [CurrentTenant](docs/CurrentTenant.md) + - [CurrentBrand](docs/CurrentBrand.md) - [DeniedActionEnum](docs/DeniedActionEnum.md) - [DenyStage](docs/DenyStage.md) - [DenyStageRequest](docs/DenyStageRequest.md) @@ -803,6 +822,8 @@ Class | Method | HTTP request | Description - [DigitsEnum](docs/DigitsEnum.md) - [DockerServiceConnection](docs/DockerServiceConnection.md) - [DockerServiceConnectionRequest](docs/DockerServiceConnectionRequest.md) + - [Domain](docs/Domain.md) + - [DomainRequest](docs/DomainRequest.md) - [DummyChallenge](docs/DummyChallenge.md) - [DummyChallengeResponseRequest](docs/DummyChallengeResponseRequest.md) - [DummyPolicy](docs/DummyPolicy.md) @@ -926,11 +947,13 @@ Class | Method | HTTP request | Description - [PaginatedAuthenticatorTOTPStageList](docs/PaginatedAuthenticatorTOTPStageList.md) - [PaginatedAuthenticatorValidateStageList](docs/PaginatedAuthenticatorValidateStageList.md) - [PaginatedBlueprintInstanceList](docs/PaginatedBlueprintInstanceList.md) + - [PaginatedBrandList](docs/PaginatedBrandList.md) - [PaginatedCaptchaStageList](docs/PaginatedCaptchaStageList.md) - [PaginatedCertificateKeyPairList](docs/PaginatedCertificateKeyPairList.md) - [PaginatedConsentStageList](docs/PaginatedConsentStageList.md) - [PaginatedDenyStageList](docs/PaginatedDenyStageList.md) - [PaginatedDockerServiceConnectionList](docs/PaginatedDockerServiceConnectionList.md) + - [PaginatedDomainList](docs/PaginatedDomainList.md) - [PaginatedDummyPolicyList](docs/PaginatedDummyPolicyList.md) - [PaginatedDummyStageList](docs/PaginatedDummyStageList.md) - [PaginatedDuoDeviceList](docs/PaginatedDuoDeviceList.md) @@ -1026,11 +1049,13 @@ Class | Method | HTTP request | Description - [PatchedAuthenticatorTOTPStageRequest](docs/PatchedAuthenticatorTOTPStageRequest.md) - [PatchedAuthenticatorValidateStageRequest](docs/PatchedAuthenticatorValidateStageRequest.md) - [PatchedBlueprintInstanceRequest](docs/PatchedBlueprintInstanceRequest.md) + - [PatchedBrandRequest](docs/PatchedBrandRequest.md) - [PatchedCaptchaStageRequest](docs/PatchedCaptchaStageRequest.md) - [PatchedCertificateKeyPairRequest](docs/PatchedCertificateKeyPairRequest.md) - [PatchedConsentStageRequest](docs/PatchedConsentStageRequest.md) - [PatchedDenyStageRequest](docs/PatchedDenyStageRequest.md) - [PatchedDockerServiceConnectionRequest](docs/PatchedDockerServiceConnectionRequest.md) + - [PatchedDomainRequest](docs/PatchedDomainRequest.md) - [PatchedDummyPolicyRequest](docs/PatchedDummyPolicyRequest.md) - [PatchedDummyStageRequest](docs/PatchedDummyStageRequest.md) - [PatchedDuoDeviceRequest](docs/PatchedDuoDeviceRequest.md) @@ -1079,6 +1104,7 @@ Class | Method | HTTP request | Description - [PatchedSCIMProviderRequest](docs/PatchedSCIMProviderRequest.md) - [PatchedSMSDeviceRequest](docs/PatchedSMSDeviceRequest.md) - [PatchedScopeMappingRequest](docs/PatchedScopeMappingRequest.md) + - [PatchedSettingsRequest](docs/PatchedSettingsRequest.md) - [PatchedStaticDeviceRequest](docs/PatchedStaticDeviceRequest.md) - [PatchedTOTPDeviceRequest](docs/PatchedTOTPDeviceRequest.md) - [PatchedTenantRequest](docs/PatchedTenantRequest.md) @@ -1164,6 +1190,8 @@ Class | Method | HTTP request | Description - [ServiceConnectionRequest](docs/ServiceConnectionRequest.md) - [ServiceConnectionState](docs/ServiceConnectionState.md) - [SessionUser](docs/SessionUser.md) + - [Settings](docs/Settings.md) + - [SettingsRequest](docs/SettingsRequest.md) - [SeverityEnum](docs/SeverityEnum.md) - [ShellChallenge](docs/ShellChallenge.md) - [SignatureAlgorithmEnum](docs/SignatureAlgorithmEnum.md) @@ -1186,6 +1214,9 @@ Class | Method | HTTP request | Description - [Task](docs/Task.md) - [TaskStatusEnum](docs/TaskStatusEnum.md) - [Tenant](docs/Tenant.md) + - [TenantAdminGroupRequestRequest](docs/TenantAdminGroupRequestRequest.md) + - [TenantRecoveryKeyRequestRequest](docs/TenantRecoveryKeyRequestRequest.md) + - [TenantRecoveryKeyResponse](docs/TenantRecoveryKeyResponse.md) - [TenantRequest](docs/TenantRequest.md) - [Token](docs/Token.md) - [TokenModel](docs/TokenModel.md) diff --git a/authentikClient/Classes/OpenAPIs/APIs/AdminAPI.swift b/authentikClient/Classes/OpenAPIs/APIs/AdminAPI.swift index 817f67d..0c02006 100644 --- a/authentikClient/Classes/OpenAPIs/APIs/AdminAPI.swift +++ b/authentikClient/Classes/OpenAPIs/APIs/AdminAPI.swift @@ -141,6 +141,139 @@ open class AdminAPI { return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } + /** + + - parameter patchedSettingsRequest: (body) (optional) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func adminSettingsPartialUpdate(patchedSettingsRequest: PatchedSettingsRequest? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Settings?, _ error: Error?) -> Void)) -> RequestTask { + return adminSettingsPartialUpdateWithRequestBuilder(patchedSettingsRequest: patchedSettingsRequest).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - PATCH /admin/settings/ + - Settings view + - API Key: + - type: apiKey Authorization + - name: authentik + - parameter patchedSettingsRequest: (body) (optional) + - returns: RequestBuilder + */ + open class func adminSettingsPartialUpdateWithRequestBuilder(patchedSettingsRequest: PatchedSettingsRequest? = nil) -> RequestBuilder { + let localVariablePath = "/admin/settings/" + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: patchedSettingsRequest) + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "PATCH", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + } + + /** + + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func adminSettingsRetrieve(apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Settings?, _ error: Error?) -> Void)) -> RequestTask { + return adminSettingsRetrieveWithRequestBuilder().execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - GET /admin/settings/ + - Settings view + - API Key: + - type: apiKey Authorization + - name: authentik + - returns: RequestBuilder + */ + open class func adminSettingsRetrieveWithRequestBuilder() -> RequestBuilder { + let localVariablePath = "/admin/settings/" + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters: [String: Any]? = nil + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + } + + /** + + - parameter settingsRequest: (body) (optional) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func adminSettingsUpdate(settingsRequest: SettingsRequest? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Settings?, _ error: Error?) -> Void)) -> RequestTask { + return adminSettingsUpdateWithRequestBuilder(settingsRequest: settingsRequest).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - PUT /admin/settings/ + - Settings view + - API Key: + - type: apiKey Authorization + - name: authentik + - parameter settingsRequest: (body) (optional) + - returns: RequestBuilder + */ + open class func adminSettingsUpdateWithRequestBuilder(settingsRequest: SettingsRequest? = nil) -> RequestBuilder { + let localVariablePath = "/admin/settings/" + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: settingsRequest) + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "PUT", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + } + /** - parameter apiResponseQueue: The queue on which api response is dispatched. diff --git a/authentikClient/Classes/OpenAPIs/APIs/CoreAPI.swift b/authentikClient/Classes/OpenAPIs/APIs/CoreAPI.swift index fff513c..f652a11 100644 --- a/authentikClient/Classes/OpenAPIs/APIs/CoreAPI.swift +++ b/authentikClient/Classes/OpenAPIs/APIs/CoreAPI.swift @@ -800,17 +800,16 @@ open class CoreAPI { /** - - parameter groupUuid: (path) A UUID string identifying this Group. - - parameter userAccountRequest: (body) + - parameter brandRequest: (body) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreGroupsAddUserCreate(groupUuid: UUID, userAccountRequest: UserAccountRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Void?, _ error: Error?) -> Void)) -> RequestTask { - return coreGroupsAddUserCreateWithRequestBuilder(groupUuid: groupUuid, userAccountRequest: userAccountRequest).execute(apiResponseQueue) { result in + open class func coreBrandsCreate(brandRequest: BrandRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Brand?, _ error: Error?) -> Void)) -> RequestTask { + return coreBrandsCreateWithRequestBuilder(brandRequest: brandRequest).execute(apiResponseQueue) { result in switch result { - case .success: - completion((), nil) + case let .success(response): + completion(response.body, nil) case let .failure(error): completion(nil, error) } @@ -818,22 +817,18 @@ open class CoreAPI { } /** - - POST /core/groups/{group_uuid}/add_user/ - - Add user to group + - POST /core/brands/ + - Brand Viewset - API Key: - type: apiKey Authorization - name: authentik - - parameter groupUuid: (path) A UUID string identifying this Group. - - parameter userAccountRequest: (body) - - returns: RequestBuilder + - parameter brandRequest: (body) + - returns: RequestBuilder */ - open class func coreGroupsAddUserCreateWithRequestBuilder(groupUuid: UUID, userAccountRequest: UserAccountRequest) -> RequestBuilder { - var localVariablePath = "/core/groups/{group_uuid}/add_user/" - let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" - let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" - localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) + open class func coreBrandsCreateWithRequestBuilder(brandRequest: BrandRequest) -> RequestBuilder { + let localVariablePath = "/core/brands/" let localVariableURLString = authentikClientAPI.basePath + localVariablePath - let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: userAccountRequest) + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: brandRequest) let localVariableUrlComponents = URLComponents(string: localVariableURLString) @@ -843,20 +838,19 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getNonDecodableBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() return localVariableRequestBuilder.init(method: "POST", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter groupRequest: (body) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreGroupsCreate(groupRequest: GroupRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Group?, _ error: Error?) -> Void)) -> RequestTask { - return coreGroupsCreateWithRequestBuilder(groupRequest: groupRequest).execute(apiResponseQueue) { result in + open class func coreBrandsCurrentRetrieve(apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: CurrentBrand?, _ error: Error?) -> Void)) -> RequestTask { + return coreBrandsCurrentRetrieveWithRequestBuilder().execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -867,18 +861,17 @@ open class CoreAPI { } /** - - POST /core/groups/ - - Group Viewset + - GET /core/brands/current/ + - Get current brand - API Key: - type: apiKey Authorization - name: authentik - - parameter groupRequest: (body) - - returns: RequestBuilder + - returns: RequestBuilder */ - open class func coreGroupsCreateWithRequestBuilder(groupRequest: GroupRequest) -> RequestBuilder { - let localVariablePath = "/core/groups/" + open class func coreBrandsCurrentRetrieveWithRequestBuilder() -> RequestBuilder { + let localVariablePath = "/core/brands/current/" let localVariableURLString = authentikClientAPI.basePath + localVariablePath - let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: groupRequest) + let localVariableParameters: [String: Any]? = nil let localVariableUrlComponents = URLComponents(string: localVariableURLString) @@ -888,20 +881,20 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() - return localVariableRequestBuilder.init(method: "POST", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter groupUuid: (path) A UUID string identifying this Group. + - parameter brandUuid: (path) A UUID string identifying this Brand. - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreGroupsDestroy(groupUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Void?, _ error: Error?) -> Void)) -> RequestTask { - return coreGroupsDestroyWithRequestBuilder(groupUuid: groupUuid).execute(apiResponseQueue) { result in + open class func coreBrandsDestroy(brandUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Void?, _ error: Error?) -> Void)) -> RequestTask { + return coreBrandsDestroyWithRequestBuilder(brandUuid: brandUuid).execute(apiResponseQueue) { result in switch result { case .success: completion((), nil) @@ -912,19 +905,19 @@ open class CoreAPI { } /** - - DELETE /core/groups/{group_uuid}/ - - Group Viewset + - DELETE /core/brands/{brand_uuid}/ + - Brand Viewset - API Key: - type: apiKey Authorization - name: authentik - - parameter groupUuid: (path) A UUID string identifying this Group. + - parameter brandUuid: (path) A UUID string identifying this Brand. - returns: RequestBuilder */ - open class func coreGroupsDestroyWithRequestBuilder(groupUuid: UUID) -> RequestBuilder { - var localVariablePath = "/core/groups/{group_uuid}/" - let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" - let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" - localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) + open class func coreBrandsDestroyWithRequestBuilder(brandUuid: UUID) -> RequestBuilder { + var localVariablePath = "/core/brands/{brand_uuid}/" + let brandUuidPreEscape = "\(APIHelper.mapValueToPathItem(brandUuid))" + let brandUuidPostEscape = brandUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{brand_uuid}", with: brandUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath let localVariableParameters: [String: Any]? = nil @@ -943,21 +936,29 @@ open class CoreAPI { /** - - parameter attributes: (query) Attributes (optional) - - parameter isSuperuser: (query) (optional) - - parameter membersByPk: (query) (optional) - - parameter membersByUsername: (query) Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only. (optional) - - parameter name: (query) (optional) + - parameter brandUuid: (query) (optional) + - parameter brandingFavicon: (query) (optional) + - parameter brandingLogo: (query) (optional) + - parameter brandingTitle: (query) (optional) + - parameter _default: (query) (optional) + - parameter domain: (query) (optional) + - parameter flowAuthentication: (query) (optional) + - parameter flowDeviceCode: (query) (optional) + - parameter flowInvalidation: (query) (optional) + - parameter flowRecovery: (query) (optional) + - parameter flowUnenrollment: (query) (optional) + - parameter flowUserSettings: (query) (optional) - parameter ordering: (query) Which field to use when ordering the results. (optional) - parameter page: (query) A page number within the paginated result set. (optional) - parameter pageSize: (query) Number of results to return per page. (optional) - parameter search: (query) A search term. (optional) + - parameter webCertificate: (query) (optional) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreGroupsList(attributes: String? = nil, isSuperuser: Bool? = nil, membersByPk: [Int]? = nil, membersByUsername: [String]? = nil, name: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: PaginatedGroupList?, _ error: Error?) -> Void)) -> RequestTask { - return coreGroupsListWithRequestBuilder(attributes: attributes, isSuperuser: isSuperuser, membersByPk: membersByPk, membersByUsername: membersByUsername, name: name, ordering: ordering, page: page, pageSize: pageSize, search: search).execute(apiResponseQueue) { result in + open class func coreBrandsList(brandUuid: UUID? = nil, brandingFavicon: String? = nil, brandingLogo: String? = nil, brandingTitle: String? = nil, _default: Bool? = nil, domain: String? = nil, flowAuthentication: UUID? = nil, flowDeviceCode: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, webCertificate: UUID? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: PaginatedBrandList?, _ error: Error?) -> Void)) -> RequestTask { + return coreBrandsListWithRequestBuilder(brandUuid: brandUuid, brandingFavicon: brandingFavicon, brandingLogo: brandingLogo, brandingTitle: brandingTitle, _default: _default, domain: domain, flowAuthentication: flowAuthentication, flowDeviceCode: flowDeviceCode, flowInvalidation: flowInvalidation, flowRecovery: flowRecovery, flowUnenrollment: flowUnenrollment, flowUserSettings: flowUserSettings, ordering: ordering, page: page, pageSize: pageSize, search: search, webCertificate: webCertificate).execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -968,38 +969,54 @@ open class CoreAPI { } /** - - GET /core/groups/ - - Group Viewset + - GET /core/brands/ + - Brand Viewset - API Key: - type: apiKey Authorization - name: authentik - - parameter attributes: (query) Attributes (optional) - - parameter isSuperuser: (query) (optional) - - parameter membersByPk: (query) (optional) - - parameter membersByUsername: (query) Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only. (optional) - - parameter name: (query) (optional) + - parameter brandUuid: (query) (optional) + - parameter brandingFavicon: (query) (optional) + - parameter brandingLogo: (query) (optional) + - parameter brandingTitle: (query) (optional) + - parameter _default: (query) (optional) + - parameter domain: (query) (optional) + - parameter flowAuthentication: (query) (optional) + - parameter flowDeviceCode: (query) (optional) + - parameter flowInvalidation: (query) (optional) + - parameter flowRecovery: (query) (optional) + - parameter flowUnenrollment: (query) (optional) + - parameter flowUserSettings: (query) (optional) - parameter ordering: (query) Which field to use when ordering the results. (optional) - parameter page: (query) A page number within the paginated result set. (optional) - parameter pageSize: (query) Number of results to return per page. (optional) - parameter search: (query) A search term. (optional) - - returns: RequestBuilder + - parameter webCertificate: (query) (optional) + - returns: RequestBuilder */ - open class func coreGroupsListWithRequestBuilder(attributes: String? = nil, isSuperuser: Bool? = nil, membersByPk: [Int]? = nil, membersByUsername: [String]? = nil, name: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil) -> RequestBuilder { - let localVariablePath = "/core/groups/" + open class func coreBrandsListWithRequestBuilder(brandUuid: UUID? = nil, brandingFavicon: String? = nil, brandingLogo: String? = nil, brandingTitle: String? = nil, _default: Bool? = nil, domain: String? = nil, flowAuthentication: UUID? = nil, flowDeviceCode: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, webCertificate: UUID? = nil) -> RequestBuilder { + let localVariablePath = "/core/brands/" let localVariableURLString = authentikClientAPI.basePath + localVariablePath let localVariableParameters: [String: Any]? = nil var localVariableUrlComponents = URLComponents(string: localVariableURLString) localVariableUrlComponents?.queryItems = APIHelper.mapValuesToQueryItems([ - "attributes": (wrappedValue: attributes?.encodeToJSON(), isExplode: true), - "is_superuser": (wrappedValue: isSuperuser?.encodeToJSON(), isExplode: true), - "members_by_pk": (wrappedValue: membersByPk?.encodeToJSON(), isExplode: true), - "members_by_username": (wrappedValue: membersByUsername?.encodeToJSON(), isExplode: true), - "name": (wrappedValue: name?.encodeToJSON(), isExplode: true), + "brand_uuid": (wrappedValue: brandUuid?.encodeToJSON(), isExplode: true), + "branding_favicon": (wrappedValue: brandingFavicon?.encodeToJSON(), isExplode: true), + "branding_logo": (wrappedValue: brandingLogo?.encodeToJSON(), isExplode: true), + "branding_title": (wrappedValue: brandingTitle?.encodeToJSON(), isExplode: true), + "default": (wrappedValue: _default?.encodeToJSON(), isExplode: true), + "domain": (wrappedValue: domain?.encodeToJSON(), isExplode: true), + "flow_authentication": (wrappedValue: flowAuthentication?.encodeToJSON(), isExplode: true), + "flow_device_code": (wrappedValue: flowDeviceCode?.encodeToJSON(), isExplode: true), + "flow_invalidation": (wrappedValue: flowInvalidation?.encodeToJSON(), isExplode: true), + "flow_recovery": (wrappedValue: flowRecovery?.encodeToJSON(), isExplode: true), + "flow_unenrollment": (wrappedValue: flowUnenrollment?.encodeToJSON(), isExplode: true), + "flow_user_settings": (wrappedValue: flowUserSettings?.encodeToJSON(), isExplode: true), "ordering": (wrappedValue: ordering?.encodeToJSON(), isExplode: true), "page": (wrappedValue: page?.encodeToJSON(), isExplode: true), "page_size": (wrappedValue: pageSize?.encodeToJSON(), isExplode: true), "search": (wrappedValue: search?.encodeToJSON(), isExplode: true), + "web_certificate": (wrappedValue: webCertificate?.encodeToJSON(), isExplode: true), ]) let localVariableNillableHeaders: [String: Any?] = [ @@ -1008,21 +1025,21 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter groupUuid: (path) A UUID string identifying this Group. - - parameter patchedGroupRequest: (body) (optional) + - parameter brandUuid: (path) A UUID string identifying this Brand. + - parameter patchedBrandRequest: (body) (optional) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreGroupsPartialUpdate(groupUuid: UUID, patchedGroupRequest: PatchedGroupRequest? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Group?, _ error: Error?) -> Void)) -> RequestTask { - return coreGroupsPartialUpdateWithRequestBuilder(groupUuid: groupUuid, patchedGroupRequest: patchedGroupRequest).execute(apiResponseQueue) { result in + open class func coreBrandsPartialUpdate(brandUuid: UUID, patchedBrandRequest: PatchedBrandRequest? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Brand?, _ error: Error?) -> Void)) -> RequestTask { + return coreBrandsPartialUpdateWithRequestBuilder(brandUuid: brandUuid, patchedBrandRequest: patchedBrandRequest).execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -1033,22 +1050,22 @@ open class CoreAPI { } /** - - PATCH /core/groups/{group_uuid}/ - - Group Viewset + - PATCH /core/brands/{brand_uuid}/ + - Brand Viewset - API Key: - type: apiKey Authorization - name: authentik - - parameter groupUuid: (path) A UUID string identifying this Group. - - parameter patchedGroupRequest: (body) (optional) - - returns: RequestBuilder - */ - open class func coreGroupsPartialUpdateWithRequestBuilder(groupUuid: UUID, patchedGroupRequest: PatchedGroupRequest? = nil) -> RequestBuilder { - var localVariablePath = "/core/groups/{group_uuid}/" - let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" - let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" - localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) + - parameter brandUuid: (path) A UUID string identifying this Brand. + - parameter patchedBrandRequest: (body) (optional) + - returns: RequestBuilder + */ + open class func coreBrandsPartialUpdateWithRequestBuilder(brandUuid: UUID, patchedBrandRequest: PatchedBrandRequest? = nil) -> RequestBuilder { + var localVariablePath = "/core/brands/{brand_uuid}/" + let brandUuidPreEscape = "\(APIHelper.mapValueToPathItem(brandUuid))" + let brandUuidPostEscape = brandUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{brand_uuid}", with: brandUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath - let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: patchedGroupRequest) + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: patchedBrandRequest) let localVariableUrlComponents = URLComponents(string: localVariableURLString) @@ -1058,24 +1075,23 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() return localVariableRequestBuilder.init(method: "PATCH", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter groupUuid: (path) A UUID string identifying this Group. - - parameter userAccountRequest: (body) + - parameter brandUuid: (path) A UUID string identifying this Brand. - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreGroupsRemoveUserCreate(groupUuid: UUID, userAccountRequest: UserAccountRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Void?, _ error: Error?) -> Void)) -> RequestTask { - return coreGroupsRemoveUserCreateWithRequestBuilder(groupUuid: groupUuid, userAccountRequest: userAccountRequest).execute(apiResponseQueue) { result in + open class func coreBrandsRetrieve(brandUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Brand?, _ error: Error?) -> Void)) -> RequestTask { + return coreBrandsRetrieveWithRequestBuilder(brandUuid: brandUuid).execute(apiResponseQueue) { result in switch result { - case .success: - completion((), nil) + case let .success(response): + completion(response.body, nil) case let .failure(error): completion(nil, error) } @@ -1083,22 +1099,21 @@ open class CoreAPI { } /** - - POST /core/groups/{group_uuid}/remove_user/ - - Add user to group + - GET /core/brands/{brand_uuid}/ + - Brand Viewset - API Key: - type: apiKey Authorization - name: authentik - - parameter groupUuid: (path) A UUID string identifying this Group. - - parameter userAccountRequest: (body) - - returns: RequestBuilder - */ - open class func coreGroupsRemoveUserCreateWithRequestBuilder(groupUuid: UUID, userAccountRequest: UserAccountRequest) -> RequestBuilder { - var localVariablePath = "/core/groups/{group_uuid}/remove_user/" - let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" - let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" - localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) + - parameter brandUuid: (path) A UUID string identifying this Brand. + - returns: RequestBuilder + */ + open class func coreBrandsRetrieveWithRequestBuilder(brandUuid: UUID) -> RequestBuilder { + var localVariablePath = "/core/brands/{brand_uuid}/" + let brandUuidPreEscape = "\(APIHelper.mapValueToPathItem(brandUuid))" + let brandUuidPostEscape = brandUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{brand_uuid}", with: brandUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath - let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: userAccountRequest) + let localVariableParameters: [String: Any]? = nil let localVariableUrlComponents = URLComponents(string: localVariableURLString) @@ -1108,20 +1123,21 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getNonDecodableBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() - return localVariableRequestBuilder.init(method: "POST", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter groupUuid: (path) A UUID string identifying this Group. + - parameter brandUuid: (path) A UUID string identifying this Brand. + - parameter brandRequest: (body) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreGroupsRetrieve(groupUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Group?, _ error: Error?) -> Void)) -> RequestTask { - return coreGroupsRetrieveWithRequestBuilder(groupUuid: groupUuid).execute(apiResponseQueue) { result in + open class func coreBrandsUpdate(brandUuid: UUID, brandRequest: BrandRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Brand?, _ error: Error?) -> Void)) -> RequestTask { + return coreBrandsUpdateWithRequestBuilder(brandUuid: brandUuid, brandRequest: brandRequest).execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -1132,21 +1148,22 @@ open class CoreAPI { } /** - - GET /core/groups/{group_uuid}/ - - Group Viewset + - PUT /core/brands/{brand_uuid}/ + - Brand Viewset - API Key: - type: apiKey Authorization - name: authentik - - parameter groupUuid: (path) A UUID string identifying this Group. - - returns: RequestBuilder - */ - open class func coreGroupsRetrieveWithRequestBuilder(groupUuid: UUID) -> RequestBuilder { - var localVariablePath = "/core/groups/{group_uuid}/" - let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" - let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" - localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) + - parameter brandUuid: (path) A UUID string identifying this Brand. + - parameter brandRequest: (body) + - returns: RequestBuilder + */ + open class func coreBrandsUpdateWithRequestBuilder(brandUuid: UUID, brandRequest: BrandRequest) -> RequestBuilder { + var localVariablePath = "/core/brands/{brand_uuid}/" + let brandUuidPreEscape = "\(APIHelper.mapValueToPathItem(brandUuid))" + let brandUuidPostEscape = brandUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{brand_uuid}", with: brandUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath - let localVariableParameters: [String: Any]? = nil + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: brandRequest) let localVariableUrlComponents = URLComponents(string: localVariableURLString) @@ -1156,21 +1173,20 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() - return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + return localVariableRequestBuilder.init(method: "PUT", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter groupUuid: (path) A UUID string identifying this Group. - - parameter groupRequest: (body) + - parameter brandUuid: (path) A UUID string identifying this Brand. - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreGroupsUpdate(groupUuid: UUID, groupRequest: GroupRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Group?, _ error: Error?) -> Void)) -> RequestTask { - return coreGroupsUpdateWithRequestBuilder(groupUuid: groupUuid, groupRequest: groupRequest).execute(apiResponseQueue) { result in + open class func coreBrandsUsedByList(brandUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: [UsedBy]?, _ error: Error?) -> Void)) -> RequestTask { + return coreBrandsUsedByListWithRequestBuilder(brandUuid: brandUuid).execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -1181,22 +1197,21 @@ open class CoreAPI { } /** - - PUT /core/groups/{group_uuid}/ - - Group Viewset + - GET /core/brands/{brand_uuid}/used_by/ + - Get a list of all objects that use this object - API Key: - type: apiKey Authorization - name: authentik - - parameter groupUuid: (path) A UUID string identifying this Group. - - parameter groupRequest: (body) - - returns: RequestBuilder + - parameter brandUuid: (path) A UUID string identifying this Brand. + - returns: RequestBuilder<[UsedBy]> */ - open class func coreGroupsUpdateWithRequestBuilder(groupUuid: UUID, groupRequest: GroupRequest) -> RequestBuilder { - var localVariablePath = "/core/groups/{group_uuid}/" - let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" - let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" - localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) + open class func coreBrandsUsedByListWithRequestBuilder(brandUuid: UUID) -> RequestBuilder<[UsedBy]> { + var localVariablePath = "/core/brands/{brand_uuid}/used_by/" + let brandUuidPreEscape = "\(APIHelper.mapValueToPathItem(brandUuid))" + let brandUuidPostEscape = brandUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{brand_uuid}", with: brandUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath - let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: groupRequest) + let localVariableParameters: [String: Any]? = nil let localVariableUrlComponents = URLComponents(string: localVariableURLString) @@ -1206,23 +1221,24 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder<[UsedBy]>.Type = authentikClientAPI.requestBuilderFactory.getBuilder() - return localVariableRequestBuilder.init(method: "PUT", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - parameter groupUuid: (path) A UUID string identifying this Group. + - parameter userAccountRequest: (body) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreGroupsUsedByList(groupUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: [UsedBy]?, _ error: Error?) -> Void)) -> RequestTask { - return coreGroupsUsedByListWithRequestBuilder(groupUuid: groupUuid).execute(apiResponseQueue) { result in + open class func coreGroupsAddUserCreate(groupUuid: UUID, userAccountRequest: UserAccountRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Void?, _ error: Error?) -> Void)) -> RequestTask { + return coreGroupsAddUserCreateWithRequestBuilder(groupUuid: groupUuid, userAccountRequest: userAccountRequest).execute(apiResponseQueue) { result in switch result { - case let .success(response): - completion(response.body, nil) + case .success: + completion((), nil) case let .failure(error): completion(nil, error) } @@ -1230,21 +1246,22 @@ open class CoreAPI { } /** - - GET /core/groups/{group_uuid}/used_by/ - - Get a list of all objects that use this object + - POST /core/groups/{group_uuid}/add_user/ + - Add user to group - API Key: - type: apiKey Authorization - name: authentik - parameter groupUuid: (path) A UUID string identifying this Group. - - returns: RequestBuilder<[UsedBy]> + - parameter userAccountRequest: (body) + - returns: RequestBuilder */ - open class func coreGroupsUsedByListWithRequestBuilder(groupUuid: UUID) -> RequestBuilder<[UsedBy]> { - var localVariablePath = "/core/groups/{group_uuid}/used_by/" + open class func coreGroupsAddUserCreateWithRequestBuilder(groupUuid: UUID, userAccountRequest: UserAccountRequest) -> RequestBuilder { + var localVariablePath = "/core/groups/{group_uuid}/add_user/" let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath - let localVariableParameters: [String: Any]? = nil + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: userAccountRequest) let localVariableUrlComponents = URLComponents(string: localVariableURLString) @@ -1254,20 +1271,20 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder<[UsedBy]>.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getNonDecodableBuilder() - return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + return localVariableRequestBuilder.init(method: "POST", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter tenantRequest: (body) + - parameter groupRequest: (body) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreTenantsCreate(tenantRequest: TenantRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Tenant?, _ error: Error?) -> Void)) -> RequestTask { - return coreTenantsCreateWithRequestBuilder(tenantRequest: tenantRequest).execute(apiResponseQueue) { result in + open class func coreGroupsCreate(groupRequest: GroupRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Group?, _ error: Error?) -> Void)) -> RequestTask { + return coreGroupsCreateWithRequestBuilder(groupRequest: groupRequest).execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -1278,18 +1295,18 @@ open class CoreAPI { } /** - - POST /core/tenants/ - - Tenant Viewset + - POST /core/groups/ + - Group Viewset - API Key: - type: apiKey Authorization - name: authentik - - parameter tenantRequest: (body) - - returns: RequestBuilder + - parameter groupRequest: (body) + - returns: RequestBuilder */ - open class func coreTenantsCreateWithRequestBuilder(tenantRequest: TenantRequest) -> RequestBuilder { - let localVariablePath = "/core/tenants/" + open class func coreGroupsCreateWithRequestBuilder(groupRequest: GroupRequest) -> RequestBuilder { + let localVariablePath = "/core/groups/" let localVariableURLString = authentikClientAPI.basePath + localVariablePath - let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: tenantRequest) + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: groupRequest) let localVariableUrlComponents = URLComponents(string: localVariableURLString) @@ -1299,22 +1316,23 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() return localVariableRequestBuilder.init(method: "POST", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** + - parameter groupUuid: (path) A UUID string identifying this Group. - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreTenantsCurrentRetrieve(apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: CurrentTenant?, _ error: Error?) -> Void)) -> RequestTask { - return coreTenantsCurrentRetrieveWithRequestBuilder().execute(apiResponseQueue) { result in + open class func coreGroupsDestroy(groupUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Void?, _ error: Error?) -> Void)) -> RequestTask { + return coreGroupsDestroyWithRequestBuilder(groupUuid: groupUuid).execute(apiResponseQueue) { result in switch result { - case let .success(response): - completion(response.body, nil) + case .success: + completion((), nil) case let .failure(error): completion(nil, error) } @@ -1322,15 +1340,19 @@ open class CoreAPI { } /** - - GET /core/tenants/current/ - - Get current tenant + - DELETE /core/groups/{group_uuid}/ + - Group Viewset - API Key: - type: apiKey Authorization - name: authentik - - returns: RequestBuilder + - parameter groupUuid: (path) A UUID string identifying this Group. + - returns: RequestBuilder */ - open class func coreTenantsCurrentRetrieveWithRequestBuilder() -> RequestBuilder { - let localVariablePath = "/core/tenants/current/" + open class func coreGroupsDestroyWithRequestBuilder(groupUuid: UUID) -> RequestBuilder { + var localVariablePath = "/core/groups/{group_uuid}/" + let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" + let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath let localVariableParameters: [String: Any]? = nil @@ -1342,23 +1364,31 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getNonDecodableBuilder() - return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + return localVariableRequestBuilder.init(method: "DELETE", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter attributes: (query) Attributes (optional) + - parameter isSuperuser: (query) (optional) + - parameter membersByPk: (query) (optional) + - parameter membersByUsername: (query) Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only. (optional) + - parameter name: (query) (optional) + - parameter ordering: (query) Which field to use when ordering the results. (optional) + - parameter page: (query) A page number within the paginated result set. (optional) + - parameter pageSize: (query) Number of results to return per page. (optional) + - parameter search: (query) A search term. (optional) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreTenantsDestroy(tenantUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Void?, _ error: Error?) -> Void)) -> RequestTask { - return coreTenantsDestroyWithRequestBuilder(tenantUuid: tenantUuid).execute(apiResponseQueue) { result in + open class func coreGroupsList(attributes: String? = nil, isSuperuser: Bool? = nil, membersByPk: [Int]? = nil, membersByUsername: [String]? = nil, name: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: PaginatedGroupList?, _ error: Error?) -> Void)) -> RequestTask { + return coreGroupsListWithRequestBuilder(attributes: attributes, isSuperuser: isSuperuser, membersByPk: membersByPk, membersByUsername: membersByUsername, name: name, ordering: ordering, page: page, pageSize: pageSize, search: search).execute(apiResponseQueue) { result in switch result { - case .success: - completion((), nil) + case let .success(response): + completion(response.body, nil) case let .failure(error): completion(nil, error) } @@ -1366,23 +1396,39 @@ open class CoreAPI { } /** - - DELETE /core/tenants/{tenant_uuid}/ - - Tenant Viewset + - GET /core/groups/ + - Group Viewset - API Key: - type: apiKey Authorization - name: authentik - - parameter tenantUuid: (path) A UUID string identifying this Tenant. - - returns: RequestBuilder + - parameter attributes: (query) Attributes (optional) + - parameter isSuperuser: (query) (optional) + - parameter membersByPk: (query) (optional) + - parameter membersByUsername: (query) Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only. (optional) + - parameter name: (query) (optional) + - parameter ordering: (query) Which field to use when ordering the results. (optional) + - parameter page: (query) A page number within the paginated result set. (optional) + - parameter pageSize: (query) Number of results to return per page. (optional) + - parameter search: (query) A search term. (optional) + - returns: RequestBuilder */ - open class func coreTenantsDestroyWithRequestBuilder(tenantUuid: UUID) -> RequestBuilder { - var localVariablePath = "/core/tenants/{tenant_uuid}/" - let tenantUuidPreEscape = "\(APIHelper.mapValueToPathItem(tenantUuid))" - let tenantUuidPostEscape = tenantUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" - localVariablePath = localVariablePath.replacingOccurrences(of: "{tenant_uuid}", with: tenantUuidPostEscape, options: .literal, range: nil) + open class func coreGroupsListWithRequestBuilder(attributes: String? = nil, isSuperuser: Bool? = nil, membersByPk: [Int]? = nil, membersByUsername: [String]? = nil, name: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil) -> RequestBuilder { + let localVariablePath = "/core/groups/" let localVariableURLString = authentikClientAPI.basePath + localVariablePath let localVariableParameters: [String: Any]? = nil - let localVariableUrlComponents = URLComponents(string: localVariableURLString) + var localVariableUrlComponents = URLComponents(string: localVariableURLString) + localVariableUrlComponents?.queryItems = APIHelper.mapValuesToQueryItems([ + "attributes": (wrappedValue: attributes?.encodeToJSON(), isExplode: true), + "is_superuser": (wrappedValue: isSuperuser?.encodeToJSON(), isExplode: true), + "members_by_pk": (wrappedValue: membersByPk?.encodeToJSON(), isExplode: true), + "members_by_username": (wrappedValue: membersByUsername?.encodeToJSON(), isExplode: true), + "name": (wrappedValue: name?.encodeToJSON(), isExplode: true), + "ordering": (wrappedValue: ordering?.encodeToJSON(), isExplode: true), + "page": (wrappedValue: page?.encodeToJSON(), isExplode: true), + "page_size": (wrappedValue: pageSize?.encodeToJSON(), isExplode: true), + "search": (wrappedValue: search?.encodeToJSON(), isExplode: true), + ]) let localVariableNillableHeaders: [String: Any?] = [ : @@ -1390,37 +1436,21 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getNonDecodableBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() - return localVariableRequestBuilder.init(method: "DELETE", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter brandingFavicon: (query) (optional) - - parameter brandingLogo: (query) (optional) - - parameter brandingTitle: (query) (optional) - - parameter _default: (query) (optional) - - parameter domain: (query) (optional) - - parameter eventRetention: (query) (optional) - - parameter flowAuthentication: (query) (optional) - - parameter flowDeviceCode: (query) (optional) - - parameter flowInvalidation: (query) (optional) - - parameter flowRecovery: (query) (optional) - - parameter flowUnenrollment: (query) (optional) - - parameter flowUserSettings: (query) (optional) - - parameter ordering: (query) Which field to use when ordering the results. (optional) - - parameter page: (query) A page number within the paginated result set. (optional) - - parameter pageSize: (query) Number of results to return per page. (optional) - - parameter search: (query) A search term. (optional) - - parameter tenantUuid: (query) (optional) - - parameter webCertificate: (query) (optional) + - parameter groupUuid: (path) A UUID string identifying this Group. + - parameter patchedGroupRequest: (body) (optional) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreTenantsList(brandingFavicon: String? = nil, brandingLogo: String? = nil, brandingTitle: String? = nil, _default: Bool? = nil, domain: String? = nil, eventRetention: String? = nil, flowAuthentication: UUID? = nil, flowDeviceCode: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, tenantUuid: UUID? = nil, webCertificate: UUID? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: PaginatedTenantList?, _ error: Error?) -> Void)) -> RequestTask { - return coreTenantsListWithRequestBuilder(brandingFavicon: brandingFavicon, brandingLogo: brandingLogo, brandingTitle: brandingTitle, _default: _default, domain: domain, eventRetention: eventRetention, flowAuthentication: flowAuthentication, flowDeviceCode: flowDeviceCode, flowInvalidation: flowInvalidation, flowRecovery: flowRecovery, flowUnenrollment: flowUnenrollment, flowUserSettings: flowUserSettings, ordering: ordering, page: page, pageSize: pageSize, search: search, tenantUuid: tenantUuid, webCertificate: webCertificate).execute(apiResponseQueue) { result in + open class func coreGroupsPartialUpdate(groupUuid: UUID, patchedGroupRequest: PatchedGroupRequest? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Group?, _ error: Error?) -> Void)) -> RequestTask { + return coreGroupsPartialUpdateWithRequestBuilder(groupUuid: groupUuid, patchedGroupRequest: patchedGroupRequest).execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -1431,57 +1461,24 @@ open class CoreAPI { } /** - - GET /core/tenants/ - - Tenant Viewset + - PATCH /core/groups/{group_uuid}/ + - Group Viewset - API Key: - type: apiKey Authorization - name: authentik - - parameter brandingFavicon: (query) (optional) - - parameter brandingLogo: (query) (optional) - - parameter brandingTitle: (query) (optional) - - parameter _default: (query) (optional) - - parameter domain: (query) (optional) - - parameter eventRetention: (query) (optional) - - parameter flowAuthentication: (query) (optional) - - parameter flowDeviceCode: (query) (optional) - - parameter flowInvalidation: (query) (optional) - - parameter flowRecovery: (query) (optional) - - parameter flowUnenrollment: (query) (optional) - - parameter flowUserSettings: (query) (optional) - - parameter ordering: (query) Which field to use when ordering the results. (optional) - - parameter page: (query) A page number within the paginated result set. (optional) - - parameter pageSize: (query) Number of results to return per page. (optional) - - parameter search: (query) A search term. (optional) - - parameter tenantUuid: (query) (optional) - - parameter webCertificate: (query) (optional) - - returns: RequestBuilder + - parameter groupUuid: (path) A UUID string identifying this Group. + - parameter patchedGroupRequest: (body) (optional) + - returns: RequestBuilder */ - open class func coreTenantsListWithRequestBuilder(brandingFavicon: String? = nil, brandingLogo: String? = nil, brandingTitle: String? = nil, _default: Bool? = nil, domain: String? = nil, eventRetention: String? = nil, flowAuthentication: UUID? = nil, flowDeviceCode: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, tenantUuid: UUID? = nil, webCertificate: UUID? = nil) -> RequestBuilder { - let localVariablePath = "/core/tenants/" + open class func coreGroupsPartialUpdateWithRequestBuilder(groupUuid: UUID, patchedGroupRequest: PatchedGroupRequest? = nil) -> RequestBuilder { + var localVariablePath = "/core/groups/{group_uuid}/" + let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" + let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath - let localVariableParameters: [String: Any]? = nil + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: patchedGroupRequest) - var localVariableUrlComponents = URLComponents(string: localVariableURLString) - localVariableUrlComponents?.queryItems = APIHelper.mapValuesToQueryItems([ - "branding_favicon": (wrappedValue: brandingFavicon?.encodeToJSON(), isExplode: true), - "branding_logo": (wrappedValue: brandingLogo?.encodeToJSON(), isExplode: true), - "branding_title": (wrappedValue: brandingTitle?.encodeToJSON(), isExplode: true), - "default": (wrappedValue: _default?.encodeToJSON(), isExplode: true), - "domain": (wrappedValue: domain?.encodeToJSON(), isExplode: true), - "event_retention": (wrappedValue: eventRetention?.encodeToJSON(), isExplode: true), - "flow_authentication": (wrappedValue: flowAuthentication?.encodeToJSON(), isExplode: true), - "flow_device_code": (wrappedValue: flowDeviceCode?.encodeToJSON(), isExplode: true), - "flow_invalidation": (wrappedValue: flowInvalidation?.encodeToJSON(), isExplode: true), - "flow_recovery": (wrappedValue: flowRecovery?.encodeToJSON(), isExplode: true), - "flow_unenrollment": (wrappedValue: flowUnenrollment?.encodeToJSON(), isExplode: true), - "flow_user_settings": (wrappedValue: flowUserSettings?.encodeToJSON(), isExplode: true), - "ordering": (wrappedValue: ordering?.encodeToJSON(), isExplode: true), - "page": (wrappedValue: page?.encodeToJSON(), isExplode: true), - "page_size": (wrappedValue: pageSize?.encodeToJSON(), isExplode: true), - "search": (wrappedValue: search?.encodeToJSON(), isExplode: true), - "tenant_uuid": (wrappedValue: tenantUuid?.encodeToJSON(), isExplode: true), - "web_certificate": (wrappedValue: webCertificate?.encodeToJSON(), isExplode: true), - ]) + let localVariableUrlComponents = URLComponents(string: localVariableURLString) let localVariableNillableHeaders: [String: Any?] = [ : @@ -1489,24 +1486,24 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() - return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + return localVariableRequestBuilder.init(method: "PATCH", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter tenantUuid: (path) A UUID string identifying this Tenant. - - parameter patchedTenantRequest: (body) (optional) + - parameter groupUuid: (path) A UUID string identifying this Group. + - parameter userAccountRequest: (body) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreTenantsPartialUpdate(tenantUuid: UUID, patchedTenantRequest: PatchedTenantRequest? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Tenant?, _ error: Error?) -> Void)) -> RequestTask { - return coreTenantsPartialUpdateWithRequestBuilder(tenantUuid: tenantUuid, patchedTenantRequest: patchedTenantRequest).execute(apiResponseQueue) { result in + open class func coreGroupsRemoveUserCreate(groupUuid: UUID, userAccountRequest: UserAccountRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Void?, _ error: Error?) -> Void)) -> RequestTask { + return coreGroupsRemoveUserCreateWithRequestBuilder(groupUuid: groupUuid, userAccountRequest: userAccountRequest).execute(apiResponseQueue) { result in switch result { - case let .success(response): - completion(response.body, nil) + case .success: + completion((), nil) case let .failure(error): completion(nil, error) } @@ -1514,22 +1511,22 @@ open class CoreAPI { } /** - - PATCH /core/tenants/{tenant_uuid}/ - - Tenant Viewset + - POST /core/groups/{group_uuid}/remove_user/ + - Add user to group - API Key: - type: apiKey Authorization - name: authentik - - parameter tenantUuid: (path) A UUID string identifying this Tenant. - - parameter patchedTenantRequest: (body) (optional) - - returns: RequestBuilder - */ - open class func coreTenantsPartialUpdateWithRequestBuilder(tenantUuid: UUID, patchedTenantRequest: PatchedTenantRequest? = nil) -> RequestBuilder { - var localVariablePath = "/core/tenants/{tenant_uuid}/" - let tenantUuidPreEscape = "\(APIHelper.mapValueToPathItem(tenantUuid))" - let tenantUuidPostEscape = tenantUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" - localVariablePath = localVariablePath.replacingOccurrences(of: "{tenant_uuid}", with: tenantUuidPostEscape, options: .literal, range: nil) + - parameter groupUuid: (path) A UUID string identifying this Group. + - parameter userAccountRequest: (body) + - returns: RequestBuilder + */ + open class func coreGroupsRemoveUserCreateWithRequestBuilder(groupUuid: UUID, userAccountRequest: UserAccountRequest) -> RequestBuilder { + var localVariablePath = "/core/groups/{group_uuid}/remove_user/" + let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" + let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath - let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: patchedTenantRequest) + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: userAccountRequest) let localVariableUrlComponents = URLComponents(string: localVariableURLString) @@ -1539,20 +1536,20 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getNonDecodableBuilder() - return localVariableRequestBuilder.init(method: "PATCH", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) + return localVariableRequestBuilder.init(method: "POST", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter groupUuid: (path) A UUID string identifying this Group. - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreTenantsRetrieve(tenantUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Tenant?, _ error: Error?) -> Void)) -> RequestTask { - return coreTenantsRetrieveWithRequestBuilder(tenantUuid: tenantUuid).execute(apiResponseQueue) { result in + open class func coreGroupsRetrieve(groupUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Group?, _ error: Error?) -> Void)) -> RequestTask { + return coreGroupsRetrieveWithRequestBuilder(groupUuid: groupUuid).execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -1563,19 +1560,19 @@ open class CoreAPI { } /** - - GET /core/tenants/{tenant_uuid}/ - - Tenant Viewset + - GET /core/groups/{group_uuid}/ + - Group Viewset - API Key: - type: apiKey Authorization - name: authentik - - parameter tenantUuid: (path) A UUID string identifying this Tenant. - - returns: RequestBuilder - */ - open class func coreTenantsRetrieveWithRequestBuilder(tenantUuid: UUID) -> RequestBuilder { - var localVariablePath = "/core/tenants/{tenant_uuid}/" - let tenantUuidPreEscape = "\(APIHelper.mapValueToPathItem(tenantUuid))" - let tenantUuidPostEscape = tenantUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" - localVariablePath = localVariablePath.replacingOccurrences(of: "{tenant_uuid}", with: tenantUuidPostEscape, options: .literal, range: nil) + - parameter groupUuid: (path) A UUID string identifying this Group. + - returns: RequestBuilder + */ + open class func coreGroupsRetrieveWithRequestBuilder(groupUuid: UUID) -> RequestBuilder { + var localVariablePath = "/core/groups/{group_uuid}/" + let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" + let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath let localVariableParameters: [String: Any]? = nil @@ -1587,21 +1584,21 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter tenantUuid: (path) A UUID string identifying this Tenant. - - parameter tenantRequest: (body) + - parameter groupUuid: (path) A UUID string identifying this Group. + - parameter groupRequest: (body) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreTenantsUpdate(tenantUuid: UUID, tenantRequest: TenantRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Tenant?, _ error: Error?) -> Void)) -> RequestTask { - return coreTenantsUpdateWithRequestBuilder(tenantUuid: tenantUuid, tenantRequest: tenantRequest).execute(apiResponseQueue) { result in + open class func coreGroupsUpdate(groupUuid: UUID, groupRequest: GroupRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Group?, _ error: Error?) -> Void)) -> RequestTask { + return coreGroupsUpdateWithRequestBuilder(groupUuid: groupUuid, groupRequest: groupRequest).execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -1612,22 +1609,22 @@ open class CoreAPI { } /** - - PUT /core/tenants/{tenant_uuid}/ - - Tenant Viewset + - PUT /core/groups/{group_uuid}/ + - Group Viewset - API Key: - type: apiKey Authorization - name: authentik - - parameter tenantUuid: (path) A UUID string identifying this Tenant. - - parameter tenantRequest: (body) - - returns: RequestBuilder - */ - open class func coreTenantsUpdateWithRequestBuilder(tenantUuid: UUID, tenantRequest: TenantRequest) -> RequestBuilder { - var localVariablePath = "/core/tenants/{tenant_uuid}/" - let tenantUuidPreEscape = "\(APIHelper.mapValueToPathItem(tenantUuid))" - let tenantUuidPostEscape = tenantUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" - localVariablePath = localVariablePath.replacingOccurrences(of: "{tenant_uuid}", with: tenantUuidPostEscape, options: .literal, range: nil) + - parameter groupUuid: (path) A UUID string identifying this Group. + - parameter groupRequest: (body) + - returns: RequestBuilder + */ + open class func coreGroupsUpdateWithRequestBuilder(groupUuid: UUID, groupRequest: GroupRequest) -> RequestBuilder { + var localVariablePath = "/core/groups/{group_uuid}/" + let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" + let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath - let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: tenantRequest) + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: groupRequest) let localVariableUrlComponents = URLComponents(string: localVariableURLString) @@ -1637,20 +1634,20 @@ open class CoreAPI { let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) - let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() return localVariableRequestBuilder.init(method: "PUT", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: true) } /** - - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter groupUuid: (path) A UUID string identifying this Group. - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func coreTenantsUsedByList(tenantUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: [UsedBy]?, _ error: Error?) -> Void)) -> RequestTask { - return coreTenantsUsedByListWithRequestBuilder(tenantUuid: tenantUuid).execute(apiResponseQueue) { result in + open class func coreGroupsUsedByList(groupUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: [UsedBy]?, _ error: Error?) -> Void)) -> RequestTask { + return coreGroupsUsedByListWithRequestBuilder(groupUuid: groupUuid).execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -1661,19 +1658,19 @@ open class CoreAPI { } /** - - GET /core/tenants/{tenant_uuid}/used_by/ + - GET /core/groups/{group_uuid}/used_by/ - Get a list of all objects that use this object - API Key: - type: apiKey Authorization - name: authentik - - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter groupUuid: (path) A UUID string identifying this Group. - returns: RequestBuilder<[UsedBy]> */ - open class func coreTenantsUsedByListWithRequestBuilder(tenantUuid: UUID) -> RequestBuilder<[UsedBy]> { - var localVariablePath = "/core/tenants/{tenant_uuid}/used_by/" - let tenantUuidPreEscape = "\(APIHelper.mapValueToPathItem(tenantUuid))" - let tenantUuidPostEscape = tenantUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" - localVariablePath = localVariablePath.replacingOccurrences(of: "{tenant_uuid}", with: tenantUuidPostEscape, options: .literal, range: nil) + open class func coreGroupsUsedByListWithRequestBuilder(groupUuid: UUID) -> RequestBuilder<[UsedBy]> { + var localVariablePath = "/core/groups/{group_uuid}/used_by/" + let groupUuidPreEscape = "\(APIHelper.mapValueToPathItem(groupUuid))" + let groupUuidPostEscape = groupUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{group_uuid}", with: groupUuidPostEscape, options: .literal, range: nil) let localVariableURLString = authentikClientAPI.basePath + localVariablePath let localVariableParameters: [String: Any]? = nil diff --git a/authentikClient/Classes/OpenAPIs/APIs/EventsAPI.swift b/authentikClient/Classes/OpenAPIs/APIs/EventsAPI.swift index 808cde9..30b661a 100644 --- a/authentikClient/Classes/OpenAPIs/APIs/EventsAPI.swift +++ b/authentikClient/Classes/OpenAPIs/APIs/EventsAPI.swift @@ -151,6 +151,7 @@ open class EventsAPI { /** - parameter action: (query) (optional) + - parameter brandName: (query) Brand name (optional) - parameter clientIp: (query) (optional) - parameter contextAuthorizedApp: (query) Context Authorized application (optional) - parameter contextModelApp: (query) Context Model App (optional) @@ -160,14 +161,13 @@ open class EventsAPI { - parameter page: (query) A page number within the paginated result set. (optional) - parameter pageSize: (query) Number of results to return per page. (optional) - parameter search: (query) A search term. (optional) - - parameter tenantName: (query) Tenant name (optional) - parameter username: (query) Username (optional) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func eventsEventsList(action: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, tenantName: String? = nil, username: String? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: PaginatedEventList?, _ error: Error?) -> Void)) -> RequestTask { - return eventsEventsListWithRequestBuilder(action: action, clientIp: clientIp, contextAuthorizedApp: contextAuthorizedApp, contextModelApp: contextModelApp, contextModelName: contextModelName, contextModelPk: contextModelPk, ordering: ordering, page: page, pageSize: pageSize, search: search, tenantName: tenantName, username: username).execute(apiResponseQueue) { result in + open class func eventsEventsList(action: String? = nil, brandName: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, username: String? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: PaginatedEventList?, _ error: Error?) -> Void)) -> RequestTask { + return eventsEventsListWithRequestBuilder(action: action, brandName: brandName, clientIp: clientIp, contextAuthorizedApp: contextAuthorizedApp, contextModelApp: contextModelApp, contextModelName: contextModelName, contextModelPk: contextModelPk, ordering: ordering, page: page, pageSize: pageSize, search: search, username: username).execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -184,6 +184,7 @@ open class EventsAPI { - type: apiKey Authorization - name: authentik - parameter action: (query) (optional) + - parameter brandName: (query) Brand name (optional) - parameter clientIp: (query) (optional) - parameter contextAuthorizedApp: (query) Context Authorized application (optional) - parameter contextModelApp: (query) Context Model App (optional) @@ -193,11 +194,10 @@ open class EventsAPI { - parameter page: (query) A page number within the paginated result set. (optional) - parameter pageSize: (query) Number of results to return per page. (optional) - parameter search: (query) A search term. (optional) - - parameter tenantName: (query) Tenant name (optional) - parameter username: (query) Username (optional) - returns: RequestBuilder */ - open class func eventsEventsListWithRequestBuilder(action: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, tenantName: String? = nil, username: String? = nil) -> RequestBuilder { + open class func eventsEventsListWithRequestBuilder(action: String? = nil, brandName: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, username: String? = nil) -> RequestBuilder { let localVariablePath = "/events/events/" let localVariableURLString = authentikClientAPI.basePath + localVariablePath let localVariableParameters: [String: Any]? = nil @@ -205,6 +205,7 @@ open class EventsAPI { var localVariableUrlComponents = URLComponents(string: localVariableURLString) localVariableUrlComponents?.queryItems = APIHelper.mapValuesToQueryItems([ "action": (wrappedValue: action?.encodeToJSON(), isExplode: true), + "brand_name": (wrappedValue: brandName?.encodeToJSON(), isExplode: true), "client_ip": (wrappedValue: clientIp?.encodeToJSON(), isExplode: true), "context_authorized_app": (wrappedValue: contextAuthorizedApp?.encodeToJSON(), isExplode: true), "context_model_app": (wrappedValue: contextModelApp?.encodeToJSON(), isExplode: true), @@ -214,7 +215,6 @@ open class EventsAPI { "page": (wrappedValue: page?.encodeToJSON(), isExplode: true), "page_size": (wrappedValue: pageSize?.encodeToJSON(), isExplode: true), "search": (wrappedValue: search?.encodeToJSON(), isExplode: true), - "tenant_name": (wrappedValue: tenantName?.encodeToJSON(), isExplode: true), "username": (wrappedValue: username?.encodeToJSON(), isExplode: true), ]) @@ -482,6 +482,7 @@ open class EventsAPI { /** - parameter action: (query) (optional) + - parameter brandName: (query) Brand name (optional) - parameter clientIp: (query) (optional) - parameter contextAuthorizedApp: (query) Context Authorized application (optional) - parameter contextModelApp: (query) Context Model App (optional) @@ -489,14 +490,13 @@ open class EventsAPI { - parameter contextModelPk: (query) Context Model Primary Key (optional) - parameter ordering: (query) Which field to use when ordering the results. (optional) - parameter search: (query) A search term. (optional) - - parameter tenantName: (query) Tenant name (optional) - parameter username: (query) Username (optional) - parameter apiResponseQueue: The queue on which api response is dispatched. - parameter completion: completion handler to receive the data and the error objects */ @discardableResult - open class func eventsEventsVolumeList(action: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, search: String? = nil, tenantName: String? = nil, username: String? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: [Coordinate]?, _ error: Error?) -> Void)) -> RequestTask { - return eventsEventsVolumeListWithRequestBuilder(action: action, clientIp: clientIp, contextAuthorizedApp: contextAuthorizedApp, contextModelApp: contextModelApp, contextModelName: contextModelName, contextModelPk: contextModelPk, ordering: ordering, search: search, tenantName: tenantName, username: username).execute(apiResponseQueue) { result in + open class func eventsEventsVolumeList(action: String? = nil, brandName: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, search: String? = nil, username: String? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: [Coordinate]?, _ error: Error?) -> Void)) -> RequestTask { + return eventsEventsVolumeListWithRequestBuilder(action: action, brandName: brandName, clientIp: clientIp, contextAuthorizedApp: contextAuthorizedApp, contextModelApp: contextModelApp, contextModelName: contextModelName, contextModelPk: contextModelPk, ordering: ordering, search: search, username: username).execute(apiResponseQueue) { result in switch result { case let .success(response): completion(response.body, nil) @@ -513,6 +513,7 @@ open class EventsAPI { - type: apiKey Authorization - name: authentik - parameter action: (query) (optional) + - parameter brandName: (query) Brand name (optional) - parameter clientIp: (query) (optional) - parameter contextAuthorizedApp: (query) Context Authorized application (optional) - parameter contextModelApp: (query) Context Model App (optional) @@ -520,11 +521,10 @@ open class EventsAPI { - parameter contextModelPk: (query) Context Model Primary Key (optional) - parameter ordering: (query) Which field to use when ordering the results. (optional) - parameter search: (query) A search term. (optional) - - parameter tenantName: (query) Tenant name (optional) - parameter username: (query) Username (optional) - returns: RequestBuilder<[Coordinate]> */ - open class func eventsEventsVolumeListWithRequestBuilder(action: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, search: String? = nil, tenantName: String? = nil, username: String? = nil) -> RequestBuilder<[Coordinate]> { + open class func eventsEventsVolumeListWithRequestBuilder(action: String? = nil, brandName: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, search: String? = nil, username: String? = nil) -> RequestBuilder<[Coordinate]> { let localVariablePath = "/events/events/volume/" let localVariableURLString = authentikClientAPI.basePath + localVariablePath let localVariableParameters: [String: Any]? = nil @@ -532,6 +532,7 @@ open class EventsAPI { var localVariableUrlComponents = URLComponents(string: localVariableURLString) localVariableUrlComponents?.queryItems = APIHelper.mapValuesToQueryItems([ "action": (wrappedValue: action?.encodeToJSON(), isExplode: true), + "brand_name": (wrappedValue: brandName?.encodeToJSON(), isExplode: true), "client_ip": (wrappedValue: clientIp?.encodeToJSON(), isExplode: true), "context_authorized_app": (wrappedValue: contextAuthorizedApp?.encodeToJSON(), isExplode: true), "context_model_app": (wrappedValue: contextModelApp?.encodeToJSON(), isExplode: true), @@ -539,7 +540,6 @@ open class EventsAPI { "context_model_pk": (wrappedValue: contextModelPk?.encodeToJSON(), isExplode: true), "ordering": (wrappedValue: ordering?.encodeToJSON(), isExplode: true), "search": (wrappedValue: search?.encodeToJSON(), isExplode: true), - "tenant_name": (wrappedValue: tenantName?.encodeToJSON(), isExplode: true), "username": (wrappedValue: username?.encodeToJSON(), isExplode: true), ]) diff --git a/authentikClient/Classes/OpenAPIs/APIs/RbacAPI.swift b/authentikClient/Classes/OpenAPIs/APIs/RbacAPI.swift index bffeff2..878fc43 100644 --- a/authentikClient/Classes/OpenAPIs/APIs/RbacAPI.swift +++ b/authentikClient/Classes/OpenAPIs/APIs/RbacAPI.swift @@ -67,6 +67,7 @@ open class RbacAPI { */ public enum Model_rbacPermissionsAssignedByRolesList: String, CaseIterable { case blueprintsPeriodBlueprintinstance = "authentik_blueprints.blueprintinstance" + case brandsPeriodBrand = "authentik_brands.brand" case corePeriodApplication = "authentik_core.application" case corePeriodGroup = "authentik_core.group" case corePeriodToken = "authentik_core.token" @@ -142,12 +143,12 @@ open class RbacAPI { case stagesUserLoginPeriodUserloginstage = "authentik_stages_user_login.userloginstage" case stagesUserLogoutPeriodUserlogoutstage = "authentik_stages_user_logout.userlogoutstage" case stagesUserWritePeriodUserwritestage = "authentik_stages_user_write.userwritestage" - case tenantsPeriodTenant = "authentik_tenants.tenant" + case tenantsPeriodDomain = "authentik_tenants.domain" } /** - - parameter model: (query) * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping + - parameter model: (query) * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping - parameter objectPk: (query) (optional) - parameter ordering: (query) Which field to use when ordering the results. (optional) - parameter page: (query) A page number within the paginated result set. (optional) @@ -174,7 +175,7 @@ open class RbacAPI { - API Key: - type: apiKey Authorization - name: authentik - - parameter model: (query) * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping + - parameter model: (query) * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping - parameter objectPk: (query) (optional) - parameter ordering: (query) Which field to use when ordering the results. (optional) - parameter page: (query) A page number within the paginated result set. (optional) @@ -313,6 +314,7 @@ open class RbacAPI { */ public enum Model_rbacPermissionsAssignedByUsersList: String, CaseIterable { case blueprintsPeriodBlueprintinstance = "authentik_blueprints.blueprintinstance" + case brandsPeriodBrand = "authentik_brands.brand" case corePeriodApplication = "authentik_core.application" case corePeriodGroup = "authentik_core.group" case corePeriodToken = "authentik_core.token" @@ -388,12 +390,12 @@ open class RbacAPI { case stagesUserLoginPeriodUserloginstage = "authentik_stages_user_login.userloginstage" case stagesUserLogoutPeriodUserlogoutstage = "authentik_stages_user_logout.userlogoutstage" case stagesUserWritePeriodUserwritestage = "authentik_stages_user_write.userwritestage" - case tenantsPeriodTenant = "authentik_tenants.tenant" + case tenantsPeriodDomain = "authentik_tenants.domain" } /** - - parameter model: (query) * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping + - parameter model: (query) * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping - parameter objectPk: (query) (optional) - parameter ordering: (query) Which field to use when ordering the results. (optional) - parameter page: (query) A page number within the paginated result set. (optional) @@ -420,7 +422,7 @@ open class RbacAPI { - API Key: - type: apiKey Authorization - name: authentik - - parameter model: (query) * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping + - parameter model: (query) * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping - parameter objectPk: (query) (optional) - parameter ordering: (query) Which field to use when ordering the results. (optional) - parameter page: (query) A page number within the paginated result set. (optional) diff --git a/authentikClient/Classes/OpenAPIs/APIs/TenantsAPI.swift b/authentikClient/Classes/OpenAPIs/APIs/TenantsAPI.swift new file mode 100644 index 0000000..dcd1284 --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/APIs/TenantsAPI.swift @@ -0,0 +1,668 @@ +// +// TenantsAPI.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +open class TenantsAPI { + + /** + + - parameter domainRequest: (body) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsDomainsCreate(domainRequest: DomainRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Domain?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsDomainsCreateWithRequestBuilder(domainRequest: domainRequest).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - POST /tenants/domains/ + - Domain ViewSet + - parameter domainRequest: (body) + - returns: RequestBuilder + */ + open class func tenantsDomainsCreateWithRequestBuilder(domainRequest: DomainRequest) -> RequestBuilder { + let localVariablePath = "/tenants/domains/" + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: domainRequest) + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "POST", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter id: (path) A unique integer value identifying this Domain. + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsDomainsDestroy(id: Int, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Void?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsDomainsDestroyWithRequestBuilder(id: id).execute(apiResponseQueue) { result in + switch result { + case .success: + completion((), nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - DELETE /tenants/domains/{id}/ + - Domain ViewSet + - parameter id: (path) A unique integer value identifying this Domain. + - returns: RequestBuilder + */ + open class func tenantsDomainsDestroyWithRequestBuilder(id: Int) -> RequestBuilder { + var localVariablePath = "/tenants/domains/{id}/" + let idPreEscape = "\(APIHelper.mapValueToPathItem(id))" + let idPostEscape = idPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{id}", with: idPostEscape, options: .literal, range: nil) + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters: [String: Any]? = nil + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getNonDecodableBuilder() + + return localVariableRequestBuilder.init(method: "DELETE", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter ordering: (query) Which field to use when ordering the results. (optional) + - parameter page: (query) A page number within the paginated result set. (optional) + - parameter pageSize: (query) Number of results to return per page. (optional) + - parameter search: (query) A search term. (optional) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsDomainsList(ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: PaginatedDomainList?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsDomainsListWithRequestBuilder(ordering: ordering, page: page, pageSize: pageSize, search: search).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - GET /tenants/domains/ + - Domain ViewSet + - parameter ordering: (query) Which field to use when ordering the results. (optional) + - parameter page: (query) A page number within the paginated result set. (optional) + - parameter pageSize: (query) Number of results to return per page. (optional) + - parameter search: (query) A search term. (optional) + - returns: RequestBuilder + */ + open class func tenantsDomainsListWithRequestBuilder(ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil) -> RequestBuilder { + let localVariablePath = "/tenants/domains/" + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters: [String: Any]? = nil + + var localVariableUrlComponents = URLComponents(string: localVariableURLString) + localVariableUrlComponents?.queryItems = APIHelper.mapValuesToQueryItems([ + "ordering": (wrappedValue: ordering?.encodeToJSON(), isExplode: true), + "page": (wrappedValue: page?.encodeToJSON(), isExplode: true), + "page_size": (wrappedValue: pageSize?.encodeToJSON(), isExplode: true), + "search": (wrappedValue: search?.encodeToJSON(), isExplode: true), + ]) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter id: (path) A unique integer value identifying this Domain. + - parameter patchedDomainRequest: (body) (optional) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsDomainsPartialUpdate(id: Int, patchedDomainRequest: PatchedDomainRequest? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Domain?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsDomainsPartialUpdateWithRequestBuilder(id: id, patchedDomainRequest: patchedDomainRequest).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - PATCH /tenants/domains/{id}/ + - Domain ViewSet + - parameter id: (path) A unique integer value identifying this Domain. + - parameter patchedDomainRequest: (body) (optional) + - returns: RequestBuilder + */ + open class func tenantsDomainsPartialUpdateWithRequestBuilder(id: Int, patchedDomainRequest: PatchedDomainRequest? = nil) -> RequestBuilder { + var localVariablePath = "/tenants/domains/{id}/" + let idPreEscape = "\(APIHelper.mapValueToPathItem(id))" + let idPostEscape = idPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{id}", with: idPostEscape, options: .literal, range: nil) + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: patchedDomainRequest) + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "PATCH", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter id: (path) A unique integer value identifying this Domain. + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsDomainsRetrieve(id: Int, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Domain?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsDomainsRetrieveWithRequestBuilder(id: id).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - GET /tenants/domains/{id}/ + - Domain ViewSet + - parameter id: (path) A unique integer value identifying this Domain. + - returns: RequestBuilder + */ + open class func tenantsDomainsRetrieveWithRequestBuilder(id: Int) -> RequestBuilder { + var localVariablePath = "/tenants/domains/{id}/" + let idPreEscape = "\(APIHelper.mapValueToPathItem(id))" + let idPostEscape = idPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{id}", with: idPostEscape, options: .literal, range: nil) + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters: [String: Any]? = nil + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter id: (path) A unique integer value identifying this Domain. + - parameter domainRequest: (body) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsDomainsUpdate(id: Int, domainRequest: DomainRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Domain?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsDomainsUpdateWithRequestBuilder(id: id, domainRequest: domainRequest).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - PUT /tenants/domains/{id}/ + - Domain ViewSet + - parameter id: (path) A unique integer value identifying this Domain. + - parameter domainRequest: (body) + - returns: RequestBuilder + */ + open class func tenantsDomainsUpdateWithRequestBuilder(id: Int, domainRequest: DomainRequest) -> RequestBuilder { + var localVariablePath = "/tenants/domains/{id}/" + let idPreEscape = "\(APIHelper.mapValueToPathItem(id))" + let idPostEscape = idPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{id}", with: idPostEscape, options: .literal, range: nil) + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: domainRequest) + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "PUT", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter tenantRequest: (body) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsTenantsCreate(tenantRequest: TenantRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Tenant?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsTenantsCreateWithRequestBuilder(tenantRequest: tenantRequest).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - POST /tenants/tenants/ + - Tenant Viewset + - parameter tenantRequest: (body) + - returns: RequestBuilder + */ + open class func tenantsTenantsCreateWithRequestBuilder(tenantRequest: TenantRequest) -> RequestBuilder { + let localVariablePath = "/tenants/tenants/" + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: tenantRequest) + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "POST", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter tenantAdminGroupRequestRequest: (body) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsTenantsCreateAdminGroupCreate(tenantUuid: UUID, tenantAdminGroupRequestRequest: TenantAdminGroupRequestRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Void?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsTenantsCreateAdminGroupCreateWithRequestBuilder(tenantUuid: tenantUuid, tenantAdminGroupRequestRequest: tenantAdminGroupRequestRequest).execute(apiResponseQueue) { result in + switch result { + case .success: + completion((), nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - POST /tenants/tenants/{tenant_uuid}/create_admin_group/ + - Create admin group and add user to it. + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter tenantAdminGroupRequestRequest: (body) + - returns: RequestBuilder + */ + open class func tenantsTenantsCreateAdminGroupCreateWithRequestBuilder(tenantUuid: UUID, tenantAdminGroupRequestRequest: TenantAdminGroupRequestRequest) -> RequestBuilder { + var localVariablePath = "/tenants/tenants/{tenant_uuid}/create_admin_group/" + let tenantUuidPreEscape = "\(APIHelper.mapValueToPathItem(tenantUuid))" + let tenantUuidPostEscape = tenantUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{tenant_uuid}", with: tenantUuidPostEscape, options: .literal, range: nil) + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: tenantAdminGroupRequestRequest) + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getNonDecodableBuilder() + + return localVariableRequestBuilder.init(method: "POST", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter tenantRecoveryKeyRequestRequest: (body) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsTenantsCreateRecoveryKeyCreate(tenantUuid: UUID, tenantRecoveryKeyRequestRequest: TenantRecoveryKeyRequestRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: TenantRecoveryKeyResponse?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsTenantsCreateRecoveryKeyCreateWithRequestBuilder(tenantUuid: tenantUuid, tenantRecoveryKeyRequestRequest: tenantRecoveryKeyRequestRequest).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - POST /tenants/tenants/{tenant_uuid}/create_recovery_key/ + - Create recovery key for user. + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter tenantRecoveryKeyRequestRequest: (body) + - returns: RequestBuilder + */ + open class func tenantsTenantsCreateRecoveryKeyCreateWithRequestBuilder(tenantUuid: UUID, tenantRecoveryKeyRequestRequest: TenantRecoveryKeyRequestRequest) -> RequestBuilder { + var localVariablePath = "/tenants/tenants/{tenant_uuid}/create_recovery_key/" + let tenantUuidPreEscape = "\(APIHelper.mapValueToPathItem(tenantUuid))" + let tenantUuidPostEscape = tenantUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{tenant_uuid}", with: tenantUuidPostEscape, options: .literal, range: nil) + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: tenantRecoveryKeyRequestRequest) + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "POST", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsTenantsDestroy(tenantUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Void?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsTenantsDestroyWithRequestBuilder(tenantUuid: tenantUuid).execute(apiResponseQueue) { result in + switch result { + case .success: + completion((), nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - DELETE /tenants/tenants/{tenant_uuid}/ + - Tenant Viewset + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - returns: RequestBuilder + */ + open class func tenantsTenantsDestroyWithRequestBuilder(tenantUuid: UUID) -> RequestBuilder { + var localVariablePath = "/tenants/tenants/{tenant_uuid}/" + let tenantUuidPreEscape = "\(APIHelper.mapValueToPathItem(tenantUuid))" + let tenantUuidPostEscape = tenantUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{tenant_uuid}", with: tenantUuidPostEscape, options: .literal, range: nil) + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters: [String: Any]? = nil + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getNonDecodableBuilder() + + return localVariableRequestBuilder.init(method: "DELETE", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter ordering: (query) Which field to use when ordering the results. (optional) + - parameter page: (query) A page number within the paginated result set. (optional) + - parameter pageSize: (query) Number of results to return per page. (optional) + - parameter search: (query) A search term. (optional) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsTenantsList(ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: PaginatedTenantList?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsTenantsListWithRequestBuilder(ordering: ordering, page: page, pageSize: pageSize, search: search).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - GET /tenants/tenants/ + - Tenant Viewset + - parameter ordering: (query) Which field to use when ordering the results. (optional) + - parameter page: (query) A page number within the paginated result set. (optional) + - parameter pageSize: (query) Number of results to return per page. (optional) + - parameter search: (query) A search term. (optional) + - returns: RequestBuilder + */ + open class func tenantsTenantsListWithRequestBuilder(ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil) -> RequestBuilder { + let localVariablePath = "/tenants/tenants/" + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters: [String: Any]? = nil + + var localVariableUrlComponents = URLComponents(string: localVariableURLString) + localVariableUrlComponents?.queryItems = APIHelper.mapValuesToQueryItems([ + "ordering": (wrappedValue: ordering?.encodeToJSON(), isExplode: true), + "page": (wrappedValue: page?.encodeToJSON(), isExplode: true), + "page_size": (wrappedValue: pageSize?.encodeToJSON(), isExplode: true), + "search": (wrappedValue: search?.encodeToJSON(), isExplode: true), + ]) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter patchedTenantRequest: (body) (optional) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsTenantsPartialUpdate(tenantUuid: UUID, patchedTenantRequest: PatchedTenantRequest? = nil, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Tenant?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsTenantsPartialUpdateWithRequestBuilder(tenantUuid: tenantUuid, patchedTenantRequest: patchedTenantRequest).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - PATCH /tenants/tenants/{tenant_uuid}/ + - Tenant Viewset + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter patchedTenantRequest: (body) (optional) + - returns: RequestBuilder + */ + open class func tenantsTenantsPartialUpdateWithRequestBuilder(tenantUuid: UUID, patchedTenantRequest: PatchedTenantRequest? = nil) -> RequestBuilder { + var localVariablePath = "/tenants/tenants/{tenant_uuid}/" + let tenantUuidPreEscape = "\(APIHelper.mapValueToPathItem(tenantUuid))" + let tenantUuidPostEscape = tenantUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{tenant_uuid}", with: tenantUuidPostEscape, options: .literal, range: nil) + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: patchedTenantRequest) + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "PATCH", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsTenantsRetrieve(tenantUuid: UUID, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Tenant?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsTenantsRetrieveWithRequestBuilder(tenantUuid: tenantUuid).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - GET /tenants/tenants/{tenant_uuid}/ + - Tenant Viewset + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - returns: RequestBuilder + */ + open class func tenantsTenantsRetrieveWithRequestBuilder(tenantUuid: UUID) -> RequestBuilder { + var localVariablePath = "/tenants/tenants/{tenant_uuid}/" + let tenantUuidPreEscape = "\(APIHelper.mapValueToPathItem(tenantUuid))" + let tenantUuidPostEscape = tenantUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{tenant_uuid}", with: tenantUuidPostEscape, options: .literal, range: nil) + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters: [String: Any]? = nil + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "GET", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } + + /** + + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter tenantRequest: (body) + - parameter apiResponseQueue: The queue on which api response is dispatched. + - parameter completion: completion handler to receive the data and the error objects + */ + @discardableResult + open class func tenantsTenantsUpdate(tenantUuid: UUID, tenantRequest: TenantRequest, apiResponseQueue: DispatchQueue = authentikClientAPI.apiResponseQueue, completion: @escaping ((_ data: Tenant?, _ error: Error?) -> Void)) -> RequestTask { + return tenantsTenantsUpdateWithRequestBuilder(tenantUuid: tenantUuid, tenantRequest: tenantRequest).execute(apiResponseQueue) { result in + switch result { + case let .success(response): + completion(response.body, nil) + case let .failure(error): + completion(nil, error) + } + } + } + + /** + - PUT /tenants/tenants/{tenant_uuid}/ + - Tenant Viewset + - parameter tenantUuid: (path) A UUID string identifying this Tenant. + - parameter tenantRequest: (body) + - returns: RequestBuilder + */ + open class func tenantsTenantsUpdateWithRequestBuilder(tenantUuid: UUID, tenantRequest: TenantRequest) -> RequestBuilder { + var localVariablePath = "/tenants/tenants/{tenant_uuid}/" + let tenantUuidPreEscape = "\(APIHelper.mapValueToPathItem(tenantUuid))" + let tenantUuidPostEscape = tenantUuidPreEscape.addingPercentEncoding(withAllowedCharacters: .urlPathAllowed) ?? "" + localVariablePath = localVariablePath.replacingOccurrences(of: "{tenant_uuid}", with: tenantUuidPostEscape, options: .literal, range: nil) + let localVariableURLString = authentikClientAPI.basePath + localVariablePath + let localVariableParameters = JSONEncodingHelper.encodingParameters(forEncodableObject: tenantRequest) + + let localVariableUrlComponents = URLComponents(string: localVariableURLString) + + let localVariableNillableHeaders: [String: Any?] = [ + : + ] + + let localVariableHeaderParameters = APIHelper.rejectNilHeaders(localVariableNillableHeaders) + + let localVariableRequestBuilder: RequestBuilder.Type = authentikClientAPI.requestBuilderFactory.getBuilder() + + return localVariableRequestBuilder.init(method: "PUT", URLString: (localVariableUrlComponents?.string ?? localVariableURLString), parameters: localVariableParameters, headers: localVariableHeaderParameters, requiresAuthentication: false) + } +} diff --git a/authentikClient/Classes/OpenAPIs/Models/AppEnum.swift b/authentikClient/Classes/OpenAPIs/Models/AppEnum.swift index 59a9257..b75c1a6 100644 --- a/authentikClient/Classes/OpenAPIs/Models/AppEnum.swift +++ b/authentikClient/Classes/OpenAPIs/Models/AppEnum.swift @@ -10,8 +10,9 @@ import Foundation import AnyCodable #endif -/** * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.tenants` - authentik Tenants * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC */ +/** * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC */ public enum AppEnum: String, Codable, CaseIterable, CaseIterableDefaultsLast { + case tenants = "authentik.tenants" case admin = "authentik.admin" case api = "authentik.api" case crypto = "authentik.crypto" @@ -57,7 +58,7 @@ public enum AppEnum: String, Codable, CaseIterable, CaseIterableDefaultsLast { case stagesPeriodUserLogin = "authentik.stages.user_login" case stagesPeriodUserLogout = "authentik.stages.user_logout" case stagesPeriodUserWrite = "authentik.stages.user_write" - case tenants = "authentik.tenants" + case brands = "authentik.brands" case blueprints = "authentik.blueprints" case core = "authentik.core" case enterprise = "authentik.enterprise" diff --git a/authentikClient/Classes/OpenAPIs/Models/Brand.swift b/authentikClient/Classes/OpenAPIs/Models/Brand.swift new file mode 100644 index 0000000..66d6d4a --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/Brand.swift @@ -0,0 +1,87 @@ +// +// Brand.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Brand Serializer */ +public struct Brand: Codable, JSONEncodable, Hashable { + + public var brandUuid: UUID + /** Domain that activates this brand. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` */ + public var domain: String + public var _default: Bool? + public var brandingTitle: String? + public var brandingLogo: String? + public var brandingFavicon: String? + public var flowAuthentication: UUID? + public var flowInvalidation: UUID? + public var flowRecovery: UUID? + public var flowUnenrollment: UUID? + public var flowUserSettings: UUID? + public var flowDeviceCode: UUID? + /** Web Certificate used by the authentik Core webserver. */ + public var webCertificate: UUID? + public var attributes: AnyCodable? + + public init(brandUuid: UUID, domain: String, _default: Bool? = nil, brandingTitle: String? = nil, brandingLogo: String? = nil, brandingFavicon: String? = nil, flowAuthentication: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, flowDeviceCode: UUID? = nil, webCertificate: UUID? = nil, attributes: AnyCodable? = nil) { + self.brandUuid = brandUuid + self.domain = domain + self._default = _default + self.brandingTitle = brandingTitle + self.brandingLogo = brandingLogo + self.brandingFavicon = brandingFavicon + self.flowAuthentication = flowAuthentication + self.flowInvalidation = flowInvalidation + self.flowRecovery = flowRecovery + self.flowUnenrollment = flowUnenrollment + self.flowUserSettings = flowUserSettings + self.flowDeviceCode = flowDeviceCode + self.webCertificate = webCertificate + self.attributes = attributes + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case brandUuid = "brand_uuid" + case domain + case _default = "default" + case brandingTitle = "branding_title" + case brandingLogo = "branding_logo" + case brandingFavicon = "branding_favicon" + case flowAuthentication = "flow_authentication" + case flowInvalidation = "flow_invalidation" + case flowRecovery = "flow_recovery" + case flowUnenrollment = "flow_unenrollment" + case flowUserSettings = "flow_user_settings" + case flowDeviceCode = "flow_device_code" + case webCertificate = "web_certificate" + case attributes + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encode(brandUuid, forKey: .brandUuid) + try container.encode(domain, forKey: .domain) + try container.encodeIfPresent(_default, forKey: ._default) + try container.encodeIfPresent(brandingTitle, forKey: .brandingTitle) + try container.encodeIfPresent(brandingLogo, forKey: .brandingLogo) + try container.encodeIfPresent(brandingFavicon, forKey: .brandingFavicon) + try container.encodeIfPresent(flowAuthentication, forKey: .flowAuthentication) + try container.encodeIfPresent(flowInvalidation, forKey: .flowInvalidation) + try container.encodeIfPresent(flowRecovery, forKey: .flowRecovery) + try container.encodeIfPresent(flowUnenrollment, forKey: .flowUnenrollment) + try container.encodeIfPresent(flowUserSettings, forKey: .flowUserSettings) + try container.encodeIfPresent(flowDeviceCode, forKey: .flowDeviceCode) + try container.encodeIfPresent(webCertificate, forKey: .webCertificate) + try container.encodeIfPresent(attributes, forKey: .attributes) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/BrandRequest.swift b/authentikClient/Classes/OpenAPIs/Models/BrandRequest.swift new file mode 100644 index 0000000..3abcdcc --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/BrandRequest.swift @@ -0,0 +1,83 @@ +// +// BrandRequest.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Brand Serializer */ +public struct BrandRequest: Codable, JSONEncodable, Hashable { + + /** Domain that activates this brand. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` */ + public var domain: String + public var _default: Bool? + public var brandingTitle: String? + public var brandingLogo: String? + public var brandingFavicon: String? + public var flowAuthentication: UUID? + public var flowInvalidation: UUID? + public var flowRecovery: UUID? + public var flowUnenrollment: UUID? + public var flowUserSettings: UUID? + public var flowDeviceCode: UUID? + /** Web Certificate used by the authentik Core webserver. */ + public var webCertificate: UUID? + public var attributes: AnyCodable? + + public init(domain: String, _default: Bool? = nil, brandingTitle: String? = nil, brandingLogo: String? = nil, brandingFavicon: String? = nil, flowAuthentication: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, flowDeviceCode: UUID? = nil, webCertificate: UUID? = nil, attributes: AnyCodable? = nil) { + self.domain = domain + self._default = _default + self.brandingTitle = brandingTitle + self.brandingLogo = brandingLogo + self.brandingFavicon = brandingFavicon + self.flowAuthentication = flowAuthentication + self.flowInvalidation = flowInvalidation + self.flowRecovery = flowRecovery + self.flowUnenrollment = flowUnenrollment + self.flowUserSettings = flowUserSettings + self.flowDeviceCode = flowDeviceCode + self.webCertificate = webCertificate + self.attributes = attributes + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case domain + case _default = "default" + case brandingTitle = "branding_title" + case brandingLogo = "branding_logo" + case brandingFavicon = "branding_favicon" + case flowAuthentication = "flow_authentication" + case flowInvalidation = "flow_invalidation" + case flowRecovery = "flow_recovery" + case flowUnenrollment = "flow_unenrollment" + case flowUserSettings = "flow_user_settings" + case flowDeviceCode = "flow_device_code" + case webCertificate = "web_certificate" + case attributes + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encode(domain, forKey: .domain) + try container.encodeIfPresent(_default, forKey: ._default) + try container.encodeIfPresent(brandingTitle, forKey: .brandingTitle) + try container.encodeIfPresent(brandingLogo, forKey: .brandingLogo) + try container.encodeIfPresent(brandingFavicon, forKey: .brandingFavicon) + try container.encodeIfPresent(flowAuthentication, forKey: .flowAuthentication) + try container.encodeIfPresent(flowInvalidation, forKey: .flowInvalidation) + try container.encodeIfPresent(flowRecovery, forKey: .flowRecovery) + try container.encodeIfPresent(flowUnenrollment, forKey: .flowUnenrollment) + try container.encodeIfPresent(flowUserSettings, forKey: .flowUserSettings) + try container.encodeIfPresent(flowDeviceCode, forKey: .flowDeviceCode) + try container.encodeIfPresent(webCertificate, forKey: .webCertificate) + try container.encodeIfPresent(attributes, forKey: .attributes) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/CurrentBrand.swift b/authentikClient/Classes/OpenAPIs/Models/CurrentBrand.swift new file mode 100644 index 0000000..1cb9ab0 --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/CurrentBrand.swift @@ -0,0 +1,81 @@ +// +// CurrentBrand.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Partial brand information for styling */ +public struct CurrentBrand: Codable, JSONEncodable, Hashable { + + public var matchedDomain: String + public var brandingTitle: String + public var brandingLogo: String + public var brandingFavicon: String + public var uiFooterLinks: [FooterLink] + public var uiTheme: UiThemeEnum + public var flowAuthentication: String? + public var flowInvalidation: String? + public var flowRecovery: String? + public var flowUnenrollment: String? + public var flowUserSettings: String? + public var flowDeviceCode: String? + public var defaultLocale: String + + public init(matchedDomain: String, brandingTitle: String, brandingLogo: String, brandingFavicon: String, uiFooterLinks: [FooterLink], uiTheme: UiThemeEnum, flowAuthentication: String? = nil, flowInvalidation: String? = nil, flowRecovery: String? = nil, flowUnenrollment: String? = nil, flowUserSettings: String? = nil, flowDeviceCode: String? = nil, defaultLocale: String) { + self.matchedDomain = matchedDomain + self.brandingTitle = brandingTitle + self.brandingLogo = brandingLogo + self.brandingFavicon = brandingFavicon + self.uiFooterLinks = uiFooterLinks + self.uiTheme = uiTheme + self.flowAuthentication = flowAuthentication + self.flowInvalidation = flowInvalidation + self.flowRecovery = flowRecovery + self.flowUnenrollment = flowUnenrollment + self.flowUserSettings = flowUserSettings + self.flowDeviceCode = flowDeviceCode + self.defaultLocale = defaultLocale + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case matchedDomain = "matched_domain" + case brandingTitle = "branding_title" + case brandingLogo = "branding_logo" + case brandingFavicon = "branding_favicon" + case uiFooterLinks = "ui_footer_links" + case uiTheme = "ui_theme" + case flowAuthentication = "flow_authentication" + case flowInvalidation = "flow_invalidation" + case flowRecovery = "flow_recovery" + case flowUnenrollment = "flow_unenrollment" + case flowUserSettings = "flow_user_settings" + case flowDeviceCode = "flow_device_code" + case defaultLocale = "default_locale" + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encode(matchedDomain, forKey: .matchedDomain) + try container.encode(brandingTitle, forKey: .brandingTitle) + try container.encode(brandingLogo, forKey: .brandingLogo) + try container.encode(brandingFavicon, forKey: .brandingFavicon) + try container.encode(uiFooterLinks, forKey: .uiFooterLinks) + try container.encode(uiTheme, forKey: .uiTheme) + try container.encodeIfPresent(flowAuthentication, forKey: .flowAuthentication) + try container.encodeIfPresent(flowInvalidation, forKey: .flowInvalidation) + try container.encodeIfPresent(flowRecovery, forKey: .flowRecovery) + try container.encodeIfPresent(flowUnenrollment, forKey: .flowUnenrollment) + try container.encodeIfPresent(flowUserSettings, forKey: .flowUserSettings) + try container.encodeIfPresent(flowDeviceCode, forKey: .flowDeviceCode) + try container.encode(defaultLocale, forKey: .defaultLocale) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/Domain.swift b/authentikClient/Classes/OpenAPIs/Models/Domain.swift new file mode 100644 index 0000000..d7dca0f --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/Domain.swift @@ -0,0 +1,45 @@ +// +// Domain.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Domain Serializer */ +public struct Domain: Codable, JSONEncodable, Hashable { + + public var id: Int + public var domain: String + public var isPrimary: Bool? + public var tenant: UUID + + public init(id: Int, domain: String, isPrimary: Bool? = nil, tenant: UUID) { + self.id = id + self.domain = domain + self.isPrimary = isPrimary + self.tenant = tenant + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case id + case domain + case isPrimary = "is_primary" + case tenant + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encode(id, forKey: .id) + try container.encode(domain, forKey: .domain) + try container.encodeIfPresent(isPrimary, forKey: .isPrimary) + try container.encode(tenant, forKey: .tenant) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/DomainRequest.swift b/authentikClient/Classes/OpenAPIs/Models/DomainRequest.swift new file mode 100644 index 0000000..b0ba14d --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/DomainRequest.swift @@ -0,0 +1,41 @@ +// +// DomainRequest.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Domain Serializer */ +public struct DomainRequest: Codable, JSONEncodable, Hashable { + + public var domain: String + public var isPrimary: Bool? + public var tenant: UUID + + public init(domain: String, isPrimary: Bool? = nil, tenant: UUID) { + self.domain = domain + self.isPrimary = isPrimary + self.tenant = tenant + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case domain + case isPrimary = "is_primary" + case tenant + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encode(domain, forKey: .domain) + try container.encodeIfPresent(isPrimary, forKey: .isPrimary) + try container.encode(tenant, forKey: .tenant) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/Event.swift b/authentikClient/Classes/OpenAPIs/Models/Event.swift index 521c141..3fb57a2 100644 --- a/authentikClient/Classes/OpenAPIs/Models/Event.swift +++ b/authentikClient/Classes/OpenAPIs/Models/Event.swift @@ -21,9 +21,9 @@ public struct Event: Codable, JSONEncodable, Hashable { public var clientIp: String? public var created: Date public var expires: Date? - public var tenant: AnyCodable? + public var brand: AnyCodable? - public init(pk: UUID, user: AnyCodable? = nil, action: EventActions, app: String, context: AnyCodable? = nil, clientIp: String? = nil, created: Date, expires: Date? = nil, tenant: AnyCodable? = nil) { + public init(pk: UUID, user: AnyCodable? = nil, action: EventActions, app: String, context: AnyCodable? = nil, clientIp: String? = nil, created: Date, expires: Date? = nil, brand: AnyCodable? = nil) { self.pk = pk self.user = user self.action = action @@ -32,7 +32,7 @@ public struct Event: Codable, JSONEncodable, Hashable { self.clientIp = clientIp self.created = created self.expires = expires - self.tenant = tenant + self.brand = brand } public enum CodingKeys: String, CodingKey, CaseIterable { @@ -44,7 +44,7 @@ public struct Event: Codable, JSONEncodable, Hashable { case clientIp = "client_ip" case created case expires - case tenant + case brand } // Encodable protocol methods @@ -59,7 +59,7 @@ public struct Event: Codable, JSONEncodable, Hashable { try container.encodeIfPresent(clientIp, forKey: .clientIp) try container.encode(created, forKey: .created) try container.encodeIfPresent(expires, forKey: .expires) - try container.encodeIfPresent(tenant, forKey: .tenant) + try container.encodeIfPresent(brand, forKey: .brand) } } diff --git a/authentikClient/Classes/OpenAPIs/Models/EventMatcherPolicy.swift b/authentikClient/Classes/OpenAPIs/Models/EventMatcherPolicy.swift index 87c4167..55bbde3 100644 --- a/authentikClient/Classes/OpenAPIs/Models/EventMatcherPolicy.swift +++ b/authentikClient/Classes/OpenAPIs/Models/EventMatcherPolicy.swift @@ -31,9 +31,9 @@ public struct EventMatcherPolicy: Codable, JSONEncodable, Hashable { public var action: EventActions? /** Matches Event's Client IP (strict matching, for network matching use an Expression Policy) */ public var clientIp: String? - /** Match events created by selected application. When left empty, all applications are matched. * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.tenants` - authentik Tenants * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC */ + /** Match events created by selected application. When left empty, all applications are matched. * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC */ public var app: AppEnum? - /** Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping */ + /** Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping */ public var model: ModelEnum? public init(pk: UUID, name: String, executionLogging: Bool? = nil, component: String, verboseName: String, verboseNamePlural: String, metaModelName: String, boundTo: Int, action: EventActions? = nil, clientIp: String? = nil, app: AppEnum? = nil, model: ModelEnum? = nil) { diff --git a/authentikClient/Classes/OpenAPIs/Models/EventMatcherPolicyRequest.swift b/authentikClient/Classes/OpenAPIs/Models/EventMatcherPolicyRequest.swift index 77fb781..ba4b7a8 100644 --- a/authentikClient/Classes/OpenAPIs/Models/EventMatcherPolicyRequest.swift +++ b/authentikClient/Classes/OpenAPIs/Models/EventMatcherPolicyRequest.swift @@ -20,9 +20,9 @@ public struct EventMatcherPolicyRequest: Codable, JSONEncodable, Hashable { public var action: EventActions? /** Matches Event's Client IP (strict matching, for network matching use an Expression Policy) */ public var clientIp: String? - /** Match events created by selected application. When left empty, all applications are matched. * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.tenants` - authentik Tenants * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC */ + /** Match events created by selected application. When left empty, all applications are matched. * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC */ public var app: AppEnum? - /** Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping */ + /** Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping */ public var model: ModelEnum? public init(name: String, executionLogging: Bool? = nil, action: EventActions? = nil, clientIp: String? = nil, app: AppEnum? = nil, model: ModelEnum? = nil) { diff --git a/authentikClient/Classes/OpenAPIs/Models/EventRequest.swift b/authentikClient/Classes/OpenAPIs/Models/EventRequest.swift index 09f57be..24f060e 100644 --- a/authentikClient/Classes/OpenAPIs/Models/EventRequest.swift +++ b/authentikClient/Classes/OpenAPIs/Models/EventRequest.swift @@ -19,16 +19,16 @@ public struct EventRequest: Codable, JSONEncodable, Hashable { public var context: AnyCodable? public var clientIp: String? public var expires: Date? - public var tenant: AnyCodable? + public var brand: AnyCodable? - public init(user: AnyCodable? = nil, action: EventActions, app: String, context: AnyCodable? = nil, clientIp: String? = nil, expires: Date? = nil, tenant: AnyCodable? = nil) { + public init(user: AnyCodable? = nil, action: EventActions, app: String, context: AnyCodable? = nil, clientIp: String? = nil, expires: Date? = nil, brand: AnyCodable? = nil) { self.user = user self.action = action self.app = app self.context = context self.clientIp = clientIp self.expires = expires - self.tenant = tenant + self.brand = brand } public enum CodingKeys: String, CodingKey, CaseIterable { @@ -38,7 +38,7 @@ public struct EventRequest: Codable, JSONEncodable, Hashable { case context case clientIp = "client_ip" case expires - case tenant + case brand } // Encodable protocol methods @@ -51,7 +51,7 @@ public struct EventRequest: Codable, JSONEncodable, Hashable { try container.encodeIfPresent(context, forKey: .context) try container.encodeIfPresent(clientIp, forKey: .clientIp) try container.encodeIfPresent(expires, forKey: .expires) - try container.encodeIfPresent(tenant, forKey: .tenant) + try container.encodeIfPresent(brand, forKey: .brand) } } diff --git a/authentikClient/Classes/OpenAPIs/Models/ModelEnum.swift b/authentikClient/Classes/OpenAPIs/Models/ModelEnum.swift index c4c4ff0..13a1403 100644 --- a/authentikClient/Classes/OpenAPIs/Models/ModelEnum.swift +++ b/authentikClient/Classes/OpenAPIs/Models/ModelEnum.swift @@ -10,8 +10,9 @@ import Foundation import AnyCodable #endif -/** * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping */ +/** * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping */ public enum ModelEnum: String, Codable, CaseIterable, CaseIterableDefaultsLast { + case tenantsPeriodDomain = "authentik_tenants.domain" case cryptoPeriodCertificatekeypair = "authentik_crypto.certificatekeypair" case eventsPeriodEvent = "authentik_events.event" case eventsPeriodNotificationtransport = "authentik_events.notificationtransport" @@ -79,7 +80,7 @@ public enum ModelEnum: String, Codable, CaseIterable, CaseIterableDefaultsLast { case stagesUserLoginPeriodUserloginstage = "authentik_stages_user_login.userloginstage" case stagesUserLogoutPeriodUserlogoutstage = "authentik_stages_user_logout.userlogoutstage" case stagesUserWritePeriodUserwritestage = "authentik_stages_user_write.userwritestage" - case tenantsPeriodTenant = "authentik_tenants.tenant" + case brandsPeriodBrand = "authentik_brands.brand" case blueprintsPeriodBlueprintinstance = "authentik_blueprints.blueprintinstance" case corePeriodGroup = "authentik_core.group" case corePeriodUser = "authentik_core.user" diff --git a/authentikClient/Classes/OpenAPIs/Models/PaginatedBrandList.swift b/authentikClient/Classes/OpenAPIs/Models/PaginatedBrandList.swift new file mode 100644 index 0000000..6732160 --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/PaginatedBrandList.swift @@ -0,0 +1,36 @@ +// +// PaginatedBrandList.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +public struct PaginatedBrandList: Codable, JSONEncodable, Hashable { + + public var pagination: Pagination + public var results: [Brand] + + public init(pagination: Pagination, results: [Brand]) { + self.pagination = pagination + self.results = results + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case pagination + case results + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encode(pagination, forKey: .pagination) + try container.encode(results, forKey: .results) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/PaginatedDomainList.swift b/authentikClient/Classes/OpenAPIs/Models/PaginatedDomainList.swift new file mode 100644 index 0000000..ca81576 --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/PaginatedDomainList.swift @@ -0,0 +1,36 @@ +// +// PaginatedDomainList.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +public struct PaginatedDomainList: Codable, JSONEncodable, Hashable { + + public var pagination: Pagination + public var results: [Domain] + + public init(pagination: Pagination, results: [Domain]) { + self.pagination = pagination + self.results = results + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case pagination + case results + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encode(pagination, forKey: .pagination) + try container.encode(results, forKey: .results) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/PatchedBrandRequest.swift b/authentikClient/Classes/OpenAPIs/Models/PatchedBrandRequest.swift new file mode 100644 index 0000000..f668556 --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/PatchedBrandRequest.swift @@ -0,0 +1,83 @@ +// +// PatchedBrandRequest.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Brand Serializer */ +public struct PatchedBrandRequest: Codable, JSONEncodable, Hashable { + + /** Domain that activates this brand. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` */ + public var domain: String? + public var _default: Bool? + public var brandingTitle: String? + public var brandingLogo: String? + public var brandingFavicon: String? + public var flowAuthentication: UUID? + public var flowInvalidation: UUID? + public var flowRecovery: UUID? + public var flowUnenrollment: UUID? + public var flowUserSettings: UUID? + public var flowDeviceCode: UUID? + /** Web Certificate used by the authentik Core webserver. */ + public var webCertificate: UUID? + public var attributes: AnyCodable? + + public init(domain: String? = nil, _default: Bool? = nil, brandingTitle: String? = nil, brandingLogo: String? = nil, brandingFavicon: String? = nil, flowAuthentication: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, flowDeviceCode: UUID? = nil, webCertificate: UUID? = nil, attributes: AnyCodable? = nil) { + self.domain = domain + self._default = _default + self.brandingTitle = brandingTitle + self.brandingLogo = brandingLogo + self.brandingFavicon = brandingFavicon + self.flowAuthentication = flowAuthentication + self.flowInvalidation = flowInvalidation + self.flowRecovery = flowRecovery + self.flowUnenrollment = flowUnenrollment + self.flowUserSettings = flowUserSettings + self.flowDeviceCode = flowDeviceCode + self.webCertificate = webCertificate + self.attributes = attributes + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case domain + case _default = "default" + case brandingTitle = "branding_title" + case brandingLogo = "branding_logo" + case brandingFavicon = "branding_favicon" + case flowAuthentication = "flow_authentication" + case flowInvalidation = "flow_invalidation" + case flowRecovery = "flow_recovery" + case flowUnenrollment = "flow_unenrollment" + case flowUserSettings = "flow_user_settings" + case flowDeviceCode = "flow_device_code" + case webCertificate = "web_certificate" + case attributes + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encodeIfPresent(domain, forKey: .domain) + try container.encodeIfPresent(_default, forKey: ._default) + try container.encodeIfPresent(brandingTitle, forKey: .brandingTitle) + try container.encodeIfPresent(brandingLogo, forKey: .brandingLogo) + try container.encodeIfPresent(brandingFavicon, forKey: .brandingFavicon) + try container.encodeIfPresent(flowAuthentication, forKey: .flowAuthentication) + try container.encodeIfPresent(flowInvalidation, forKey: .flowInvalidation) + try container.encodeIfPresent(flowRecovery, forKey: .flowRecovery) + try container.encodeIfPresent(flowUnenrollment, forKey: .flowUnenrollment) + try container.encodeIfPresent(flowUserSettings, forKey: .flowUserSettings) + try container.encodeIfPresent(flowDeviceCode, forKey: .flowDeviceCode) + try container.encodeIfPresent(webCertificate, forKey: .webCertificate) + try container.encodeIfPresent(attributes, forKey: .attributes) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/PatchedDomainRequest.swift b/authentikClient/Classes/OpenAPIs/Models/PatchedDomainRequest.swift new file mode 100644 index 0000000..dc6aab8 --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/PatchedDomainRequest.swift @@ -0,0 +1,41 @@ +// +// PatchedDomainRequest.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Domain Serializer */ +public struct PatchedDomainRequest: Codable, JSONEncodable, Hashable { + + public var domain: String? + public var isPrimary: Bool? + public var tenant: UUID? + + public init(domain: String? = nil, isPrimary: Bool? = nil, tenant: UUID? = nil) { + self.domain = domain + self.isPrimary = isPrimary + self.tenant = tenant + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case domain + case isPrimary = "is_primary" + case tenant + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encodeIfPresent(domain, forKey: .domain) + try container.encodeIfPresent(isPrimary, forKey: .isPrimary) + try container.encodeIfPresent(tenant, forKey: .tenant) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/PatchedEventMatcherPolicyRequest.swift b/authentikClient/Classes/OpenAPIs/Models/PatchedEventMatcherPolicyRequest.swift index e3caa6d..e94b0e8 100644 --- a/authentikClient/Classes/OpenAPIs/Models/PatchedEventMatcherPolicyRequest.swift +++ b/authentikClient/Classes/OpenAPIs/Models/PatchedEventMatcherPolicyRequest.swift @@ -20,9 +20,9 @@ public struct PatchedEventMatcherPolicyRequest: Codable, JSONEncodable, Hashable public var action: EventActions? /** Matches Event's Client IP (strict matching, for network matching use an Expression Policy) */ public var clientIp: String? - /** Match events created by selected application. When left empty, all applications are matched. * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.tenants` - authentik Tenants * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC */ + /** Match events created by selected application. When left empty, all applications are matched. * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC */ public var app: AppEnum? - /** Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping */ + /** Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping */ public var model: ModelEnum? public init(name: String? = nil, executionLogging: Bool? = nil, action: EventActions? = nil, clientIp: String? = nil, app: AppEnum? = nil, model: ModelEnum? = nil) { diff --git a/authentikClient/Classes/OpenAPIs/Models/PatchedEventRequest.swift b/authentikClient/Classes/OpenAPIs/Models/PatchedEventRequest.swift index 1d410a3..67f7377 100644 --- a/authentikClient/Classes/OpenAPIs/Models/PatchedEventRequest.swift +++ b/authentikClient/Classes/OpenAPIs/Models/PatchedEventRequest.swift @@ -19,16 +19,16 @@ public struct PatchedEventRequest: Codable, JSONEncodable, Hashable { public var context: AnyCodable? public var clientIp: String? public var expires: Date? - public var tenant: AnyCodable? + public var brand: AnyCodable? - public init(user: AnyCodable? = nil, action: EventActions? = nil, app: String? = nil, context: AnyCodable? = nil, clientIp: String? = nil, expires: Date? = nil, tenant: AnyCodable? = nil) { + public init(user: AnyCodable? = nil, action: EventActions? = nil, app: String? = nil, context: AnyCodable? = nil, clientIp: String? = nil, expires: Date? = nil, brand: AnyCodable? = nil) { self.user = user self.action = action self.app = app self.context = context self.clientIp = clientIp self.expires = expires - self.tenant = tenant + self.brand = brand } public enum CodingKeys: String, CodingKey, CaseIterable { @@ -38,7 +38,7 @@ public struct PatchedEventRequest: Codable, JSONEncodable, Hashable { case context case clientIp = "client_ip" case expires - case tenant + case brand } // Encodable protocol methods @@ -51,7 +51,7 @@ public struct PatchedEventRequest: Codable, JSONEncodable, Hashable { try container.encodeIfPresent(context, forKey: .context) try container.encodeIfPresent(clientIp, forKey: .clientIp) try container.encodeIfPresent(expires, forKey: .expires) - try container.encodeIfPresent(tenant, forKey: .tenant) + try container.encodeIfPresent(brand, forKey: .brand) } } diff --git a/authentikClient/Classes/OpenAPIs/Models/PatchedSettingsRequest.swift b/authentikClient/Classes/OpenAPIs/Models/PatchedSettingsRequest.swift new file mode 100644 index 0000000..7d4e535 --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/PatchedSettingsRequest.swift @@ -0,0 +1,69 @@ +// +// PatchedSettingsRequest.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Settings Serializer */ +public struct PatchedSettingsRequest: Codable, JSONEncodable, Hashable { + + /** Configure how authentik should show avatars for users. */ + public var avatars: String? + /** Enable the ability for users to change their name. */ + public var defaultUserChangeName: Bool? + /** Enable the ability for users to change their email address. */ + public var defaultUserChangeEmail: Bool? + /** Enable the ability for users to change their username. */ + public var defaultUserChangeUsername: Bool? + /** Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). */ + public var eventRetention: String? + /** The option configures the footer links on the flow executor pages. */ + public var footerLinks: AnyCodable? + /** When enabled, all the events caused by a user will be deleted upon the user's deletion. */ + public var gdprCompliance: Bool? + /** Globally enable/disable impersonation. */ + public var impersonation: Bool? + + public init(avatars: String? = nil, defaultUserChangeName: Bool? = nil, defaultUserChangeEmail: Bool? = nil, defaultUserChangeUsername: Bool? = nil, eventRetention: String? = nil, footerLinks: AnyCodable? = nil, gdprCompliance: Bool? = nil, impersonation: Bool? = nil) { + self.avatars = avatars + self.defaultUserChangeName = defaultUserChangeName + self.defaultUserChangeEmail = defaultUserChangeEmail + self.defaultUserChangeUsername = defaultUserChangeUsername + self.eventRetention = eventRetention + self.footerLinks = footerLinks + self.gdprCompliance = gdprCompliance + self.impersonation = impersonation + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case avatars + case defaultUserChangeName = "default_user_change_name" + case defaultUserChangeEmail = "default_user_change_email" + case defaultUserChangeUsername = "default_user_change_username" + case eventRetention = "event_retention" + case footerLinks = "footer_links" + case gdprCompliance = "gdpr_compliance" + case impersonation + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encodeIfPresent(avatars, forKey: .avatars) + try container.encodeIfPresent(defaultUserChangeName, forKey: .defaultUserChangeName) + try container.encodeIfPresent(defaultUserChangeEmail, forKey: .defaultUserChangeEmail) + try container.encodeIfPresent(defaultUserChangeUsername, forKey: .defaultUserChangeUsername) + try container.encodeIfPresent(eventRetention, forKey: .eventRetention) + try container.encodeIfPresent(footerLinks, forKey: .footerLinks) + try container.encodeIfPresent(gdprCompliance, forKey: .gdprCompliance) + try container.encodeIfPresent(impersonation, forKey: .impersonation) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/PatchedTenantRequest.swift b/authentikClient/Classes/OpenAPIs/Models/PatchedTenantRequest.swift index c7b4a14..fe229a6 100644 --- a/authentikClient/Classes/OpenAPIs/Models/PatchedTenantRequest.swift +++ b/authentikClient/Classes/OpenAPIs/Models/PatchedTenantRequest.swift @@ -13,76 +13,29 @@ import AnyCodable /** Tenant Serializer */ public struct PatchedTenantRequest: Codable, JSONEncodable, Hashable { - /** Domain that activates this tenant. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` */ - public var domain: String? - public var _default: Bool? - public var brandingTitle: String? - public var brandingLogo: String? - public var brandingFavicon: String? - public var flowAuthentication: UUID? - public var flowInvalidation: UUID? - public var flowRecovery: UUID? - public var flowUnenrollment: UUID? - public var flowUserSettings: UUID? - public var flowDeviceCode: UUID? - /** Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). */ - public var eventRetention: String? - /** Web Certificate used by the authentik Core webserver. */ - public var webCertificate: UUID? - public var attributes: AnyCodable? - - public init(domain: String? = nil, _default: Bool? = nil, brandingTitle: String? = nil, brandingLogo: String? = nil, brandingFavicon: String? = nil, flowAuthentication: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, flowDeviceCode: UUID? = nil, eventRetention: String? = nil, webCertificate: UUID? = nil, attributes: AnyCodable? = nil) { - self.domain = domain - self._default = _default - self.brandingTitle = brandingTitle - self.brandingLogo = brandingLogo - self.brandingFavicon = brandingFavicon - self.flowAuthentication = flowAuthentication - self.flowInvalidation = flowInvalidation - self.flowRecovery = flowRecovery - self.flowUnenrollment = flowUnenrollment - self.flowUserSettings = flowUserSettings - self.flowDeviceCode = flowDeviceCode - self.eventRetention = eventRetention - self.webCertificate = webCertificate - self.attributes = attributes + public var schemaName: String? + public var name: String? + public var ready: Bool? + + public init(schemaName: String? = nil, name: String? = nil, ready: Bool? = nil) { + self.schemaName = schemaName + self.name = name + self.ready = ready } public enum CodingKeys: String, CodingKey, CaseIterable { - case domain - case _default = "default" - case brandingTitle = "branding_title" - case brandingLogo = "branding_logo" - case brandingFavicon = "branding_favicon" - case flowAuthentication = "flow_authentication" - case flowInvalidation = "flow_invalidation" - case flowRecovery = "flow_recovery" - case flowUnenrollment = "flow_unenrollment" - case flowUserSettings = "flow_user_settings" - case flowDeviceCode = "flow_device_code" - case eventRetention = "event_retention" - case webCertificate = "web_certificate" - case attributes + case schemaName = "schema_name" + case name + case ready } // Encodable protocol methods public func encode(to encoder: Encoder) throws { var container = encoder.container(keyedBy: CodingKeys.self) - try container.encodeIfPresent(domain, forKey: .domain) - try container.encodeIfPresent(_default, forKey: ._default) - try container.encodeIfPresent(brandingTitle, forKey: .brandingTitle) - try container.encodeIfPresent(brandingLogo, forKey: .brandingLogo) - try container.encodeIfPresent(brandingFavicon, forKey: .brandingFavicon) - try container.encodeIfPresent(flowAuthentication, forKey: .flowAuthentication) - try container.encodeIfPresent(flowInvalidation, forKey: .flowInvalidation) - try container.encodeIfPresent(flowRecovery, forKey: .flowRecovery) - try container.encodeIfPresent(flowUnenrollment, forKey: .flowUnenrollment) - try container.encodeIfPresent(flowUserSettings, forKey: .flowUserSettings) - try container.encodeIfPresent(flowDeviceCode, forKey: .flowDeviceCode) - try container.encodeIfPresent(eventRetention, forKey: .eventRetention) - try container.encodeIfPresent(webCertificate, forKey: .webCertificate) - try container.encodeIfPresent(attributes, forKey: .attributes) + try container.encodeIfPresent(schemaName, forKey: .schemaName) + try container.encodeIfPresent(name, forKey: .name) + try container.encodeIfPresent(ready, forKey: .ready) } } diff --git a/authentikClient/Classes/OpenAPIs/Models/Settings.swift b/authentikClient/Classes/OpenAPIs/Models/Settings.swift new file mode 100644 index 0000000..92e1966 --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/Settings.swift @@ -0,0 +1,69 @@ +// +// Settings.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Settings Serializer */ +public struct Settings: Codable, JSONEncodable, Hashable { + + /** Configure how authentik should show avatars for users. */ + public var avatars: String? + /** Enable the ability for users to change their name. */ + public var defaultUserChangeName: Bool? + /** Enable the ability for users to change their email address. */ + public var defaultUserChangeEmail: Bool? + /** Enable the ability for users to change their username. */ + public var defaultUserChangeUsername: Bool? + /** Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). */ + public var eventRetention: String? + /** The option configures the footer links on the flow executor pages. */ + public var footerLinks: AnyCodable? + /** When enabled, all the events caused by a user will be deleted upon the user's deletion. */ + public var gdprCompliance: Bool? + /** Globally enable/disable impersonation. */ + public var impersonation: Bool? + + public init(avatars: String? = nil, defaultUserChangeName: Bool? = nil, defaultUserChangeEmail: Bool? = nil, defaultUserChangeUsername: Bool? = nil, eventRetention: String? = nil, footerLinks: AnyCodable? = nil, gdprCompliance: Bool? = nil, impersonation: Bool? = nil) { + self.avatars = avatars + self.defaultUserChangeName = defaultUserChangeName + self.defaultUserChangeEmail = defaultUserChangeEmail + self.defaultUserChangeUsername = defaultUserChangeUsername + self.eventRetention = eventRetention + self.footerLinks = footerLinks + self.gdprCompliance = gdprCompliance + self.impersonation = impersonation + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case avatars + case defaultUserChangeName = "default_user_change_name" + case defaultUserChangeEmail = "default_user_change_email" + case defaultUserChangeUsername = "default_user_change_username" + case eventRetention = "event_retention" + case footerLinks = "footer_links" + case gdprCompliance = "gdpr_compliance" + case impersonation + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encodeIfPresent(avatars, forKey: .avatars) + try container.encodeIfPresent(defaultUserChangeName, forKey: .defaultUserChangeName) + try container.encodeIfPresent(defaultUserChangeEmail, forKey: .defaultUserChangeEmail) + try container.encodeIfPresent(defaultUserChangeUsername, forKey: .defaultUserChangeUsername) + try container.encodeIfPresent(eventRetention, forKey: .eventRetention) + try container.encodeIfPresent(footerLinks, forKey: .footerLinks) + try container.encodeIfPresent(gdprCompliance, forKey: .gdprCompliance) + try container.encodeIfPresent(impersonation, forKey: .impersonation) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/SettingsRequest.swift b/authentikClient/Classes/OpenAPIs/Models/SettingsRequest.swift new file mode 100644 index 0000000..f9c3ff0 --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/SettingsRequest.swift @@ -0,0 +1,69 @@ +// +// SettingsRequest.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Settings Serializer */ +public struct SettingsRequest: Codable, JSONEncodable, Hashable { + + /** Configure how authentik should show avatars for users. */ + public var avatars: String? + /** Enable the ability for users to change their name. */ + public var defaultUserChangeName: Bool? + /** Enable the ability for users to change their email address. */ + public var defaultUserChangeEmail: Bool? + /** Enable the ability for users to change their username. */ + public var defaultUserChangeUsername: Bool? + /** Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). */ + public var eventRetention: String? + /** The option configures the footer links on the flow executor pages. */ + public var footerLinks: AnyCodable? + /** When enabled, all the events caused by a user will be deleted upon the user's deletion. */ + public var gdprCompliance: Bool? + /** Globally enable/disable impersonation. */ + public var impersonation: Bool? + + public init(avatars: String? = nil, defaultUserChangeName: Bool? = nil, defaultUserChangeEmail: Bool? = nil, defaultUserChangeUsername: Bool? = nil, eventRetention: String? = nil, footerLinks: AnyCodable? = nil, gdprCompliance: Bool? = nil, impersonation: Bool? = nil) { + self.avatars = avatars + self.defaultUserChangeName = defaultUserChangeName + self.defaultUserChangeEmail = defaultUserChangeEmail + self.defaultUserChangeUsername = defaultUserChangeUsername + self.eventRetention = eventRetention + self.footerLinks = footerLinks + self.gdprCompliance = gdprCompliance + self.impersonation = impersonation + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case avatars + case defaultUserChangeName = "default_user_change_name" + case defaultUserChangeEmail = "default_user_change_email" + case defaultUserChangeUsername = "default_user_change_username" + case eventRetention = "event_retention" + case footerLinks = "footer_links" + case gdprCompliance = "gdpr_compliance" + case impersonation + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encodeIfPresent(avatars, forKey: .avatars) + try container.encodeIfPresent(defaultUserChangeName, forKey: .defaultUserChangeName) + try container.encodeIfPresent(defaultUserChangeEmail, forKey: .defaultUserChangeEmail) + try container.encodeIfPresent(defaultUserChangeUsername, forKey: .defaultUserChangeUsername) + try container.encodeIfPresent(eventRetention, forKey: .eventRetention) + try container.encodeIfPresent(footerLinks, forKey: .footerLinks) + try container.encodeIfPresent(gdprCompliance, forKey: .gdprCompliance) + try container.encodeIfPresent(impersonation, forKey: .impersonation) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/SystemInfo.swift b/authentikClient/Classes/OpenAPIs/Models/SystemInfo.swift index 4fa0fe3..e078637 100644 --- a/authentikClient/Classes/OpenAPIs/Models/SystemInfo.swift +++ b/authentikClient/Classes/OpenAPIs/Models/SystemInfo.swift @@ -20,20 +20,23 @@ public struct SystemInfo: Codable, JSONEncodable, Hashable { /** Get HTTP Secure flag */ public var httpIsSecure: Bool public var runtime: SystemInfoRuntime - /** Currently active tenant */ - public var tenant: String + /** Currently active brand */ + public var brand: String /** Current server time */ public var serverTime: Date + /** Whether the embedded outpost is disabled */ + public var embeddedOutpostDisabled: Bool /** Get the FQDN configured on the embedded outpost */ public var embeddedOutpostHost: String - public init(httpHeaders: [String: String], httpHost: String, httpIsSecure: Bool, runtime: SystemInfoRuntime, tenant: String, serverTime: Date, embeddedOutpostHost: String) { + public init(httpHeaders: [String: String], httpHost: String, httpIsSecure: Bool, runtime: SystemInfoRuntime, brand: String, serverTime: Date, embeddedOutpostDisabled: Bool, embeddedOutpostHost: String) { self.httpHeaders = httpHeaders self.httpHost = httpHost self.httpIsSecure = httpIsSecure self.runtime = runtime - self.tenant = tenant + self.brand = brand self.serverTime = serverTime + self.embeddedOutpostDisabled = embeddedOutpostDisabled self.embeddedOutpostHost = embeddedOutpostHost } @@ -42,8 +45,9 @@ public struct SystemInfo: Codable, JSONEncodable, Hashable { case httpHost = "http_host" case httpIsSecure = "http_is_secure" case runtime - case tenant + case brand case serverTime = "server_time" + case embeddedOutpostDisabled = "embedded_outpost_disabled" case embeddedOutpostHost = "embedded_outpost_host" } @@ -55,8 +59,9 @@ public struct SystemInfo: Codable, JSONEncodable, Hashable { try container.encode(httpHost, forKey: .httpHost) try container.encode(httpIsSecure, forKey: .httpIsSecure) try container.encode(runtime, forKey: .runtime) - try container.encode(tenant, forKey: .tenant) + try container.encode(brand, forKey: .brand) try container.encode(serverTime, forKey: .serverTime) + try container.encode(embeddedOutpostDisabled, forKey: .embeddedOutpostDisabled) try container.encode(embeddedOutpostHost, forKey: .embeddedOutpostHost) } } diff --git a/authentikClient/Classes/OpenAPIs/Models/Tenant.swift b/authentikClient/Classes/OpenAPIs/Models/Tenant.swift index b824820..c82e258 100644 --- a/authentikClient/Classes/OpenAPIs/Models/Tenant.swift +++ b/authentikClient/Classes/OpenAPIs/Models/Tenant.swift @@ -14,58 +14,22 @@ import AnyCodable public struct Tenant: Codable, JSONEncodable, Hashable { public var tenantUuid: UUID - /** Domain that activates this tenant. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` */ - public var domain: String - public var _default: Bool? - public var brandingTitle: String? - public var brandingLogo: String? - public var brandingFavicon: String? - public var flowAuthentication: UUID? - public var flowInvalidation: UUID? - public var flowRecovery: UUID? - public var flowUnenrollment: UUID? - public var flowUserSettings: UUID? - public var flowDeviceCode: UUID? - /** Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). */ - public var eventRetention: String? - /** Web Certificate used by the authentik Core webserver. */ - public var webCertificate: UUID? - public var attributes: AnyCodable? + public var schemaName: String + public var name: String + public var ready: Bool? - public init(tenantUuid: UUID, domain: String, _default: Bool? = nil, brandingTitle: String? = nil, brandingLogo: String? = nil, brandingFavicon: String? = nil, flowAuthentication: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, flowDeviceCode: UUID? = nil, eventRetention: String? = nil, webCertificate: UUID? = nil, attributes: AnyCodable? = nil) { + public init(tenantUuid: UUID, schemaName: String, name: String, ready: Bool? = nil) { self.tenantUuid = tenantUuid - self.domain = domain - self._default = _default - self.brandingTitle = brandingTitle - self.brandingLogo = brandingLogo - self.brandingFavicon = brandingFavicon - self.flowAuthentication = flowAuthentication - self.flowInvalidation = flowInvalidation - self.flowRecovery = flowRecovery - self.flowUnenrollment = flowUnenrollment - self.flowUserSettings = flowUserSettings - self.flowDeviceCode = flowDeviceCode - self.eventRetention = eventRetention - self.webCertificate = webCertificate - self.attributes = attributes + self.schemaName = schemaName + self.name = name + self.ready = ready } public enum CodingKeys: String, CodingKey, CaseIterable { case tenantUuid = "tenant_uuid" - case domain - case _default = "default" - case brandingTitle = "branding_title" - case brandingLogo = "branding_logo" - case brandingFavicon = "branding_favicon" - case flowAuthentication = "flow_authentication" - case flowInvalidation = "flow_invalidation" - case flowRecovery = "flow_recovery" - case flowUnenrollment = "flow_unenrollment" - case flowUserSettings = "flow_user_settings" - case flowDeviceCode = "flow_device_code" - case eventRetention = "event_retention" - case webCertificate = "web_certificate" - case attributes + case schemaName = "schema_name" + case name + case ready } // Encodable protocol methods @@ -73,20 +37,9 @@ public struct Tenant: Codable, JSONEncodable, Hashable { public func encode(to encoder: Encoder) throws { var container = encoder.container(keyedBy: CodingKeys.self) try container.encode(tenantUuid, forKey: .tenantUuid) - try container.encode(domain, forKey: .domain) - try container.encodeIfPresent(_default, forKey: ._default) - try container.encodeIfPresent(brandingTitle, forKey: .brandingTitle) - try container.encodeIfPresent(brandingLogo, forKey: .brandingLogo) - try container.encodeIfPresent(brandingFavicon, forKey: .brandingFavicon) - try container.encodeIfPresent(flowAuthentication, forKey: .flowAuthentication) - try container.encodeIfPresent(flowInvalidation, forKey: .flowInvalidation) - try container.encodeIfPresent(flowRecovery, forKey: .flowRecovery) - try container.encodeIfPresent(flowUnenrollment, forKey: .flowUnenrollment) - try container.encodeIfPresent(flowUserSettings, forKey: .flowUserSettings) - try container.encodeIfPresent(flowDeviceCode, forKey: .flowDeviceCode) - try container.encodeIfPresent(eventRetention, forKey: .eventRetention) - try container.encodeIfPresent(webCertificate, forKey: .webCertificate) - try container.encodeIfPresent(attributes, forKey: .attributes) + try container.encode(schemaName, forKey: .schemaName) + try container.encode(name, forKey: .name) + try container.encodeIfPresent(ready, forKey: .ready) } } diff --git a/authentikClient/Classes/OpenAPIs/Models/TenantAdminGroupRequestRequest.swift b/authentikClient/Classes/OpenAPIs/Models/TenantAdminGroupRequestRequest.swift new file mode 100644 index 0000000..5337dca --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/TenantAdminGroupRequestRequest.swift @@ -0,0 +1,33 @@ +// +// TenantAdminGroupRequestRequest.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Tenant admin group creation request serializer */ +public struct TenantAdminGroupRequestRequest: Codable, JSONEncodable, Hashable { + + public var user: String + + public init(user: String) { + self.user = user + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case user + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encode(user, forKey: .user) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/TenantRecoveryKeyRequestRequest.swift b/authentikClient/Classes/OpenAPIs/Models/TenantRecoveryKeyRequestRequest.swift new file mode 100644 index 0000000..9282fa5 --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/TenantRecoveryKeyRequestRequest.swift @@ -0,0 +1,37 @@ +// +// TenantRecoveryKeyRequestRequest.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Tenant recovery key creation request serializer */ +public struct TenantRecoveryKeyRequestRequest: Codable, JSONEncodable, Hashable { + + public var user: String + public var durationDays: Int + + public init(user: String, durationDays: Int) { + self.user = user + self.durationDays = durationDays + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case user + case durationDays = "duration_days" + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encode(user, forKey: .user) + try container.encode(durationDays, forKey: .durationDays) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/TenantRecoveryKeyResponse.swift b/authentikClient/Classes/OpenAPIs/Models/TenantRecoveryKeyResponse.swift new file mode 100644 index 0000000..b3872f7 --- /dev/null +++ b/authentikClient/Classes/OpenAPIs/Models/TenantRecoveryKeyResponse.swift @@ -0,0 +1,37 @@ +// +// TenantRecoveryKeyResponse.swift +// +// Generated by openapi-generator +// https://openapi-generator.tech +// + +import Foundation +#if canImport(AnyCodable) +import AnyCodable +#endif + +/** Tenant recovery key creation response serializer */ +public struct TenantRecoveryKeyResponse: Codable, JSONEncodable, Hashable { + + public var expiry: Date + public var url: String + + public init(expiry: Date, url: String) { + self.expiry = expiry + self.url = url + } + + public enum CodingKeys: String, CodingKey, CaseIterable { + case expiry + case url + } + + // Encodable protocol methods + + public func encode(to encoder: Encoder) throws { + var container = encoder.container(keyedBy: CodingKeys.self) + try container.encode(expiry, forKey: .expiry) + try container.encode(url, forKey: .url) + } +} + diff --git a/authentikClient/Classes/OpenAPIs/Models/TenantRequest.swift b/authentikClient/Classes/OpenAPIs/Models/TenantRequest.swift index 3f661b9..3955e7c 100644 --- a/authentikClient/Classes/OpenAPIs/Models/TenantRequest.swift +++ b/authentikClient/Classes/OpenAPIs/Models/TenantRequest.swift @@ -13,76 +13,29 @@ import AnyCodable /** Tenant Serializer */ public struct TenantRequest: Codable, JSONEncodable, Hashable { - /** Domain that activates this tenant. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` */ - public var domain: String - public var _default: Bool? - public var brandingTitle: String? - public var brandingLogo: String? - public var brandingFavicon: String? - public var flowAuthentication: UUID? - public var flowInvalidation: UUID? - public var flowRecovery: UUID? - public var flowUnenrollment: UUID? - public var flowUserSettings: UUID? - public var flowDeviceCode: UUID? - /** Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). */ - public var eventRetention: String? - /** Web Certificate used by the authentik Core webserver. */ - public var webCertificate: UUID? - public var attributes: AnyCodable? - - public init(domain: String, _default: Bool? = nil, brandingTitle: String? = nil, brandingLogo: String? = nil, brandingFavicon: String? = nil, flowAuthentication: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, flowDeviceCode: UUID? = nil, eventRetention: String? = nil, webCertificate: UUID? = nil, attributes: AnyCodable? = nil) { - self.domain = domain - self._default = _default - self.brandingTitle = brandingTitle - self.brandingLogo = brandingLogo - self.brandingFavicon = brandingFavicon - self.flowAuthentication = flowAuthentication - self.flowInvalidation = flowInvalidation - self.flowRecovery = flowRecovery - self.flowUnenrollment = flowUnenrollment - self.flowUserSettings = flowUserSettings - self.flowDeviceCode = flowDeviceCode - self.eventRetention = eventRetention - self.webCertificate = webCertificate - self.attributes = attributes + public var schemaName: String + public var name: String + public var ready: Bool? + + public init(schemaName: String, name: String, ready: Bool? = nil) { + self.schemaName = schemaName + self.name = name + self.ready = ready } public enum CodingKeys: String, CodingKey, CaseIterable { - case domain - case _default = "default" - case brandingTitle = "branding_title" - case brandingLogo = "branding_logo" - case brandingFavicon = "branding_favicon" - case flowAuthentication = "flow_authentication" - case flowInvalidation = "flow_invalidation" - case flowRecovery = "flow_recovery" - case flowUnenrollment = "flow_unenrollment" - case flowUserSettings = "flow_user_settings" - case flowDeviceCode = "flow_device_code" - case eventRetention = "event_retention" - case webCertificate = "web_certificate" - case attributes + case schemaName = "schema_name" + case name + case ready } // Encodable protocol methods public func encode(to encoder: Encoder) throws { var container = encoder.container(keyedBy: CodingKeys.self) - try container.encode(domain, forKey: .domain) - try container.encodeIfPresent(_default, forKey: ._default) - try container.encodeIfPresent(brandingTitle, forKey: .brandingTitle) - try container.encodeIfPresent(brandingLogo, forKey: .brandingLogo) - try container.encodeIfPresent(brandingFavicon, forKey: .brandingFavicon) - try container.encodeIfPresent(flowAuthentication, forKey: .flowAuthentication) - try container.encodeIfPresent(flowInvalidation, forKey: .flowInvalidation) - try container.encodeIfPresent(flowRecovery, forKey: .flowRecovery) - try container.encodeIfPresent(flowUnenrollment, forKey: .flowUnenrollment) - try container.encodeIfPresent(flowUserSettings, forKey: .flowUserSettings) - try container.encodeIfPresent(flowDeviceCode, forKey: .flowDeviceCode) - try container.encodeIfPresent(eventRetention, forKey: .eventRetention) - try container.encodeIfPresent(webCertificate, forKey: .webCertificate) - try container.encodeIfPresent(attributes, forKey: .attributes) + try container.encode(schemaName, forKey: .schemaName) + try container.encode(name, forKey: .name) + try container.encodeIfPresent(ready, forKey: .ready) } } diff --git a/authentikClient/Classes/OpenAPIs/Models/UserSelf.swift b/authentikClient/Classes/OpenAPIs/Models/UserSelf.swift index 73d2858..c24e006 100644 --- a/authentikClient/Classes/OpenAPIs/Models/UserSelf.swift +++ b/authentikClient/Classes/OpenAPIs/Models/UserSelf.swift @@ -25,7 +25,7 @@ public struct UserSelf: Codable, JSONEncodable, Hashable { public var email: String? public var avatar: String public var uid: String - /** Get user settings with tenant and group settings applied */ + /** Get user settings with brand and group settings applied */ public var settings: [String: AnyCodable] public var type: UserTypeEnum? /** Get all system permissions assigned to the user */ diff --git a/docs/AdminAPI.md b/docs/AdminAPI.md index 013a6cb..2f22d21 100644 --- a/docs/AdminAPI.md +++ b/docs/AdminAPI.md @@ -7,6 +7,9 @@ Method | HTTP request | Description [**adminAppsList**](AdminAPI.md#adminappslist) | **GET** /admin/apps/ | [**adminMetricsRetrieve**](AdminAPI.md#adminmetricsretrieve) | **GET** /admin/metrics/ | [**adminModelsList**](AdminAPI.md#adminmodelslist) | **GET** /admin/models/ | +[**adminSettingsPartialUpdate**](AdminAPI.md#adminsettingspartialupdate) | **PATCH** /admin/settings/ | +[**adminSettingsRetrieve**](AdminAPI.md#adminsettingsretrieve) | **GET** /admin/settings/ | +[**adminSettingsUpdate**](AdminAPI.md#adminsettingsupdate) | **PUT** /admin/settings/ | [**adminSystemCreate**](AdminAPI.md#adminsystemcreate) | **POST** /admin/system/ | [**adminSystemRetrieve**](AdminAPI.md#adminsystemretrieve) | **GET** /admin/system/ | [**adminSystemTasksList**](AdminAPI.md#adminsystemtaskslist) | **GET** /admin/system_tasks/ | @@ -151,6 +154,149 @@ This endpoint does not need any parameter. [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **adminSettingsPartialUpdate** +```swift + open class func adminSettingsPartialUpdate(patchedSettingsRequest: PatchedSettingsRequest? = nil, completion: @escaping (_ data: Settings?, _ error: Error?) -> Void) +``` + + + +Settings view + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let patchedSettingsRequest = PatchedSettingsRequest(avatars: "avatars_example", defaultUserChangeName: false, defaultUserChangeEmail: false, defaultUserChangeUsername: false, eventRetention: "eventRetention_example", footerLinks: "TODO", gdprCompliance: false, impersonation: false) // PatchedSettingsRequest | (optional) + +AdminAPI.adminSettingsPartialUpdate(patchedSettingsRequest: patchedSettingsRequest) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **patchedSettingsRequest** | [**PatchedSettingsRequest**](PatchedSettingsRequest.md) | | [optional] + +### Return type + +[**Settings**](Settings.md) + +### Authorization + +[authentik](../README.md#authentik) + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **adminSettingsRetrieve** +```swift + open class func adminSettingsRetrieve(completion: @escaping (_ data: Settings?, _ error: Error?) -> Void) +``` + + + +Settings view + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + + +AdminAPI.adminSettingsRetrieve() { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters +This endpoint does not need any parameter. + +### Return type + +[**Settings**](Settings.md) + +### Authorization + +[authentik](../README.md#authentik) + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **adminSettingsUpdate** +```swift + open class func adminSettingsUpdate(settingsRequest: SettingsRequest? = nil, completion: @escaping (_ data: Settings?, _ error: Error?) -> Void) +``` + + + +Settings view + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let settingsRequest = SettingsRequest(avatars: "avatars_example", defaultUserChangeName: false, defaultUserChangeEmail: false, defaultUserChangeUsername: false, eventRetention: "eventRetention_example", footerLinks: "TODO", gdprCompliance: false, impersonation: false) // SettingsRequest | (optional) + +AdminAPI.adminSettingsUpdate(settingsRequest: settingsRequest) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **settingsRequest** | [**SettingsRequest**](SettingsRequest.md) | | [optional] + +### Return type + +[**Settings**](Settings.md) + +### Authorization + +[authentik](../README.md#authentik) + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **adminSystemCreate** ```swift open class func adminSystemCreate(completion: @escaping (_ data: SystemInfo?, _ error: Error?) -> Void) diff --git a/docs/Brand.md b/docs/Brand.md new file mode 100644 index 0000000..1920b96 --- /dev/null +++ b/docs/Brand.md @@ -0,0 +1,23 @@ +# Brand + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**brandUuid** | **UUID** | | [readonly] +**domain** | **String** | Domain that activates this brand. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` | +**_default** | **Bool** | | [optional] +**brandingTitle** | **String** | | [optional] +**brandingLogo** | **String** | | [optional] +**brandingFavicon** | **String** | | [optional] +**flowAuthentication** | **UUID** | | [optional] +**flowInvalidation** | **UUID** | | [optional] +**flowRecovery** | **UUID** | | [optional] +**flowUnenrollment** | **UUID** | | [optional] +**flowUserSettings** | **UUID** | | [optional] +**flowDeviceCode** | **UUID** | | [optional] +**webCertificate** | **UUID** | Web Certificate used by the authentik Core webserver. | [optional] +**attributes** | [**AnyCodable**](.md) | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/BrandRequest.md b/docs/BrandRequest.md new file mode 100644 index 0000000..7406adf --- /dev/null +++ b/docs/BrandRequest.md @@ -0,0 +1,22 @@ +# BrandRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**domain** | **String** | Domain that activates this brand. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` | +**_default** | **Bool** | | [optional] +**brandingTitle** | **String** | | [optional] +**brandingLogo** | **String** | | [optional] +**brandingFavicon** | **String** | | [optional] +**flowAuthentication** | **UUID** | | [optional] +**flowInvalidation** | **UUID** | | [optional] +**flowRecovery** | **UUID** | | [optional] +**flowUnenrollment** | **UUID** | | [optional] +**flowUserSettings** | **UUID** | | [optional] +**flowDeviceCode** | **UUID** | | [optional] +**webCertificate** | **UUID** | Web Certificate used by the authentik Core webserver. | [optional] +**attributes** | [**AnyCodable**](.md) | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/CoreAPI.md b/docs/CoreAPI.md index 27b21ef..a3bd50b 100644 --- a/docs/CoreAPI.md +++ b/docs/CoreAPI.md @@ -19,6 +19,14 @@ Method | HTTP request | Description [**coreAuthenticatedSessionsList**](CoreAPI.md#coreauthenticatedsessionslist) | **GET** /core/authenticated_sessions/ | [**coreAuthenticatedSessionsRetrieve**](CoreAPI.md#coreauthenticatedsessionsretrieve) | **GET** /core/authenticated_sessions/{uuid}/ | [**coreAuthenticatedSessionsUsedByList**](CoreAPI.md#coreauthenticatedsessionsusedbylist) | **GET** /core/authenticated_sessions/{uuid}/used_by/ | +[**coreBrandsCreate**](CoreAPI.md#corebrandscreate) | **POST** /core/brands/ | +[**coreBrandsCurrentRetrieve**](CoreAPI.md#corebrandscurrentretrieve) | **GET** /core/brands/current/ | +[**coreBrandsDestroy**](CoreAPI.md#corebrandsdestroy) | **DELETE** /core/brands/{brand_uuid}/ | +[**coreBrandsList**](CoreAPI.md#corebrandslist) | **GET** /core/brands/ | +[**coreBrandsPartialUpdate**](CoreAPI.md#corebrandspartialupdate) | **PATCH** /core/brands/{brand_uuid}/ | +[**coreBrandsRetrieve**](CoreAPI.md#corebrandsretrieve) | **GET** /core/brands/{brand_uuid}/ | +[**coreBrandsUpdate**](CoreAPI.md#corebrandsupdate) | **PUT** /core/brands/{brand_uuid}/ | +[**coreBrandsUsedByList**](CoreAPI.md#corebrandsusedbylist) | **GET** /core/brands/{brand_uuid}/used_by/ | [**coreGroupsAddUserCreate**](CoreAPI.md#coregroupsaddusercreate) | **POST** /core/groups/{group_uuid}/add_user/ | [**coreGroupsCreate**](CoreAPI.md#coregroupscreate) | **POST** /core/groups/ | [**coreGroupsDestroy**](CoreAPI.md#coregroupsdestroy) | **DELETE** /core/groups/{group_uuid}/ | @@ -28,14 +36,6 @@ Method | HTTP request | Description [**coreGroupsRetrieve**](CoreAPI.md#coregroupsretrieve) | **GET** /core/groups/{group_uuid}/ | [**coreGroupsUpdate**](CoreAPI.md#coregroupsupdate) | **PUT** /core/groups/{group_uuid}/ | [**coreGroupsUsedByList**](CoreAPI.md#coregroupsusedbylist) | **GET** /core/groups/{group_uuid}/used_by/ | -[**coreTenantsCreate**](CoreAPI.md#coretenantscreate) | **POST** /core/tenants/ | -[**coreTenantsCurrentRetrieve**](CoreAPI.md#coretenantscurrentretrieve) | **GET** /core/tenants/current/ | -[**coreTenantsDestroy**](CoreAPI.md#coretenantsdestroy) | **DELETE** /core/tenants/{tenant_uuid}/ | -[**coreTenantsList**](CoreAPI.md#coretenantslist) | **GET** /core/tenants/ | -[**coreTenantsPartialUpdate**](CoreAPI.md#coretenantspartialupdate) | **PATCH** /core/tenants/{tenant_uuid}/ | -[**coreTenantsRetrieve**](CoreAPI.md#coretenantsretrieve) | **GET** /core/tenants/{tenant_uuid}/ | -[**coreTenantsUpdate**](CoreAPI.md#coretenantsupdate) | **PUT** /core/tenants/{tenant_uuid}/ | -[**coreTenantsUsedByList**](CoreAPI.md#coretenantsusedbylist) | **GET** /core/tenants/{tenant_uuid}/used_by/ | [**coreTokensCreate**](CoreAPI.md#coretokenscreate) | **POST** /core/tokens/ | [**coreTokensDestroy**](CoreAPI.md#coretokensdestroy) | **DELETE** /core/tokens/{identifier}/ | [**coreTokensList**](CoreAPI.md#coretokenslist) | **GET** /core/tokens/ | @@ -847,24 +847,23 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreGroupsAddUserCreate** +# **coreBrandsCreate** ```swift - open class func coreGroupsAddUserCreate(groupUuid: UUID, userAccountRequest: UserAccountRequest, completion: @escaping (_ data: Void?, _ error: Error?) -> Void) + open class func coreBrandsCreate(brandRequest: BrandRequest, completion: @escaping (_ data: Brand?, _ error: Error?) -> Void) ``` -Add user to group +Brand Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let groupUuid = 987 // UUID | A UUID string identifying this Group. -let userAccountRequest = UserAccountRequest(pk: 123) // UserAccountRequest | +let brandRequest = BrandRequest(domain: "domain_example", _default: false, brandingTitle: "brandingTitle_example", brandingLogo: "brandingLogo_example", brandingFavicon: "brandingFavicon_example", flowAuthentication: 123, flowInvalidation: 123, flowRecovery: 123, flowUnenrollment: 123, flowUserSettings: 123, flowDeviceCode: 123, webCertificate: 123, attributes: "TODO") // BrandRequest | -CoreAPI.coreGroupsAddUserCreate(groupUuid: groupUuid, userAccountRequest: userAccountRequest) { (response, error) in +CoreAPI.coreBrandsCreate(brandRequest: brandRequest) { (response, error) in guard error == nil else { print(error) return @@ -880,12 +879,11 @@ CoreAPI.coreGroupsAddUserCreate(groupUuid: groupUuid, userAccountRequest: userAc Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **groupUuid** | **UUID** | A UUID string identifying this Group. | - **userAccountRequest** | [**UserAccountRequest**](UserAccountRequest.md) | | + **brandRequest** | [**BrandRequest**](BrandRequest.md) | | ### Return type -Void (empty response body) +[**Brand**](Brand.md) ### Authorization @@ -898,23 +896,22 @@ Void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreGroupsCreate** +# **coreBrandsCurrentRetrieve** ```swift - open class func coreGroupsCreate(groupRequest: GroupRequest, completion: @escaping (_ data: Group?, _ error: Error?) -> Void) + open class func coreBrandsCurrentRetrieve(completion: @escaping (_ data: CurrentBrand?, _ error: Error?) -> Void) ``` -Group Viewset +Get current brand ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let groupRequest = GroupRequest(name: "name_example", isSuperuser: false, parent: 123, users: [123], attributes: "TODO", roles: [123]) // GroupRequest | -CoreAPI.coreGroupsCreate(groupRequest: groupRequest) { (response, error) in +CoreAPI.coreBrandsCurrentRetrieve() { (response, error) in guard error == nil else { print(error) return @@ -927,14 +924,11 @@ CoreAPI.coreGroupsCreate(groupRequest: groupRequest) { (response, error) in ``` ### Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **groupRequest** | [**GroupRequest**](GroupRequest.md) | | +This endpoint does not need any parameter. ### Return type -[**Group**](Group.md) +[**CurrentBrand**](CurrentBrand.md) ### Authorization @@ -942,28 +936,28 @@ Name | Type | Description | Notes ### HTTP request headers - - **Content-Type**: application/json + - **Content-Type**: Not defined - **Accept**: application/json [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreGroupsDestroy** +# **coreBrandsDestroy** ```swift - open class func coreGroupsDestroy(groupUuid: UUID, completion: @escaping (_ data: Void?, _ error: Error?) -> Void) + open class func coreBrandsDestroy(brandUuid: UUID, completion: @escaping (_ data: Void?, _ error: Error?) -> Void) ``` -Group Viewset +Brand Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let groupUuid = 987 // UUID | A UUID string identifying this Group. +let brandUuid = 987 // UUID | A UUID string identifying this Brand. -CoreAPI.coreGroupsDestroy(groupUuid: groupUuid) { (response, error) in +CoreAPI.coreBrandsDestroy(brandUuid: brandUuid) { (response, error) in guard error == nil else { print(error) return @@ -979,7 +973,7 @@ CoreAPI.coreGroupsDestroy(groupUuid: groupUuid) { (response, error) in Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **groupUuid** | **UUID** | A UUID string identifying this Group. | + **brandUuid** | **UUID** | A UUID string identifying this Brand. | ### Return type @@ -996,31 +990,39 @@ Void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreGroupsList** +# **coreBrandsList** ```swift - open class func coreGroupsList(attributes: String? = nil, isSuperuser: Bool? = nil, membersByPk: [Int]? = nil, membersByUsername: [String]? = nil, name: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, completion: @escaping (_ data: PaginatedGroupList?, _ error: Error?) -> Void) + open class func coreBrandsList(brandUuid: UUID? = nil, brandingFavicon: String? = nil, brandingLogo: String? = nil, brandingTitle: String? = nil, _default: Bool? = nil, domain: String? = nil, flowAuthentication: UUID? = nil, flowDeviceCode: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, webCertificate: UUID? = nil, completion: @escaping (_ data: PaginatedBrandList?, _ error: Error?) -> Void) ``` -Group Viewset +Brand Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let attributes = "attributes_example" // String | Attributes (optional) -let isSuperuser = true // Bool | (optional) -let membersByPk = [123] // [Int] | (optional) -let membersByUsername = ["inner_example"] // [String] | Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only. (optional) -let name = "name_example" // String | (optional) +let brandUuid = 987 // UUID | (optional) +let brandingFavicon = "brandingFavicon_example" // String | (optional) +let brandingLogo = "brandingLogo_example" // String | (optional) +let brandingTitle = "brandingTitle_example" // String | (optional) +let _default = true // Bool | (optional) +let domain = "domain_example" // String | (optional) +let flowAuthentication = 987 // UUID | (optional) +let flowDeviceCode = 987 // UUID | (optional) +let flowInvalidation = 987 // UUID | (optional) +let flowRecovery = 987 // UUID | (optional) +let flowUnenrollment = 987 // UUID | (optional) +let flowUserSettings = 987 // UUID | (optional) let ordering = "ordering_example" // String | Which field to use when ordering the results. (optional) let page = 987 // Int | A page number within the paginated result set. (optional) let pageSize = 987 // Int | Number of results to return per page. (optional) let search = "search_example" // String | A search term. (optional) +let webCertificate = 987 // UUID | (optional) -CoreAPI.coreGroupsList(attributes: attributes, isSuperuser: isSuperuser, membersByPk: membersByPk, membersByUsername: membersByUsername, name: name, ordering: ordering, page: page, pageSize: pageSize, search: search) { (response, error) in +CoreAPI.coreBrandsList(brandUuid: brandUuid, brandingFavicon: brandingFavicon, brandingLogo: brandingLogo, brandingTitle: brandingTitle, _default: _default, domain: domain, flowAuthentication: flowAuthentication, flowDeviceCode: flowDeviceCode, flowInvalidation: flowInvalidation, flowRecovery: flowRecovery, flowUnenrollment: flowUnenrollment, flowUserSettings: flowUserSettings, ordering: ordering, page: page, pageSize: pageSize, search: search, webCertificate: webCertificate) { (response, error) in guard error == nil else { print(error) return @@ -1036,19 +1038,27 @@ CoreAPI.coreGroupsList(attributes: attributes, isSuperuser: isSuperuser, members Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **attributes** | **String** | Attributes | [optional] - **isSuperuser** | **Bool** | | [optional] - **membersByPk** | [**[Int]**](Int.md) | | [optional] - **membersByUsername** | [**[String]**](String.md) | Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only. | [optional] - **name** | **String** | | [optional] + **brandUuid** | **UUID** | | [optional] + **brandingFavicon** | **String** | | [optional] + **brandingLogo** | **String** | | [optional] + **brandingTitle** | **String** | | [optional] + **_default** | **Bool** | | [optional] + **domain** | **String** | | [optional] + **flowAuthentication** | **UUID** | | [optional] + **flowDeviceCode** | **UUID** | | [optional] + **flowInvalidation** | **UUID** | | [optional] + **flowRecovery** | **UUID** | | [optional] + **flowUnenrollment** | **UUID** | | [optional] + **flowUserSettings** | **UUID** | | [optional] **ordering** | **String** | Which field to use when ordering the results. | [optional] **page** | **Int** | A page number within the paginated result set. | [optional] **pageSize** | **Int** | Number of results to return per page. | [optional] **search** | **String** | A search term. | [optional] + **webCertificate** | **UUID** | | [optional] ### Return type -[**PaginatedGroupList**](PaginatedGroupList.md) +[**PaginatedBrandList**](PaginatedBrandList.md) ### Authorization @@ -1061,24 +1071,24 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreGroupsPartialUpdate** +# **coreBrandsPartialUpdate** ```swift - open class func coreGroupsPartialUpdate(groupUuid: UUID, patchedGroupRequest: PatchedGroupRequest? = nil, completion: @escaping (_ data: Group?, _ error: Error?) -> Void) + open class func coreBrandsPartialUpdate(brandUuid: UUID, patchedBrandRequest: PatchedBrandRequest? = nil, completion: @escaping (_ data: Brand?, _ error: Error?) -> Void) ``` -Group Viewset +Brand Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let groupUuid = 987 // UUID | A UUID string identifying this Group. -let patchedGroupRequest = PatchedGroupRequest(name: "name_example", isSuperuser: false, parent: 123, users: [123], attributes: "TODO", roles: [123]) // PatchedGroupRequest | (optional) +let brandUuid = 987 // UUID | A UUID string identifying this Brand. +let patchedBrandRequest = PatchedBrandRequest(domain: "domain_example", _default: false, brandingTitle: "brandingTitle_example", brandingLogo: "brandingLogo_example", brandingFavicon: "brandingFavicon_example", flowAuthentication: 123, flowInvalidation: 123, flowRecovery: 123, flowUnenrollment: 123, flowUserSettings: 123, flowDeviceCode: 123, webCertificate: 123, attributes: "TODO") // PatchedBrandRequest | (optional) -CoreAPI.coreGroupsPartialUpdate(groupUuid: groupUuid, patchedGroupRequest: patchedGroupRequest) { (response, error) in +CoreAPI.coreBrandsPartialUpdate(brandUuid: brandUuid, patchedBrandRequest: patchedBrandRequest) { (response, error) in guard error == nil else { print(error) return @@ -1094,12 +1104,12 @@ CoreAPI.coreGroupsPartialUpdate(groupUuid: groupUuid, patchedGroupRequest: patch Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **groupUuid** | **UUID** | A UUID string identifying this Group. | - **patchedGroupRequest** | [**PatchedGroupRequest**](PatchedGroupRequest.md) | | [optional] + **brandUuid** | **UUID** | A UUID string identifying this Brand. | + **patchedBrandRequest** | [**PatchedBrandRequest**](PatchedBrandRequest.md) | | [optional] ### Return type -[**Group**](Group.md) +[**Brand**](Brand.md) ### Authorization @@ -1112,24 +1122,23 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreGroupsRemoveUserCreate** +# **coreBrandsRetrieve** ```swift - open class func coreGroupsRemoveUserCreate(groupUuid: UUID, userAccountRequest: UserAccountRequest, completion: @escaping (_ data: Void?, _ error: Error?) -> Void) + open class func coreBrandsRetrieve(brandUuid: UUID, completion: @escaping (_ data: Brand?, _ error: Error?) -> Void) ``` -Add user to group +Brand Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let groupUuid = 987 // UUID | A UUID string identifying this Group. -let userAccountRequest = UserAccountRequest(pk: 123) // UserAccountRequest | +let brandUuid = 987 // UUID | A UUID string identifying this Brand. -CoreAPI.coreGroupsRemoveUserCreate(groupUuid: groupUuid, userAccountRequest: userAccountRequest) { (response, error) in +CoreAPI.coreBrandsRetrieve(brandUuid: brandUuid) { (response, error) in guard error == nil else { print(error) return @@ -1145,12 +1154,11 @@ CoreAPI.coreGroupsRemoveUserCreate(groupUuid: groupUuid, userAccountRequest: use Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **groupUuid** | **UUID** | A UUID string identifying this Group. | - **userAccountRequest** | [**UserAccountRequest**](UserAccountRequest.md) | | + **brandUuid** | **UUID** | A UUID string identifying this Brand. | ### Return type -Void (empty response body) +[**Brand**](Brand.md) ### Authorization @@ -1158,28 +1166,29 @@ Void (empty response body) ### HTTP request headers - - **Content-Type**: application/json + - **Content-Type**: Not defined - **Accept**: application/json [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreGroupsRetrieve** +# **coreBrandsUpdate** ```swift - open class func coreGroupsRetrieve(groupUuid: UUID, completion: @escaping (_ data: Group?, _ error: Error?) -> Void) + open class func coreBrandsUpdate(brandUuid: UUID, brandRequest: BrandRequest, completion: @escaping (_ data: Brand?, _ error: Error?) -> Void) ``` -Group Viewset +Brand Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let groupUuid = 987 // UUID | A UUID string identifying this Group. +let brandUuid = 987 // UUID | A UUID string identifying this Brand. +let brandRequest = BrandRequest(domain: "domain_example", _default: false, brandingTitle: "brandingTitle_example", brandingLogo: "brandingLogo_example", brandingFavicon: "brandingFavicon_example", flowAuthentication: 123, flowInvalidation: 123, flowRecovery: 123, flowUnenrollment: 123, flowUserSettings: 123, flowDeviceCode: 123, webCertificate: 123, attributes: "TODO") // BrandRequest | -CoreAPI.coreGroupsRetrieve(groupUuid: groupUuid) { (response, error) in +CoreAPI.coreBrandsUpdate(brandUuid: brandUuid, brandRequest: brandRequest) { (response, error) in guard error == nil else { print(error) return @@ -1195,11 +1204,12 @@ CoreAPI.coreGroupsRetrieve(groupUuid: groupUuid) { (response, error) in Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **groupUuid** | **UUID** | A UUID string identifying this Group. | + **brandUuid** | **UUID** | A UUID string identifying this Brand. | + **brandRequest** | [**BrandRequest**](BrandRequest.md) | | ### Return type -[**Group**](Group.md) +[**Brand**](Brand.md) ### Authorization @@ -1207,29 +1217,28 @@ Name | Type | Description | Notes ### HTTP request headers - - **Content-Type**: Not defined + - **Content-Type**: application/json - **Accept**: application/json [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreGroupsUpdate** +# **coreBrandsUsedByList** ```swift - open class func coreGroupsUpdate(groupUuid: UUID, groupRequest: GroupRequest, completion: @escaping (_ data: Group?, _ error: Error?) -> Void) + open class func coreBrandsUsedByList(brandUuid: UUID, completion: @escaping (_ data: [UsedBy]?, _ error: Error?) -> Void) ``` -Group Viewset +Get a list of all objects that use this object ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let groupUuid = 987 // UUID | A UUID string identifying this Group. -let groupRequest = GroupRequest(name: "name_example", isSuperuser: false, parent: 123, users: [123], attributes: "TODO", roles: [123]) // GroupRequest | +let brandUuid = 987 // UUID | A UUID string identifying this Brand. -CoreAPI.coreGroupsUpdate(groupUuid: groupUuid, groupRequest: groupRequest) { (response, error) in +CoreAPI.coreBrandsUsedByList(brandUuid: brandUuid) { (response, error) in guard error == nil else { print(error) return @@ -1245,12 +1254,11 @@ CoreAPI.coreGroupsUpdate(groupUuid: groupUuid, groupRequest: groupRequest) { (re Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **groupUuid** | **UUID** | A UUID string identifying this Group. | - **groupRequest** | [**GroupRequest**](GroupRequest.md) | | + **brandUuid** | **UUID** | A UUID string identifying this Brand. | ### Return type -[**Group**](Group.md) +[**[UsedBy]**](UsedBy.md) ### Authorization @@ -1258,19 +1266,19 @@ Name | Type | Description | Notes ### HTTP request headers - - **Content-Type**: application/json + - **Content-Type**: Not defined - **Accept**: application/json [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreGroupsUsedByList** +# **coreGroupsAddUserCreate** ```swift - open class func coreGroupsUsedByList(groupUuid: UUID, completion: @escaping (_ data: [UsedBy]?, _ error: Error?) -> Void) + open class func coreGroupsAddUserCreate(groupUuid: UUID, userAccountRequest: UserAccountRequest, completion: @escaping (_ data: Void?, _ error: Error?) -> Void) ``` -Get a list of all objects that use this object +Add user to group ### Example ```swift @@ -1278,8 +1286,9 @@ Get a list of all objects that use this object import authentikClient let groupUuid = 987 // UUID | A UUID string identifying this Group. +let userAccountRequest = UserAccountRequest(pk: 123) // UserAccountRequest | -CoreAPI.coreGroupsUsedByList(groupUuid: groupUuid) { (response, error) in +CoreAPI.coreGroupsAddUserCreate(groupUuid: groupUuid, userAccountRequest: userAccountRequest) { (response, error) in guard error == nil else { print(error) return @@ -1296,10 +1305,11 @@ CoreAPI.coreGroupsUsedByList(groupUuid: groupUuid) { (response, error) in Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **groupUuid** | **UUID** | A UUID string identifying this Group. | + **userAccountRequest** | [**UserAccountRequest**](UserAccountRequest.md) | | ### Return type -[**[UsedBy]**](UsedBy.md) +Void (empty response body) ### Authorization @@ -1307,28 +1317,28 @@ Name | Type | Description | Notes ### HTTP request headers - - **Content-Type**: Not defined + - **Content-Type**: application/json - **Accept**: application/json [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreTenantsCreate** +# **coreGroupsCreate** ```swift - open class func coreTenantsCreate(tenantRequest: TenantRequest, completion: @escaping (_ data: Tenant?, _ error: Error?) -> Void) + open class func coreGroupsCreate(groupRequest: GroupRequest, completion: @escaping (_ data: Group?, _ error: Error?) -> Void) ``` -Tenant Viewset +Group Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let tenantRequest = TenantRequest(domain: "domain_example", _default: false, brandingTitle: "brandingTitle_example", brandingLogo: "brandingLogo_example", brandingFavicon: "brandingFavicon_example", flowAuthentication: 123, flowInvalidation: 123, flowRecovery: 123, flowUnenrollment: 123, flowUserSettings: 123, flowDeviceCode: 123, eventRetention: "eventRetention_example", webCertificate: 123, attributes: "TODO") // TenantRequest | +let groupRequest = GroupRequest(name: "name_example", isSuperuser: false, parent: 123, users: [123], attributes: "TODO", roles: [123]) // GroupRequest | -CoreAPI.coreTenantsCreate(tenantRequest: tenantRequest) { (response, error) in +CoreAPI.coreGroupsCreate(groupRequest: groupRequest) { (response, error) in guard error == nil else { print(error) return @@ -1344,11 +1354,11 @@ CoreAPI.coreTenantsCreate(tenantRequest: tenantRequest) { (response, error) in Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tenantRequest** | [**TenantRequest**](TenantRequest.md) | | + **groupRequest** | [**GroupRequest**](GroupRequest.md) | | ### Return type -[**Tenant**](Tenant.md) +[**Group**](Group.md) ### Authorization @@ -1361,22 +1371,23 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreTenantsCurrentRetrieve** +# **coreGroupsDestroy** ```swift - open class func coreTenantsCurrentRetrieve(completion: @escaping (_ data: CurrentTenant?, _ error: Error?) -> Void) + open class func coreGroupsDestroy(groupUuid: UUID, completion: @escaping (_ data: Void?, _ error: Error?) -> Void) ``` -Get current tenant +Group Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient +let groupUuid = 987 // UUID | A UUID string identifying this Group. -CoreAPI.coreTenantsCurrentRetrieve() { (response, error) in +CoreAPI.coreGroupsDestroy(groupUuid: groupUuid) { (response, error) in guard error == nil else { print(error) return @@ -1389,11 +1400,14 @@ CoreAPI.coreTenantsCurrentRetrieve() { (response, error) in ``` ### Parameters -This endpoint does not need any parameter. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **groupUuid** | **UUID** | A UUID string identifying this Group. | ### Return type -[**CurrentTenant**](CurrentTenant.md) +Void (empty response body) ### Authorization @@ -1406,23 +1420,31 @@ This endpoint does not need any parameter. [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreTenantsDestroy** +# **coreGroupsList** ```swift - open class func coreTenantsDestroy(tenantUuid: UUID, completion: @escaping (_ data: Void?, _ error: Error?) -> Void) + open class func coreGroupsList(attributes: String? = nil, isSuperuser: Bool? = nil, membersByPk: [Int]? = nil, membersByUsername: [String]? = nil, name: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, completion: @escaping (_ data: PaginatedGroupList?, _ error: Error?) -> Void) ``` -Tenant Viewset +Group Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let tenantUuid = 987 // UUID | A UUID string identifying this Tenant. +let attributes = "attributes_example" // String | Attributes (optional) +let isSuperuser = true // Bool | (optional) +let membersByPk = [123] // [Int] | (optional) +let membersByUsername = ["inner_example"] // [String] | Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only. (optional) +let name = "name_example" // String | (optional) +let ordering = "ordering_example" // String | Which field to use when ordering the results. (optional) +let page = 987 // Int | A page number within the paginated result set. (optional) +let pageSize = 987 // Int | Number of results to return per page. (optional) +let search = "search_example" // String | A search term. (optional) -CoreAPI.coreTenantsDestroy(tenantUuid: tenantUuid) { (response, error) in +CoreAPI.coreGroupsList(attributes: attributes, isSuperuser: isSuperuser, membersByPk: membersByPk, membersByUsername: membersByUsername, name: name, ordering: ordering, page: page, pageSize: pageSize, search: search) { (response, error) in guard error == nil else { print(error) return @@ -1438,11 +1460,19 @@ CoreAPI.coreTenantsDestroy(tenantUuid: tenantUuid) { (response, error) in Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tenantUuid** | **UUID** | A UUID string identifying this Tenant. | + **attributes** | **String** | Attributes | [optional] + **isSuperuser** | **Bool** | | [optional] + **membersByPk** | [**[Int]**](Int.md) | | [optional] + **membersByUsername** | [**[String]**](String.md) | Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only. | [optional] + **name** | **String** | | [optional] + **ordering** | **String** | Which field to use when ordering the results. | [optional] + **page** | **Int** | A page number within the paginated result set. | [optional] + **pageSize** | **Int** | Number of results to return per page. | [optional] + **search** | **String** | A search term. | [optional] ### Return type -Void (empty response body) +[**PaginatedGroupList**](PaginatedGroupList.md) ### Authorization @@ -1455,40 +1485,24 @@ Void (empty response body) [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreTenantsList** +# **coreGroupsPartialUpdate** ```swift - open class func coreTenantsList(brandingFavicon: String? = nil, brandingLogo: String? = nil, brandingTitle: String? = nil, _default: Bool? = nil, domain: String? = nil, eventRetention: String? = nil, flowAuthentication: UUID? = nil, flowDeviceCode: UUID? = nil, flowInvalidation: UUID? = nil, flowRecovery: UUID? = nil, flowUnenrollment: UUID? = nil, flowUserSettings: UUID? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, tenantUuid: UUID? = nil, webCertificate: UUID? = nil, completion: @escaping (_ data: PaginatedTenantList?, _ error: Error?) -> Void) + open class func coreGroupsPartialUpdate(groupUuid: UUID, patchedGroupRequest: PatchedGroupRequest? = nil, completion: @escaping (_ data: Group?, _ error: Error?) -> Void) ``` -Tenant Viewset +Group Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let brandingFavicon = "brandingFavicon_example" // String | (optional) -let brandingLogo = "brandingLogo_example" // String | (optional) -let brandingTitle = "brandingTitle_example" // String | (optional) -let _default = true // Bool | (optional) -let domain = "domain_example" // String | (optional) -let eventRetention = "eventRetention_example" // String | (optional) -let flowAuthentication = 987 // UUID | (optional) -let flowDeviceCode = 987 // UUID | (optional) -let flowInvalidation = 987 // UUID | (optional) -let flowRecovery = 987 // UUID | (optional) -let flowUnenrollment = 987 // UUID | (optional) -let flowUserSettings = 987 // UUID | (optional) -let ordering = "ordering_example" // String | Which field to use when ordering the results. (optional) -let page = 987 // Int | A page number within the paginated result set. (optional) -let pageSize = 987 // Int | Number of results to return per page. (optional) -let search = "search_example" // String | A search term. (optional) -let tenantUuid = 987 // UUID | (optional) -let webCertificate = 987 // UUID | (optional) +let groupUuid = 987 // UUID | A UUID string identifying this Group. +let patchedGroupRequest = PatchedGroupRequest(name: "name_example", isSuperuser: false, parent: 123, users: [123], attributes: "TODO", roles: [123]) // PatchedGroupRequest | (optional) -CoreAPI.coreTenantsList(brandingFavicon: brandingFavicon, brandingLogo: brandingLogo, brandingTitle: brandingTitle, _default: _default, domain: domain, eventRetention: eventRetention, flowAuthentication: flowAuthentication, flowDeviceCode: flowDeviceCode, flowInvalidation: flowInvalidation, flowRecovery: flowRecovery, flowUnenrollment: flowUnenrollment, flowUserSettings: flowUserSettings, ordering: ordering, page: page, pageSize: pageSize, search: search, tenantUuid: tenantUuid, webCertificate: webCertificate) { (response, error) in +CoreAPI.coreGroupsPartialUpdate(groupUuid: groupUuid, patchedGroupRequest: patchedGroupRequest) { (response, error) in guard error == nil else { print(error) return @@ -1504,28 +1518,12 @@ CoreAPI.coreTenantsList(brandingFavicon: brandingFavicon, brandingLogo: branding Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **brandingFavicon** | **String** | | [optional] - **brandingLogo** | **String** | | [optional] - **brandingTitle** | **String** | | [optional] - **_default** | **Bool** | | [optional] - **domain** | **String** | | [optional] - **eventRetention** | **String** | | [optional] - **flowAuthentication** | **UUID** | | [optional] - **flowDeviceCode** | **UUID** | | [optional] - **flowInvalidation** | **UUID** | | [optional] - **flowRecovery** | **UUID** | | [optional] - **flowUnenrollment** | **UUID** | | [optional] - **flowUserSettings** | **UUID** | | [optional] - **ordering** | **String** | Which field to use when ordering the results. | [optional] - **page** | **Int** | A page number within the paginated result set. | [optional] - **pageSize** | **Int** | Number of results to return per page. | [optional] - **search** | **String** | A search term. | [optional] - **tenantUuid** | **UUID** | | [optional] - **webCertificate** | **UUID** | | [optional] + **groupUuid** | **UUID** | A UUID string identifying this Group. | + **patchedGroupRequest** | [**PatchedGroupRequest**](PatchedGroupRequest.md) | | [optional] ### Return type -[**PaginatedTenantList**](PaginatedTenantList.md) +[**Group**](Group.md) ### Authorization @@ -1533,29 +1531,29 @@ Name | Type | Description | Notes ### HTTP request headers - - **Content-Type**: Not defined + - **Content-Type**: application/json - **Accept**: application/json [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreTenantsPartialUpdate** +# **coreGroupsRemoveUserCreate** ```swift - open class func coreTenantsPartialUpdate(tenantUuid: UUID, patchedTenantRequest: PatchedTenantRequest? = nil, completion: @escaping (_ data: Tenant?, _ error: Error?) -> Void) + open class func coreGroupsRemoveUserCreate(groupUuid: UUID, userAccountRequest: UserAccountRequest, completion: @escaping (_ data: Void?, _ error: Error?) -> Void) ``` -Tenant Viewset +Add user to group ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let tenantUuid = 987 // UUID | A UUID string identifying this Tenant. -let patchedTenantRequest = PatchedTenantRequest(domain: "domain_example", _default: false, brandingTitle: "brandingTitle_example", brandingLogo: "brandingLogo_example", brandingFavicon: "brandingFavicon_example", flowAuthentication: 123, flowInvalidation: 123, flowRecovery: 123, flowUnenrollment: 123, flowUserSettings: 123, flowDeviceCode: 123, eventRetention: "eventRetention_example", webCertificate: 123, attributes: "TODO") // PatchedTenantRequest | (optional) +let groupUuid = 987 // UUID | A UUID string identifying this Group. +let userAccountRequest = UserAccountRequest(pk: 123) // UserAccountRequest | -CoreAPI.coreTenantsPartialUpdate(tenantUuid: tenantUuid, patchedTenantRequest: patchedTenantRequest) { (response, error) in +CoreAPI.coreGroupsRemoveUserCreate(groupUuid: groupUuid, userAccountRequest: userAccountRequest) { (response, error) in guard error == nil else { print(error) return @@ -1571,12 +1569,12 @@ CoreAPI.coreTenantsPartialUpdate(tenantUuid: tenantUuid, patchedTenantRequest: p Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tenantUuid** | **UUID** | A UUID string identifying this Tenant. | - **patchedTenantRequest** | [**PatchedTenantRequest**](PatchedTenantRequest.md) | | [optional] + **groupUuid** | **UUID** | A UUID string identifying this Group. | + **userAccountRequest** | [**UserAccountRequest**](UserAccountRequest.md) | | ### Return type -[**Tenant**](Tenant.md) +Void (empty response body) ### Authorization @@ -1589,23 +1587,23 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreTenantsRetrieve** +# **coreGroupsRetrieve** ```swift - open class func coreTenantsRetrieve(tenantUuid: UUID, completion: @escaping (_ data: Tenant?, _ error: Error?) -> Void) + open class func coreGroupsRetrieve(groupUuid: UUID, completion: @escaping (_ data: Group?, _ error: Error?) -> Void) ``` -Tenant Viewset +Group Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let tenantUuid = 987 // UUID | A UUID string identifying this Tenant. +let groupUuid = 987 // UUID | A UUID string identifying this Group. -CoreAPI.coreTenantsRetrieve(tenantUuid: tenantUuid) { (response, error) in +CoreAPI.coreGroupsRetrieve(groupUuid: groupUuid) { (response, error) in guard error == nil else { print(error) return @@ -1621,11 +1619,11 @@ CoreAPI.coreTenantsRetrieve(tenantUuid: tenantUuid) { (response, error) in Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tenantUuid** | **UUID** | A UUID string identifying this Tenant. | + **groupUuid** | **UUID** | A UUID string identifying this Group. | ### Return type -[**Tenant**](Tenant.md) +[**Group**](Group.md) ### Authorization @@ -1638,24 +1636,24 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreTenantsUpdate** +# **coreGroupsUpdate** ```swift - open class func coreTenantsUpdate(tenantUuid: UUID, tenantRequest: TenantRequest, completion: @escaping (_ data: Tenant?, _ error: Error?) -> Void) + open class func coreGroupsUpdate(groupUuid: UUID, groupRequest: GroupRequest, completion: @escaping (_ data: Group?, _ error: Error?) -> Void) ``` -Tenant Viewset +Group Viewset ### Example ```swift // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let tenantUuid = 987 // UUID | A UUID string identifying this Tenant. -let tenantRequest = TenantRequest(domain: "domain_example", _default: false, brandingTitle: "brandingTitle_example", brandingLogo: "brandingLogo_example", brandingFavicon: "brandingFavicon_example", flowAuthentication: 123, flowInvalidation: 123, flowRecovery: 123, flowUnenrollment: 123, flowUserSettings: 123, flowDeviceCode: 123, eventRetention: "eventRetention_example", webCertificate: 123, attributes: "TODO") // TenantRequest | +let groupUuid = 987 // UUID | A UUID string identifying this Group. +let groupRequest = GroupRequest(name: "name_example", isSuperuser: false, parent: 123, users: [123], attributes: "TODO", roles: [123]) // GroupRequest | -CoreAPI.coreTenantsUpdate(tenantUuid: tenantUuid, tenantRequest: tenantRequest) { (response, error) in +CoreAPI.coreGroupsUpdate(groupUuid: groupUuid, groupRequest: groupRequest) { (response, error) in guard error == nil else { print(error) return @@ -1671,12 +1669,12 @@ CoreAPI.coreTenantsUpdate(tenantUuid: tenantUuid, tenantRequest: tenantRequest) Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tenantUuid** | **UUID** | A UUID string identifying this Tenant. | - **tenantRequest** | [**TenantRequest**](TenantRequest.md) | | + **groupUuid** | **UUID** | A UUID string identifying this Group. | + **groupRequest** | [**GroupRequest**](GroupRequest.md) | | ### Return type -[**Tenant**](Tenant.md) +[**Group**](Group.md) ### Authorization @@ -1689,9 +1687,9 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) -# **coreTenantsUsedByList** +# **coreGroupsUsedByList** ```swift - open class func coreTenantsUsedByList(tenantUuid: UUID, completion: @escaping (_ data: [UsedBy]?, _ error: Error?) -> Void) + open class func coreGroupsUsedByList(groupUuid: UUID, completion: @escaping (_ data: [UsedBy]?, _ error: Error?) -> Void) ``` @@ -1703,9 +1701,9 @@ Get a list of all objects that use this object // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let tenantUuid = 987 // UUID | A UUID string identifying this Tenant. +let groupUuid = 987 // UUID | A UUID string identifying this Group. -CoreAPI.coreTenantsUsedByList(tenantUuid: tenantUuid) { (response, error) in +CoreAPI.coreGroupsUsedByList(groupUuid: groupUuid) { (response, error) in guard error == nil else { print(error) return @@ -1721,7 +1719,7 @@ CoreAPI.coreTenantsUsedByList(tenantUuid: tenantUuid) { (response, error) in Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **tenantUuid** | **UUID** | A UUID string identifying this Tenant. | + **groupUuid** | **UUID** | A UUID string identifying this Group. | ### Return type diff --git a/docs/CurrentTenant.md b/docs/CurrentBrand.md similarity index 98% rename from docs/CurrentTenant.md rename to docs/CurrentBrand.md index e661875..a83b6ca 100644 --- a/docs/CurrentTenant.md +++ b/docs/CurrentBrand.md @@ -1,4 +1,4 @@ -# CurrentTenant +# CurrentBrand ## Properties Name | Type | Description | Notes diff --git a/docs/Domain.md b/docs/Domain.md new file mode 100644 index 0000000..0f31e5a --- /dev/null +++ b/docs/Domain.md @@ -0,0 +1,13 @@ +# Domain + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**id** | **Int** | | [readonly] +**domain** | **String** | | +**isPrimary** | **Bool** | | [optional] +**tenant** | **UUID** | | + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/DomainRequest.md b/docs/DomainRequest.md new file mode 100644 index 0000000..916ba2d --- /dev/null +++ b/docs/DomainRequest.md @@ -0,0 +1,12 @@ +# DomainRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**domain** | **String** | | +**isPrimary** | **Bool** | | [optional] +**tenant** | **UUID** | | + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/Event.md b/docs/Event.md index f10a6e0..615ea97 100644 --- a/docs/Event.md +++ b/docs/Event.md @@ -11,7 +11,7 @@ Name | Type | Description | Notes **clientIp** | **String** | | [optional] **created** | **Date** | | [readonly] **expires** | **Date** | | [optional] -**tenant** | [**AnyCodable**](.md) | | [optional] +**brand** | [**AnyCodable**](.md) | | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/EventMatcherPolicy.md b/docs/EventMatcherPolicy.md index 345d6cc..e2ba627 100644 --- a/docs/EventMatcherPolicy.md +++ b/docs/EventMatcherPolicy.md @@ -13,8 +13,8 @@ Name | Type | Description | Notes **boundTo** | **Int** | Return objects policy is bound to | [readonly] **action** | [**EventActions**](EventActions.md) | Match created events with this action type. When left empty, all action types will be matched. * `login` - Login * `login_failed` - Login Failed * `logout` - Logout * `user_write` - User Write * `suspicious_request` - Suspicious Request * `password_set` - Password Set * `secret_view` - Secret View * `secret_rotate` - Secret Rotate * `invitation_used` - Invite Used * `authorize_application` - Authorize Application * `source_linked` - Source Linked * `impersonation_started` - Impersonation Started * `impersonation_ended` - Impersonation Ended * `flow_execution` - Flow Execution * `policy_execution` - Policy Execution * `policy_exception` - Policy Exception * `property_mapping_exception` - Property Mapping Exception * `system_task_execution` - System Task Execution * `system_task_exception` - System Task Exception * `system_exception` - System Exception * `configuration_error` - Configuration Error * `model_created` - Model Created * `model_updated` - Model Updated * `model_deleted` - Model Deleted * `email_sent` - Email Sent * `update_available` - Update Available * `custom_` - Custom Prefix | [optional] **clientIp** | **String** | Matches Event's Client IP (strict matching, for network matching use an Expression Policy) | [optional] -**app** | [**AppEnum**](AppEnum.md) | Match events created by selected application. When left empty, all applications are matched. * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.tenants` - authentik Tenants * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC | [optional] -**model** | [**ModelEnum**](ModelEnum.md) | Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [optional] +**app** | [**AppEnum**](AppEnum.md) | Match events created by selected application. When left empty, all applications are matched. * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC | [optional] +**model** | [**ModelEnum**](ModelEnum.md) | Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/EventMatcherPolicyRequest.md b/docs/EventMatcherPolicyRequest.md index d8438f0..2782418 100644 --- a/docs/EventMatcherPolicyRequest.md +++ b/docs/EventMatcherPolicyRequest.md @@ -7,8 +7,8 @@ Name | Type | Description | Notes **executionLogging** | **Bool** | When this option is enabled, all executions of this policy will be logged. By default, only execution errors are logged. | [optional] **action** | [**EventActions**](EventActions.md) | Match created events with this action type. When left empty, all action types will be matched. * `login` - Login * `login_failed` - Login Failed * `logout` - Logout * `user_write` - User Write * `suspicious_request` - Suspicious Request * `password_set` - Password Set * `secret_view` - Secret View * `secret_rotate` - Secret Rotate * `invitation_used` - Invite Used * `authorize_application` - Authorize Application * `source_linked` - Source Linked * `impersonation_started` - Impersonation Started * `impersonation_ended` - Impersonation Ended * `flow_execution` - Flow Execution * `policy_execution` - Policy Execution * `policy_exception` - Policy Exception * `property_mapping_exception` - Property Mapping Exception * `system_task_execution` - System Task Execution * `system_task_exception` - System Task Exception * `system_exception` - System Exception * `configuration_error` - Configuration Error * `model_created` - Model Created * `model_updated` - Model Updated * `model_deleted` - Model Deleted * `email_sent` - Email Sent * `update_available` - Update Available * `custom_` - Custom Prefix | [optional] **clientIp** | **String** | Matches Event's Client IP (strict matching, for network matching use an Expression Policy) | [optional] -**app** | [**AppEnum**](AppEnum.md) | Match events created by selected application. When left empty, all applications are matched. * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.tenants` - authentik Tenants * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC | [optional] -**model** | [**ModelEnum**](ModelEnum.md) | Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [optional] +**app** | [**AppEnum**](AppEnum.md) | Match events created by selected application. When left empty, all applications are matched. * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC | [optional] +**model** | [**ModelEnum**](ModelEnum.md) | Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/EventRequest.md b/docs/EventRequest.md index 3ffd20b..050f4eb 100644 --- a/docs/EventRequest.md +++ b/docs/EventRequest.md @@ -9,7 +9,7 @@ Name | Type | Description | Notes **context** | [**AnyCodable**](.md) | | [optional] **clientIp** | **String** | | [optional] **expires** | **Date** | | [optional] -**tenant** | [**AnyCodable**](.md) | | [optional] +**brand** | [**AnyCodable**](.md) | | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/EventsAPI.md b/docs/EventsAPI.md index 462af5c..8682c93 100644 --- a/docs/EventsAPI.md +++ b/docs/EventsAPI.md @@ -97,7 +97,7 @@ Event Read-Only Viewset // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let eventRequest = EventRequest(user: "TODO", action: EventActions(), app: "app_example", context: "TODO", clientIp: "clientIp_example", expires: Date(), tenant: "TODO") // EventRequest | +let eventRequest = EventRequest(user: "TODO", action: EventActions(), app: "app_example", context: "TODO", clientIp: "clientIp_example", expires: Date(), brand: "TODO") // EventRequest | EventsAPI.eventsEventsCreate(eventRequest: eventRequest) { (response, error) in guard error == nil else { @@ -183,7 +183,7 @@ Void (empty response body) # **eventsEventsList** ```swift - open class func eventsEventsList(action: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, tenantName: String? = nil, username: String? = nil, completion: @escaping (_ data: PaginatedEventList?, _ error: Error?) -> Void) + open class func eventsEventsList(action: String? = nil, brandName: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, username: String? = nil, completion: @escaping (_ data: PaginatedEventList?, _ error: Error?) -> Void) ``` @@ -196,6 +196,7 @@ Event Read-Only Viewset import authentikClient let action = "action_example" // String | (optional) +let brandName = "brandName_example" // String | Brand name (optional) let clientIp = "clientIp_example" // String | (optional) let contextAuthorizedApp = "contextAuthorizedApp_example" // String | Context Authorized application (optional) let contextModelApp = "contextModelApp_example" // String | Context Model App (optional) @@ -205,10 +206,9 @@ let ordering = "ordering_example" // String | Which field to use when ordering t let page = 987 // Int | A page number within the paginated result set. (optional) let pageSize = 987 // Int | Number of results to return per page. (optional) let search = "search_example" // String | A search term. (optional) -let tenantName = "tenantName_example" // String | Tenant name (optional) let username = "username_example" // String | Username (optional) -EventsAPI.eventsEventsList(action: action, clientIp: clientIp, contextAuthorizedApp: contextAuthorizedApp, contextModelApp: contextModelApp, contextModelName: contextModelName, contextModelPk: contextModelPk, ordering: ordering, page: page, pageSize: pageSize, search: search, tenantName: tenantName, username: username) { (response, error) in +EventsAPI.eventsEventsList(action: action, brandName: brandName, clientIp: clientIp, contextAuthorizedApp: contextAuthorizedApp, contextModelApp: contextModelApp, contextModelName: contextModelName, contextModelPk: contextModelPk, ordering: ordering, page: page, pageSize: pageSize, search: search, username: username) { (response, error) in guard error == nil else { print(error) return @@ -225,6 +225,7 @@ EventsAPI.eventsEventsList(action: action, clientIp: clientIp, contextAuthorized Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **action** | **String** | | [optional] + **brandName** | **String** | Brand name | [optional] **clientIp** | **String** | | [optional] **contextAuthorizedApp** | **String** | Context Authorized application | [optional] **contextModelApp** | **String** | Context Model App | [optional] @@ -234,7 +235,6 @@ Name | Type | Description | Notes **page** | **Int** | A page number within the paginated result set. | [optional] **pageSize** | **Int** | Number of results to return per page. | [optional] **search** | **String** | A search term. | [optional] - **tenantName** | **String** | Tenant name | [optional] **username** | **String** | Username | [optional] ### Return type @@ -267,7 +267,7 @@ Event Read-Only Viewset import authentikClient let eventUuid = 987 // UUID | A UUID string identifying this Event. -let patchedEventRequest = PatchedEventRequest(user: "TODO", action: EventActions(), app: "app_example", context: "TODO", clientIp: "clientIp_example", expires: Date(), tenant: "TODO") // PatchedEventRequest | (optional) +let patchedEventRequest = PatchedEventRequest(user: "TODO", action: EventActions(), app: "app_example", context: "TODO", clientIp: "clientIp_example", expires: Date(), brand: "TODO") // PatchedEventRequest | (optional) EventsAPI.eventsEventsPartialUpdate(eventUuid: eventUuid, patchedEventRequest: patchedEventRequest) { (response, error) in guard error == nil else { @@ -469,7 +469,7 @@ Event Read-Only Viewset import authentikClient let eventUuid = 987 // UUID | A UUID string identifying this Event. -let eventRequest = EventRequest(user: "TODO", action: EventActions(), app: "app_example", context: "TODO", clientIp: "clientIp_example", expires: Date(), tenant: "TODO") // EventRequest | +let eventRequest = EventRequest(user: "TODO", action: EventActions(), app: "app_example", context: "TODO", clientIp: "clientIp_example", expires: Date(), brand: "TODO") // EventRequest | EventsAPI.eventsEventsUpdate(eventUuid: eventUuid, eventRequest: eventRequest) { (response, error) in guard error == nil else { @@ -507,7 +507,7 @@ Name | Type | Description | Notes # **eventsEventsVolumeList** ```swift - open class func eventsEventsVolumeList(action: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, search: String? = nil, tenantName: String? = nil, username: String? = nil, completion: @escaping (_ data: [Coordinate]?, _ error: Error?) -> Void) + open class func eventsEventsVolumeList(action: String? = nil, brandName: String? = nil, clientIp: String? = nil, contextAuthorizedApp: String? = nil, contextModelApp: String? = nil, contextModelName: String? = nil, contextModelPk: String? = nil, ordering: String? = nil, search: String? = nil, username: String? = nil, completion: @escaping (_ data: [Coordinate]?, _ error: Error?) -> Void) ``` @@ -520,6 +520,7 @@ Get event volume for specified filters and timeframe import authentikClient let action = "action_example" // String | (optional) +let brandName = "brandName_example" // String | Brand name (optional) let clientIp = "clientIp_example" // String | (optional) let contextAuthorizedApp = "contextAuthorizedApp_example" // String | Context Authorized application (optional) let contextModelApp = "contextModelApp_example" // String | Context Model App (optional) @@ -527,10 +528,9 @@ let contextModelName = "contextModelName_example" // String | Context Model Name let contextModelPk = "contextModelPk_example" // String | Context Model Primary Key (optional) let ordering = "ordering_example" // String | Which field to use when ordering the results. (optional) let search = "search_example" // String | A search term. (optional) -let tenantName = "tenantName_example" // String | Tenant name (optional) let username = "username_example" // String | Username (optional) -EventsAPI.eventsEventsVolumeList(action: action, clientIp: clientIp, contextAuthorizedApp: contextAuthorizedApp, contextModelApp: contextModelApp, contextModelName: contextModelName, contextModelPk: contextModelPk, ordering: ordering, search: search, tenantName: tenantName, username: username) { (response, error) in +EventsAPI.eventsEventsVolumeList(action: action, brandName: brandName, clientIp: clientIp, contextAuthorizedApp: contextAuthorizedApp, contextModelApp: contextModelApp, contextModelName: contextModelName, contextModelPk: contextModelPk, ordering: ordering, search: search, username: username) { (response, error) in guard error == nil else { print(error) return @@ -547,6 +547,7 @@ EventsAPI.eventsEventsVolumeList(action: action, clientIp: clientIp, contextAuth Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **action** | **String** | | [optional] + **brandName** | **String** | Brand name | [optional] **clientIp** | **String** | | [optional] **contextAuthorizedApp** | **String** | Context Authorized application | [optional] **contextModelApp** | **String** | Context Model App | [optional] @@ -554,7 +555,6 @@ Name | Type | Description | Notes **contextModelPk** | **String** | Context Model Primary Key | [optional] **ordering** | **String** | Which field to use when ordering the results. | [optional] **search** | **String** | A search term. | [optional] - **tenantName** | **String** | Tenant name | [optional] **username** | **String** | Username | [optional] ### Return type @@ -748,7 +748,7 @@ Notification Viewset import authentikClient let uuid = 987 // UUID | A UUID string identifying this Notification. -let patchedNotificationRequest = PatchedNotificationRequest(event: EventRequest(user: "TODO", action: EventActions(), app: "app_example", context: "TODO", clientIp: "clientIp_example", expires: Date(), tenant: "TODO"), seen: false) // PatchedNotificationRequest | (optional) +let patchedNotificationRequest = PatchedNotificationRequest(event: EventRequest(user: "TODO", action: EventActions(), app: "app_example", context: "TODO", clientIp: "clientIp_example", expires: Date(), brand: "TODO"), seen: false) // PatchedNotificationRequest | (optional) EventsAPI.eventsNotificationsPartialUpdate(uuid: uuid, patchedNotificationRequest: patchedNotificationRequest) { (response, error) in guard error == nil else { @@ -848,7 +848,7 @@ Notification Viewset import authentikClient let uuid = 987 // UUID | A UUID string identifying this Notification. -let notificationRequest = NotificationRequest(event: EventRequest(user: "TODO", action: EventActions(), app: "app_example", context: "TODO", clientIp: "clientIp_example", expires: Date(), tenant: "TODO"), seen: false) // NotificationRequest | (optional) +let notificationRequest = NotificationRequest(event: EventRequest(user: "TODO", action: EventActions(), app: "app_example", context: "TODO", clientIp: "clientIp_example", expires: Date(), brand: "TODO"), seen: false) // NotificationRequest | (optional) EventsAPI.eventsNotificationsUpdate(uuid: uuid, notificationRequest: notificationRequest) { (response, error) in guard error == nil else { diff --git a/docs/PaginatedBrandList.md b/docs/PaginatedBrandList.md new file mode 100644 index 0000000..6eef95b --- /dev/null +++ b/docs/PaginatedBrandList.md @@ -0,0 +1,11 @@ +# PaginatedBrandList + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**pagination** | [**Pagination**](Pagination.md) | | +**results** | [Brand] | | + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PaginatedDomainList.md b/docs/PaginatedDomainList.md new file mode 100644 index 0000000..570ca33 --- /dev/null +++ b/docs/PaginatedDomainList.md @@ -0,0 +1,11 @@ +# PaginatedDomainList + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**pagination** | [**Pagination**](Pagination.md) | | +**results** | [Domain] | | + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PatchedBrandRequest.md b/docs/PatchedBrandRequest.md new file mode 100644 index 0000000..650accc --- /dev/null +++ b/docs/PatchedBrandRequest.md @@ -0,0 +1,22 @@ +# PatchedBrandRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**domain** | **String** | Domain that activates this brand. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` | [optional] +**_default** | **Bool** | | [optional] +**brandingTitle** | **String** | | [optional] +**brandingLogo** | **String** | | [optional] +**brandingFavicon** | **String** | | [optional] +**flowAuthentication** | **UUID** | | [optional] +**flowInvalidation** | **UUID** | | [optional] +**flowRecovery** | **UUID** | | [optional] +**flowUnenrollment** | **UUID** | | [optional] +**flowUserSettings** | **UUID** | | [optional] +**flowDeviceCode** | **UUID** | | [optional] +**webCertificate** | **UUID** | Web Certificate used by the authentik Core webserver. | [optional] +**attributes** | [**AnyCodable**](.md) | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PatchedDomainRequest.md b/docs/PatchedDomainRequest.md new file mode 100644 index 0000000..b4da7ce --- /dev/null +++ b/docs/PatchedDomainRequest.md @@ -0,0 +1,12 @@ +# PatchedDomainRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**domain** | **String** | | [optional] +**isPrimary** | **Bool** | | [optional] +**tenant** | **UUID** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PatchedEventMatcherPolicyRequest.md b/docs/PatchedEventMatcherPolicyRequest.md index 3d781f5..1655747 100644 --- a/docs/PatchedEventMatcherPolicyRequest.md +++ b/docs/PatchedEventMatcherPolicyRequest.md @@ -7,8 +7,8 @@ Name | Type | Description | Notes **executionLogging** | **Bool** | When this option is enabled, all executions of this policy will be logged. By default, only execution errors are logged. | [optional] **action** | [**EventActions**](EventActions.md) | Match created events with this action type. When left empty, all action types will be matched. * `login` - Login * `login_failed` - Login Failed * `logout` - Logout * `user_write` - User Write * `suspicious_request` - Suspicious Request * `password_set` - Password Set * `secret_view` - Secret View * `secret_rotate` - Secret Rotate * `invitation_used` - Invite Used * `authorize_application` - Authorize Application * `source_linked` - Source Linked * `impersonation_started` - Impersonation Started * `impersonation_ended` - Impersonation Ended * `flow_execution` - Flow Execution * `policy_execution` - Policy Execution * `policy_exception` - Policy Exception * `property_mapping_exception` - Property Mapping Exception * `system_task_execution` - System Task Execution * `system_task_exception` - System Task Exception * `system_exception` - System Exception * `configuration_error` - Configuration Error * `model_created` - Model Created * `model_updated` - Model Updated * `model_deleted` - Model Deleted * `email_sent` - Email Sent * `update_available` - Update Available * `custom_` - Custom Prefix | [optional] **clientIp** | **String** | Matches Event's Client IP (strict matching, for network matching use an Expression Policy) | [optional] -**app** | [**AppEnum**](AppEnum.md) | Match events created by selected application. When left empty, all applications are matched. * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.tenants` - authentik Tenants * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC | [optional] -**model** | [**ModelEnum**](ModelEnum.md) | Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [optional] +**app** | [**AppEnum**](AppEnum.md) | Match events created by selected application. When left empty, all applications are matched. * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC | [optional] +**model** | [**ModelEnum**](ModelEnum.md) | Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/PatchedEventRequest.md b/docs/PatchedEventRequest.md index 74702d1..e2e2c47 100644 --- a/docs/PatchedEventRequest.md +++ b/docs/PatchedEventRequest.md @@ -9,7 +9,7 @@ Name | Type | Description | Notes **context** | [**AnyCodable**](.md) | | [optional] **clientIp** | **String** | | [optional] **expires** | **Date** | | [optional] -**tenant** | [**AnyCodable**](.md) | | [optional] +**brand** | [**AnyCodable**](.md) | | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/PatchedSettingsRequest.md b/docs/PatchedSettingsRequest.md new file mode 100644 index 0000000..3757181 --- /dev/null +++ b/docs/PatchedSettingsRequest.md @@ -0,0 +1,17 @@ +# PatchedSettingsRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**avatars** | **String** | Configure how authentik should show avatars for users. | [optional] +**defaultUserChangeName** | **Bool** | Enable the ability for users to change their name. | [optional] +**defaultUserChangeEmail** | **Bool** | Enable the ability for users to change their email address. | [optional] +**defaultUserChangeUsername** | **Bool** | Enable the ability for users to change their username. | [optional] +**eventRetention** | **String** | Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). | [optional] +**footerLinks** | [**AnyCodable**](.md) | The option configures the footer links on the flow executor pages. | [optional] +**gdprCompliance** | **Bool** | When enabled, all the events caused by a user will be deleted upon the user's deletion. | [optional] +**impersonation** | **Bool** | Globally enable/disable impersonation. | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PatchedTenantRequest.md b/docs/PatchedTenantRequest.md index b6d9f69..fa93e2b 100644 --- a/docs/PatchedTenantRequest.md +++ b/docs/PatchedTenantRequest.md @@ -3,20 +3,9 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**domain** | **String** | Domain that activates this tenant. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` | [optional] -**_default** | **Bool** | | [optional] -**brandingTitle** | **String** | | [optional] -**brandingLogo** | **String** | | [optional] -**brandingFavicon** | **String** | | [optional] -**flowAuthentication** | **UUID** | | [optional] -**flowInvalidation** | **UUID** | | [optional] -**flowRecovery** | **UUID** | | [optional] -**flowUnenrollment** | **UUID** | | [optional] -**flowUserSettings** | **UUID** | | [optional] -**flowDeviceCode** | **UUID** | | [optional] -**eventRetention** | **String** | Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). | [optional] -**webCertificate** | **UUID** | Web Certificate used by the authentik Core webserver. | [optional] -**attributes** | [**AnyCodable**](.md) | | [optional] +**schemaName** | **String** | | [optional] +**name** | **String** | | [optional] +**ready** | **Bool** | | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/RbacAPI.md b/docs/RbacAPI.md index 5403885..769358d 100644 --- a/docs/RbacAPI.md +++ b/docs/RbacAPI.md @@ -88,7 +88,7 @@ Get assigned object permissions for a single object // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let model = "model_example" // String | * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping +let model = "model_example" // String | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping let objectPk = "objectPk_example" // String | (optional) let ordering = "ordering_example" // String | Which field to use when ordering the results. (optional) let page = 987 // Int | A page number within the paginated result set. (optional) @@ -111,7 +111,7 @@ RbacAPI.rbacPermissionsAssignedByRolesList(model: model, objectPk: objectPk, ord Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **model** | **String** | * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | + **model** | **String** | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | **objectPk** | **String** | | [optional] **ordering** | **String** | Which field to use when ordering the results. | [optional] **page** | **Int** | A page number within the paginated result set. | [optional] @@ -249,7 +249,7 @@ Get assigned object permissions for a single object // The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new import authentikClient -let model = "model_example" // String | * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping +let model = "model_example" // String | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping let objectPk = "objectPk_example" // String | (optional) let ordering = "ordering_example" // String | Which field to use when ordering the results. (optional) let page = 987 // Int | A page number within the paginated result set. (optional) @@ -272,7 +272,7 @@ RbacAPI.rbacPermissionsAssignedByUsersList(model: model, objectPk: objectPk, ord Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **model** | **String** | * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_tenants.tenant` - Tenant * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | + **model** | **String** | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | **objectPk** | **String** | | [optional] **ordering** | **String** | Which field to use when ordering the results. | [optional] **page** | **Int** | A page number within the paginated result set. | [optional] diff --git a/docs/Settings.md b/docs/Settings.md new file mode 100644 index 0000000..5a5b611 --- /dev/null +++ b/docs/Settings.md @@ -0,0 +1,17 @@ +# Settings + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**avatars** | **String** | Configure how authentik should show avatars for users. | [optional] +**defaultUserChangeName** | **Bool** | Enable the ability for users to change their name. | [optional] +**defaultUserChangeEmail** | **Bool** | Enable the ability for users to change their email address. | [optional] +**defaultUserChangeUsername** | **Bool** | Enable the ability for users to change their username. | [optional] +**eventRetention** | **String** | Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). | [optional] +**footerLinks** | [**AnyCodable**](.md) | The option configures the footer links on the flow executor pages. | [optional] +**gdprCompliance** | **Bool** | When enabled, all the events caused by a user will be deleted upon the user's deletion. | [optional] +**impersonation** | **Bool** | Globally enable/disable impersonation. | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/SettingsRequest.md b/docs/SettingsRequest.md new file mode 100644 index 0000000..022f843 --- /dev/null +++ b/docs/SettingsRequest.md @@ -0,0 +1,17 @@ +# SettingsRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**avatars** | **String** | Configure how authentik should show avatars for users. | [optional] +**defaultUserChangeName** | **Bool** | Enable the ability for users to change their name. | [optional] +**defaultUserChangeEmail** | **Bool** | Enable the ability for users to change their email address. | [optional] +**defaultUserChangeUsername** | **Bool** | Enable the ability for users to change their username. | [optional] +**eventRetention** | **String** | Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). | [optional] +**footerLinks** | [**AnyCodable**](.md) | The option configures the footer links on the flow executor pages. | [optional] +**gdprCompliance** | **Bool** | When enabled, all the events caused by a user will be deleted upon the user's deletion. | [optional] +**impersonation** | **Bool** | Globally enable/disable impersonation. | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/SystemInfo.md b/docs/SystemInfo.md index d8f2b31..b70aaf9 100644 --- a/docs/SystemInfo.md +++ b/docs/SystemInfo.md @@ -7,8 +7,9 @@ Name | Type | Description | Notes **httpHost** | **String** | Get HTTP host | [readonly] **httpIsSecure** | **Bool** | Get HTTP Secure flag | [readonly] **runtime** | [**SystemInfoRuntime**](SystemInfoRuntime.md) | | -**tenant** | **String** | Currently active tenant | [readonly] +**brand** | **String** | Currently active brand | [readonly] **serverTime** | **Date** | Current server time | [readonly] +**embeddedOutpostDisabled** | **Bool** | Whether the embedded outpost is disabled | [readonly] **embeddedOutpostHost** | **String** | Get the FQDN configured on the embedded outpost | [readonly] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/Tenant.md b/docs/Tenant.md index 504fce0..17c9836 100644 --- a/docs/Tenant.md +++ b/docs/Tenant.md @@ -4,20 +4,9 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **tenantUuid** | **UUID** | | [readonly] -**domain** | **String** | Domain that activates this tenant. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` | -**_default** | **Bool** | | [optional] -**brandingTitle** | **String** | | [optional] -**brandingLogo** | **String** | | [optional] -**brandingFavicon** | **String** | | [optional] -**flowAuthentication** | **UUID** | | [optional] -**flowInvalidation** | **UUID** | | [optional] -**flowRecovery** | **UUID** | | [optional] -**flowUnenrollment** | **UUID** | | [optional] -**flowUserSettings** | **UUID** | | [optional] -**flowDeviceCode** | **UUID** | | [optional] -**eventRetention** | **String** | Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). | [optional] -**webCertificate** | **UUID** | Web Certificate used by the authentik Core webserver. | [optional] -**attributes** | [**AnyCodable**](.md) | | [optional] +**schemaName** | **String** | | +**name** | **String** | | +**ready** | **Bool** | | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/TenantAdminGroupRequestRequest.md b/docs/TenantAdminGroupRequestRequest.md new file mode 100644 index 0000000..a0d7f4a --- /dev/null +++ b/docs/TenantAdminGroupRequestRequest.md @@ -0,0 +1,10 @@ +# TenantAdminGroupRequestRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**user** | **String** | | + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/TenantRecoveryKeyRequestRequest.md b/docs/TenantRecoveryKeyRequestRequest.md new file mode 100644 index 0000000..0a28d7b --- /dev/null +++ b/docs/TenantRecoveryKeyRequestRequest.md @@ -0,0 +1,11 @@ +# TenantRecoveryKeyRequestRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**user** | **String** | | +**durationDays** | **Int** | | + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/TenantRecoveryKeyResponse.md b/docs/TenantRecoveryKeyResponse.md new file mode 100644 index 0000000..4609473 --- /dev/null +++ b/docs/TenantRecoveryKeyResponse.md @@ -0,0 +1,11 @@ +# TenantRecoveryKeyResponse + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**expiry** | **Date** | | +**url** | **String** | | + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/TenantRequest.md b/docs/TenantRequest.md index c288629..2c2da17 100644 --- a/docs/TenantRequest.md +++ b/docs/TenantRequest.md @@ -3,20 +3,9 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**domain** | **String** | Domain that activates this tenant. Can be a superset, i.e. `a.b` for `aa.b` and `ba.b` | -**_default** | **Bool** | | [optional] -**brandingTitle** | **String** | | [optional] -**brandingLogo** | **String** | | [optional] -**brandingFavicon** | **String** | | [optional] -**flowAuthentication** | **UUID** | | [optional] -**flowInvalidation** | **UUID** | | [optional] -**flowRecovery** | **UUID** | | [optional] -**flowUnenrollment** | **UUID** | | [optional] -**flowUserSettings** | **UUID** | | [optional] -**flowDeviceCode** | **UUID** | | [optional] -**eventRetention** | **String** | Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2). | [optional] -**webCertificate** | **UUID** | Web Certificate used by the authentik Core webserver. | [optional] -**attributes** | [**AnyCodable**](.md) | | [optional] +**schemaName** | **String** | | +**name** | **String** | | +**ready** | **Bool** | | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/TenantsAPI.md b/docs/TenantsAPI.md new file mode 100644 index 0000000..f372d33 --- /dev/null +++ b/docs/TenantsAPI.md @@ -0,0 +1,732 @@ +# TenantsAPI + +All URIs are relative to *http://localhost/api/v3* + +Method | HTTP request | Description +------------- | ------------- | ------------- +[**tenantsDomainsCreate**](TenantsAPI.md#tenantsdomainscreate) | **POST** /tenants/domains/ | +[**tenantsDomainsDestroy**](TenantsAPI.md#tenantsdomainsdestroy) | **DELETE** /tenants/domains/{id}/ | +[**tenantsDomainsList**](TenantsAPI.md#tenantsdomainslist) | **GET** /tenants/domains/ | +[**tenantsDomainsPartialUpdate**](TenantsAPI.md#tenantsdomainspartialupdate) | **PATCH** /tenants/domains/{id}/ | +[**tenantsDomainsRetrieve**](TenantsAPI.md#tenantsdomainsretrieve) | **GET** /tenants/domains/{id}/ | +[**tenantsDomainsUpdate**](TenantsAPI.md#tenantsdomainsupdate) | **PUT** /tenants/domains/{id}/ | +[**tenantsTenantsCreate**](TenantsAPI.md#tenantstenantscreate) | **POST** /tenants/tenants/ | +[**tenantsTenantsCreateAdminGroupCreate**](TenantsAPI.md#tenantstenantscreateadmingroupcreate) | **POST** /tenants/tenants/{tenant_uuid}/create_admin_group/ | +[**tenantsTenantsCreateRecoveryKeyCreate**](TenantsAPI.md#tenantstenantscreaterecoverykeycreate) | **POST** /tenants/tenants/{tenant_uuid}/create_recovery_key/ | +[**tenantsTenantsDestroy**](TenantsAPI.md#tenantstenantsdestroy) | **DELETE** /tenants/tenants/{tenant_uuid}/ | +[**tenantsTenantsList**](TenantsAPI.md#tenantstenantslist) | **GET** /tenants/tenants/ | +[**tenantsTenantsPartialUpdate**](TenantsAPI.md#tenantstenantspartialupdate) | **PATCH** /tenants/tenants/{tenant_uuid}/ | +[**tenantsTenantsRetrieve**](TenantsAPI.md#tenantstenantsretrieve) | **GET** /tenants/tenants/{tenant_uuid}/ | +[**tenantsTenantsUpdate**](TenantsAPI.md#tenantstenantsupdate) | **PUT** /tenants/tenants/{tenant_uuid}/ | + + +# **tenantsDomainsCreate** +```swift + open class func tenantsDomainsCreate(domainRequest: DomainRequest, completion: @escaping (_ data: Domain?, _ error: Error?) -> Void) +``` + + + +Domain ViewSet + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let domainRequest = DomainRequest(domain: "domain_example", isPrimary: false, tenant: 123) // DomainRequest | + +TenantsAPI.tenantsDomainsCreate(domainRequest: domainRequest) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **domainRequest** | [**DomainRequest**](DomainRequest.md) | | + +### Return type + +[**Domain**](Domain.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsDomainsDestroy** +```swift + open class func tenantsDomainsDestroy(id: Int, completion: @escaping (_ data: Void?, _ error: Error?) -> Void) +``` + + + +Domain ViewSet + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let id = 987 // Int | A unique integer value identifying this Domain. + +TenantsAPI.tenantsDomainsDestroy(id: id) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **id** | **Int** | A unique integer value identifying this Domain. | + +### Return type + +Void (empty response body) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsDomainsList** +```swift + open class func tenantsDomainsList(ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, completion: @escaping (_ data: PaginatedDomainList?, _ error: Error?) -> Void) +``` + + + +Domain ViewSet + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let ordering = "ordering_example" // String | Which field to use when ordering the results. (optional) +let page = 987 // Int | A page number within the paginated result set. (optional) +let pageSize = 987 // Int | Number of results to return per page. (optional) +let search = "search_example" // String | A search term. (optional) + +TenantsAPI.tenantsDomainsList(ordering: ordering, page: page, pageSize: pageSize, search: search) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **ordering** | **String** | Which field to use when ordering the results. | [optional] + **page** | **Int** | A page number within the paginated result set. | [optional] + **pageSize** | **Int** | Number of results to return per page. | [optional] + **search** | **String** | A search term. | [optional] + +### Return type + +[**PaginatedDomainList**](PaginatedDomainList.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsDomainsPartialUpdate** +```swift + open class func tenantsDomainsPartialUpdate(id: Int, patchedDomainRequest: PatchedDomainRequest? = nil, completion: @escaping (_ data: Domain?, _ error: Error?) -> Void) +``` + + + +Domain ViewSet + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let id = 987 // Int | A unique integer value identifying this Domain. +let patchedDomainRequest = PatchedDomainRequest(domain: "domain_example", isPrimary: false, tenant: 123) // PatchedDomainRequest | (optional) + +TenantsAPI.tenantsDomainsPartialUpdate(id: id, patchedDomainRequest: patchedDomainRequest) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **id** | **Int** | A unique integer value identifying this Domain. | + **patchedDomainRequest** | [**PatchedDomainRequest**](PatchedDomainRequest.md) | | [optional] + +### Return type + +[**Domain**](Domain.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsDomainsRetrieve** +```swift + open class func tenantsDomainsRetrieve(id: Int, completion: @escaping (_ data: Domain?, _ error: Error?) -> Void) +``` + + + +Domain ViewSet + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let id = 987 // Int | A unique integer value identifying this Domain. + +TenantsAPI.tenantsDomainsRetrieve(id: id) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **id** | **Int** | A unique integer value identifying this Domain. | + +### Return type + +[**Domain**](Domain.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsDomainsUpdate** +```swift + open class func tenantsDomainsUpdate(id: Int, domainRequest: DomainRequest, completion: @escaping (_ data: Domain?, _ error: Error?) -> Void) +``` + + + +Domain ViewSet + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let id = 987 // Int | A unique integer value identifying this Domain. +let domainRequest = DomainRequest(domain: "domain_example", isPrimary: false, tenant: 123) // DomainRequest | + +TenantsAPI.tenantsDomainsUpdate(id: id, domainRequest: domainRequest) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **id** | **Int** | A unique integer value identifying this Domain. | + **domainRequest** | [**DomainRequest**](DomainRequest.md) | | + +### Return type + +[**Domain**](Domain.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsTenantsCreate** +```swift + open class func tenantsTenantsCreate(tenantRequest: TenantRequest, completion: @escaping (_ data: Tenant?, _ error: Error?) -> Void) +``` + + + +Tenant Viewset + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let tenantRequest = TenantRequest(schemaName: "schemaName_example", name: "name_example", ready: false) // TenantRequest | + +TenantsAPI.tenantsTenantsCreate(tenantRequest: tenantRequest) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **tenantRequest** | [**TenantRequest**](TenantRequest.md) | | + +### Return type + +[**Tenant**](Tenant.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsTenantsCreateAdminGroupCreate** +```swift + open class func tenantsTenantsCreateAdminGroupCreate(tenantUuid: UUID, tenantAdminGroupRequestRequest: TenantAdminGroupRequestRequest, completion: @escaping (_ data: Void?, _ error: Error?) -> Void) +``` + + + +Create admin group and add user to it. + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let tenantUuid = 987 // UUID | A UUID string identifying this Tenant. +let tenantAdminGroupRequestRequest = TenantAdminGroupRequestRequest(user: "user_example") // TenantAdminGroupRequestRequest | + +TenantsAPI.tenantsTenantsCreateAdminGroupCreate(tenantUuid: tenantUuid, tenantAdminGroupRequestRequest: tenantAdminGroupRequestRequest) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **tenantUuid** | **UUID** | A UUID string identifying this Tenant. | + **tenantAdminGroupRequestRequest** | [**TenantAdminGroupRequestRequest**](TenantAdminGroupRequestRequest.md) | | + +### Return type + +Void (empty response body) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsTenantsCreateRecoveryKeyCreate** +```swift + open class func tenantsTenantsCreateRecoveryKeyCreate(tenantUuid: UUID, tenantRecoveryKeyRequestRequest: TenantRecoveryKeyRequestRequest, completion: @escaping (_ data: TenantRecoveryKeyResponse?, _ error: Error?) -> Void) +``` + + + +Create recovery key for user. + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let tenantUuid = 987 // UUID | A UUID string identifying this Tenant. +let tenantRecoveryKeyRequestRequest = TenantRecoveryKeyRequestRequest(user: "user_example", durationDays: 123) // TenantRecoveryKeyRequestRequest | + +TenantsAPI.tenantsTenantsCreateRecoveryKeyCreate(tenantUuid: tenantUuid, tenantRecoveryKeyRequestRequest: tenantRecoveryKeyRequestRequest) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **tenantUuid** | **UUID** | A UUID string identifying this Tenant. | + **tenantRecoveryKeyRequestRequest** | [**TenantRecoveryKeyRequestRequest**](TenantRecoveryKeyRequestRequest.md) | | + +### Return type + +[**TenantRecoveryKeyResponse**](TenantRecoveryKeyResponse.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsTenantsDestroy** +```swift + open class func tenantsTenantsDestroy(tenantUuid: UUID, completion: @escaping (_ data: Void?, _ error: Error?) -> Void) +``` + + + +Tenant Viewset + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let tenantUuid = 987 // UUID | A UUID string identifying this Tenant. + +TenantsAPI.tenantsTenantsDestroy(tenantUuid: tenantUuid) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **tenantUuid** | **UUID** | A UUID string identifying this Tenant. | + +### Return type + +Void (empty response body) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsTenantsList** +```swift + open class func tenantsTenantsList(ordering: String? = nil, page: Int? = nil, pageSize: Int? = nil, search: String? = nil, completion: @escaping (_ data: PaginatedTenantList?, _ error: Error?) -> Void) +``` + + + +Tenant Viewset + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let ordering = "ordering_example" // String | Which field to use when ordering the results. (optional) +let page = 987 // Int | A page number within the paginated result set. (optional) +let pageSize = 987 // Int | Number of results to return per page. (optional) +let search = "search_example" // String | A search term. (optional) + +TenantsAPI.tenantsTenantsList(ordering: ordering, page: page, pageSize: pageSize, search: search) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **ordering** | **String** | Which field to use when ordering the results. | [optional] + **page** | **Int** | A page number within the paginated result set. | [optional] + **pageSize** | **Int** | Number of results to return per page. | [optional] + **search** | **String** | A search term. | [optional] + +### Return type + +[**PaginatedTenantList**](PaginatedTenantList.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsTenantsPartialUpdate** +```swift + open class func tenantsTenantsPartialUpdate(tenantUuid: UUID, patchedTenantRequest: PatchedTenantRequest? = nil, completion: @escaping (_ data: Tenant?, _ error: Error?) -> Void) +``` + + + +Tenant Viewset + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let tenantUuid = 987 // UUID | A UUID string identifying this Tenant. +let patchedTenantRequest = PatchedTenantRequest(schemaName: "schemaName_example", name: "name_example", ready: false) // PatchedTenantRequest | (optional) + +TenantsAPI.tenantsTenantsPartialUpdate(tenantUuid: tenantUuid, patchedTenantRequest: patchedTenantRequest) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **tenantUuid** | **UUID** | A UUID string identifying this Tenant. | + **patchedTenantRequest** | [**PatchedTenantRequest**](PatchedTenantRequest.md) | | [optional] + +### Return type + +[**Tenant**](Tenant.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsTenantsRetrieve** +```swift + open class func tenantsTenantsRetrieve(tenantUuid: UUID, completion: @escaping (_ data: Tenant?, _ error: Error?) -> Void) +``` + + + +Tenant Viewset + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let tenantUuid = 987 // UUID | A UUID string identifying this Tenant. + +TenantsAPI.tenantsTenantsRetrieve(tenantUuid: tenantUuid) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **tenantUuid** | **UUID** | A UUID string identifying this Tenant. | + +### Return type + +[**Tenant**](Tenant.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **tenantsTenantsUpdate** +```swift + open class func tenantsTenantsUpdate(tenantUuid: UUID, tenantRequest: TenantRequest, completion: @escaping (_ data: Tenant?, _ error: Error?) -> Void) +``` + + + +Tenant Viewset + +### Example +```swift +// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new +import authentikClient + +let tenantUuid = 987 // UUID | A UUID string identifying this Tenant. +let tenantRequest = TenantRequest(schemaName: "schemaName_example", name: "name_example", ready: false) // TenantRequest | + +TenantsAPI.tenantsTenantsUpdate(tenantUuid: tenantUuid, tenantRequest: tenantRequest) { (response, error) in + guard error == nil else { + print(error) + return + } + + if (response) { + dump(response) + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **tenantUuid** | **UUID** | A UUID string identifying this Tenant. | + **tenantRequest** | [**TenantRequest**](TenantRequest.md) | | + +### Return type + +[**Tenant**](Tenant.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + diff --git a/docs/UserSelf.md b/docs/UserSelf.md index 30440f3..932e9a0 100644 --- a/docs/UserSelf.md +++ b/docs/UserSelf.md @@ -12,7 +12,7 @@ Name | Type | Description | Notes **email** | **String** | | [optional] **avatar** | **String** | | [readonly] **uid** | **String** | | [readonly] -**settings** | [String: AnyCodable] | Get user settings with tenant and group settings applied | [readonly] +**settings** | [String: AnyCodable] | Get user settings with brand and group settings applied | [readonly] **type** | [**UserTypeEnum**](UserTypeEnum.md) | | [optional] **systemPermissions** | **[String]** | Get all system permissions assigned to the user | [readonly] diff --git a/schema.yml b/schema.yml index a838ce9..2394b86 100644 --- a/schema.yml +++ b/schema.yml @@ -94,6 +94,95 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' + /admin/settings/: + get: + operationId: admin_settings_retrieve + description: Settings view + tags: + - admin + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/Settings' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + put: + operationId: admin_settings_update + description: Settings view + tags: + - admin + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/SettingsRequest' + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/Settings' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + patch: + operationId: admin_settings_partial_update + description: Settings view + tags: + - admin + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/PatchedSettingsRequest' + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/Settings' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' /admin/system/: get: operationId: admin_system_retrieve @@ -3254,42 +3343,66 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /core/groups/: + /core/brands/: get: - operationId: core_groups_list - description: Group Viewset + operationId: core_brands_list + description: Brand Viewset parameters: - in: query - name: attributes + name: brand_uuid schema: type: string - description: Attributes + format: uuid - in: query - name: is_superuser + name: branding_favicon + schema: + type: string + - in: query + name: branding_logo + schema: + type: string + - in: query + name: branding_title + schema: + type: string + - in: query + name: default schema: type: boolean - in: query - name: members_by_pk + name: domain schema: - type: array - items: - type: integer - explode: true - style: form + type: string - in: query - name: members_by_username + name: flow_authentication schema: - type: array - items: - type: string - description: Required. 150 characters or fewer. Letters, digits and @/./+/-/_ - only. - explode: true - style: form + type: string + format: uuid - in: query - name: name + name: flow_device_code + schema: + type: string + format: uuid + - in: query + name: flow_invalidation + schema: + type: string + format: uuid + - in: query + name: flow_recovery + schema: + type: string + format: uuid + - in: query + name: flow_unenrollment + schema: + type: string + format: uuid + - in: query + name: flow_user_settings schema: type: string + format: uuid - name: ordering required: false in: query @@ -3314,6 +3427,11 @@ paths: description: A search term. schema: type: string + - in: query + name: web_certificate + schema: + type: string + format: uuid tags: - core security: @@ -3323,7 +3441,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedGroupList' + $ref: '#/components/schemas/PaginatedBrandList' description: '' '400': content: @@ -3338,15 +3456,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: core_groups_create - description: Group Viewset + operationId: core_brands_create + description: Brand Viewset tags: - core requestBody: content: application/json: schema: - $ref: '#/components/schemas/GroupRequest' + $ref: '#/components/schemas/BrandRequest' required: true security: - authentik: [] @@ -3355,7 +3473,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Group' + $ref: '#/components/schemas/Brand' description: '' '400': content: @@ -3369,17 +3487,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /core/groups/{group_uuid}/: + /core/brands/{brand_uuid}/: get: - operationId: core_groups_retrieve - description: Group Viewset + operationId: core_brands_retrieve + description: Brand Viewset parameters: - in: path - name: group_uuid + name: brand_uuid schema: type: string format: uuid - description: A UUID string identifying this Group. + description: A UUID string identifying this Brand. required: true tags: - core @@ -3390,7 +3508,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Group' + $ref: '#/components/schemas/Brand' description: '' '400': content: @@ -3405,15 +3523,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: core_groups_update - description: Group Viewset + operationId: core_brands_update + description: Brand Viewset parameters: - in: path - name: group_uuid + name: brand_uuid schema: type: string format: uuid - description: A UUID string identifying this Group. + description: A UUID string identifying this Brand. required: true tags: - core @@ -3421,7 +3539,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/GroupRequest' + $ref: '#/components/schemas/BrandRequest' required: true security: - authentik: [] @@ -3430,7 +3548,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Group' + $ref: '#/components/schemas/Brand' description: '' '400': content: @@ -3445,15 +3563,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: core_groups_partial_update - description: Group Viewset + operationId: core_brands_partial_update + description: Brand Viewset parameters: - in: path - name: group_uuid + name: brand_uuid schema: type: string format: uuid - description: A UUID string identifying this Group. + description: A UUID string identifying this Brand. required: true tags: - core @@ -3461,7 +3579,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedGroupRequest' + $ref: '#/components/schemas/PatchedBrandRequest' security: - authentik: [] responses: @@ -3469,7 +3587,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Group' + $ref: '#/components/schemas/Brand' description: '' '400': content: @@ -3484,15 +3602,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: core_groups_destroy - description: Group Viewset + operationId: core_brands_destroy + description: Brand Viewset parameters: - in: path - name: group_uuid + name: brand_uuid schema: type: string format: uuid - description: A UUID string identifying this Group. + description: A UUID string identifying this Brand. required: true tags: - core @@ -3513,72 +3631,31 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /core/groups/{group_uuid}/add_user/: - post: - operationId: core_groups_add_user_create - description: Add user to group + /core/brands/{brand_uuid}/used_by/: + get: + operationId: core_brands_used_by_list + description: Get a list of all objects that use this object parameters: - in: path - name: group_uuid + name: brand_uuid schema: type: string format: uuid - description: A UUID string identifying this Group. + description: A UUID string identifying this Brand. required: true tags: - core - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/UserAccountRequest' - required: true security: - authentik: [] responses: - '204': - description: User added - '404': - description: User not found - '400': - content: - application/json: - schema: - $ref: '#/components/schemas/ValidationError' - description: '' - '403': + '200': content: application/json: schema: - $ref: '#/components/schemas/GenericError' + type: array + items: + $ref: '#/components/schemas/UsedBy' description: '' - /core/groups/{group_uuid}/remove_user/: - post: - operationId: core_groups_remove_user_create - description: Add user to group - parameters: - - in: path - name: group_uuid - schema: - type: string - format: uuid - description: A UUID string identifying this Group. - required: true - tags: - - core - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/UserAccountRequest' - required: true - security: - - authentik: [] - responses: - '204': - description: User added - '404': - description: User not found '400': content: application/json: @@ -3591,30 +3668,21 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /core/groups/{group_uuid}/used_by/: + /core/brands/current/: get: - operationId: core_groups_used_by_list - description: Get a list of all objects that use this object - parameters: - - in: path - name: group_uuid - schema: - type: string - format: uuid - description: A UUID string identifying this Group. - required: true + operationId: core_brands_current_retrieve + description: Get current brand tags: - core security: - authentik: [] + - {} responses: '200': content: application/json: schema: - type: array - items: - $ref: '#/components/schemas/UsedBy' + $ref: '#/components/schemas/CurrentBrand' description: '' '400': content: @@ -3628,65 +3696,42 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /core/tenants/: + /core/groups/: get: - operationId: core_tenants_list - description: Tenant Viewset + operationId: core_groups_list + description: Group Viewset parameters: - in: query - name: branding_favicon - schema: - type: string - - in: query - name: branding_logo - schema: - type: string - - in: query - name: branding_title + name: attributes schema: type: string + description: Attributes - in: query - name: default + name: is_superuser schema: type: boolean - in: query - name: domain - schema: - type: string - - in: query - name: event_retention - schema: - type: string - - in: query - name: flow_authentication - schema: - type: string - format: uuid - - in: query - name: flow_device_code - schema: - type: string - format: uuid - - in: query - name: flow_invalidation - schema: - type: string - format: uuid - - in: query - name: flow_recovery + name: members_by_pk schema: - type: string - format: uuid + type: array + items: + type: integer + explode: true + style: form - in: query - name: flow_unenrollment + name: members_by_username schema: - type: string - format: uuid + type: array + items: + type: string + description: Required. 150 characters or fewer. Letters, digits and @/./+/-/_ + only. + explode: true + style: form - in: query - name: flow_user_settings + name: name schema: type: string - format: uuid - name: ordering required: false in: query @@ -3711,16 +3756,6 @@ paths: description: A search term. schema: type: string - - in: query - name: tenant_uuid - schema: - type: string - format: uuid - - in: query - name: web_certificate - schema: - type: string - format: uuid tags: - core security: @@ -3730,7 +3765,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedTenantList' + $ref: '#/components/schemas/PaginatedGroupList' description: '' '400': content: @@ -3745,15 +3780,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: core_tenants_create - description: Tenant Viewset + operationId: core_groups_create + description: Group Viewset tags: - core requestBody: content: application/json: schema: - $ref: '#/components/schemas/TenantRequest' + $ref: '#/components/schemas/GroupRequest' required: true security: - authentik: [] @@ -3762,7 +3797,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Tenant' + $ref: '#/components/schemas/Group' description: '' '400': content: @@ -3776,17 +3811,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /core/tenants/{tenant_uuid}/: + /core/groups/{group_uuid}/: get: - operationId: core_tenants_retrieve - description: Tenant Viewset + operationId: core_groups_retrieve + description: Group Viewset parameters: - in: path - name: tenant_uuid + name: group_uuid schema: type: string format: uuid - description: A UUID string identifying this Tenant. + description: A UUID string identifying this Group. required: true tags: - core @@ -3797,7 +3832,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Tenant' + $ref: '#/components/schemas/Group' description: '' '400': content: @@ -3812,15 +3847,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: core_tenants_update - description: Tenant Viewset + operationId: core_groups_update + description: Group Viewset parameters: - in: path - name: tenant_uuid + name: group_uuid schema: type: string format: uuid - description: A UUID string identifying this Tenant. + description: A UUID string identifying this Group. required: true tags: - core @@ -3828,7 +3863,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/TenantRequest' + $ref: '#/components/schemas/GroupRequest' required: true security: - authentik: [] @@ -3837,7 +3872,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Tenant' + $ref: '#/components/schemas/Group' description: '' '400': content: @@ -3852,15 +3887,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: core_tenants_partial_update - description: Tenant Viewset + operationId: core_groups_partial_update + description: Group Viewset parameters: - in: path - name: tenant_uuid + name: group_uuid schema: type: string format: uuid - description: A UUID string identifying this Tenant. + description: A UUID string identifying this Group. required: true tags: - core @@ -3868,7 +3903,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedTenantRequest' + $ref: '#/components/schemas/PatchedGroupRequest' security: - authentik: [] responses: @@ -3876,7 +3911,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Tenant' + $ref: '#/components/schemas/Group' description: '' '400': content: @@ -3891,15 +3926,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: core_tenants_destroy - description: Tenant Viewset + operationId: core_groups_destroy + description: Group Viewset parameters: - in: path - name: tenant_uuid + name: group_uuid schema: type: string format: uuid - description: A UUID string identifying this Tenant. + description: A UUID string identifying this Group. required: true tags: - core @@ -3920,31 +3955,72 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /core/tenants/{tenant_uuid}/used_by/: - get: - operationId: core_tenants_used_by_list - description: Get a list of all objects that use this object + /core/groups/{group_uuid}/add_user/: + post: + operationId: core_groups_add_user_create + description: Add user to group parameters: - in: path - name: tenant_uuid + name: group_uuid schema: type: string format: uuid - description: A UUID string identifying this Tenant. + description: A UUID string identifying this Group. required: true tags: - core + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/UserAccountRequest' + required: true security: - authentik: [] responses: - '200': + '204': + description: User added + '404': + description: User not found + '400': content: application/json: schema: - type: array - items: - $ref: '#/components/schemas/UsedBy' + $ref: '#/components/schemas/ValidationError' description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /core/groups/{group_uuid}/remove_user/: + post: + operationId: core_groups_remove_user_create + description: Add user to group + parameters: + - in: path + name: group_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Group. + required: true + tags: + - core + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/UserAccountRequest' + required: true + security: + - authentik: [] + responses: + '204': + description: User added + '404': + description: User not found '400': content: application/json: @@ -3957,21 +4033,30 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /core/tenants/current/: + /core/groups/{group_uuid}/used_by/: get: - operationId: core_tenants_current_retrieve - description: Get current tenant + operationId: core_groups_used_by_list + description: Get a list of all objects that use this object + parameters: + - in: path + name: group_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Group. + required: true tags: - core security: - authentik: [] - - {} responses: '200': content: application/json: schema: - $ref: '#/components/schemas/CurrentTenant' + type: array + items: + $ref: '#/components/schemas/UsedBy' description: '' '400': content: @@ -5914,6 +5999,11 @@ paths: name: action schema: type: string + - in: query + name: brand_name + schema: + type: string + description: Brand name - in: query name: client_ip schema: @@ -5962,11 +6052,6 @@ paths: description: A search term. schema: type: string - - in: query - name: tenant_name - schema: - type: string - description: Tenant name - in: query name: username schema: @@ -6285,6 +6370,11 @@ paths: name: action schema: type: string + - in: query + name: brand_name + schema: + type: string + description: Brand name - in: query name: client_ip schema: @@ -6321,11 +6411,6 @@ paths: description: A search term. schema: type: string - - in: query - name: tenant_name - schema: - type: string - description: Tenant name - in: query name: username schema: @@ -18064,6 +18149,7 @@ paths: type: string enum: - authentik_blueprints.blueprintinstance + - authentik_brands.brand - authentik_core.application - authentik_core.group - authentik_core.token @@ -18139,8 +18225,9 @@ paths: - authentik_stages_user_login.userloginstage - authentik_stages_user_logout.userlogoutstage - authentik_stages_user_write.userwritestage - - authentik_tenants.tenant + - authentik_tenants.domain description: |- + * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport @@ -18208,7 +18295,7 @@ paths: * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage - * `authentik_tenants.tenant` - Tenant + * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User @@ -18358,6 +18445,7 @@ paths: type: string enum: - authentik_blueprints.blueprintinstance + - authentik_brands.brand - authentik_core.application - authentik_core.group - authentik_core.token @@ -18433,8 +18521,9 @@ paths: - authentik_stages_user_login.userloginstage - authentik_stages_user_logout.userlogoutstage - authentik_stages_user_write.userwritestage - - authentik_tenants.tenant + - authentik_tenants.domain description: |- + * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport @@ -18502,7 +18591,7 @@ paths: * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage - * `authentik_tenants.tenant` - Tenant + * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User @@ -23413,7 +23502,615 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedAuthenticatorTOTPStageList' + $ref: '#/components/schemas/PaginatedAuthenticatorTOTPStageList' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + post: + operationId: stages_authenticator_totp_create + description: AuthenticatorTOTPStage Viewset + tags: + - stages + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorTOTPStageRequest' + required: true + security: + - authentik: [] + responses: + '201': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorTOTPStage' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/authenticator/totp/{stage_uuid}/: + get: + operationId: stages_authenticator_totp_retrieve + description: AuthenticatorTOTPStage Viewset + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this TOTP Authenticator Setup Stage. + required: true + tags: + - stages + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorTOTPStage' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + put: + operationId: stages_authenticator_totp_update + description: AuthenticatorTOTPStage Viewset + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this TOTP Authenticator Setup Stage. + required: true + tags: + - stages + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorTOTPStageRequest' + required: true + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorTOTPStage' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + patch: + operationId: stages_authenticator_totp_partial_update + description: AuthenticatorTOTPStage Viewset + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this TOTP Authenticator Setup Stage. + required: true + tags: + - stages + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/PatchedAuthenticatorTOTPStageRequest' + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorTOTPStage' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + delete: + operationId: stages_authenticator_totp_destroy + description: AuthenticatorTOTPStage Viewset + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this TOTP Authenticator Setup Stage. + required: true + tags: + - stages + security: + - authentik: [] + responses: + '204': + description: No response body + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/authenticator/totp/{stage_uuid}/used_by/: + get: + operationId: stages_authenticator_totp_used_by_list + description: Get a list of all objects that use this object + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this TOTP Authenticator Setup Stage. + required: true + tags: + - stages + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + type: array + items: + $ref: '#/components/schemas/UsedBy' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/authenticator/validate/: + get: + operationId: stages_authenticator_validate_list + description: AuthenticatorValidateStage Viewset + parameters: + - in: query + name: configuration_stages + schema: + type: array + items: + type: string + format: uuid + explode: true + style: form + - in: query + name: name + schema: + type: string + - in: query + name: not_configured_action + schema: + type: string + enum: + - configure + - deny + - skip + description: |- + * `skip` - Skip + * `deny` - Deny + * `configure` - Configure + - name: ordering + required: false + in: query + description: Which field to use when ordering the results. + schema: + type: string + - name: page + required: false + in: query + description: A page number within the paginated result set. + schema: + type: integer + - name: page_size + required: false + in: query + description: Number of results to return per page. + schema: + type: integer + - name: search + required: false + in: query + description: A search term. + schema: + type: string + tags: + - stages + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/PaginatedAuthenticatorValidateStageList' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + post: + operationId: stages_authenticator_validate_create + description: AuthenticatorValidateStage Viewset + tags: + - stages + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorValidateStageRequest' + required: true + security: + - authentik: [] + responses: + '201': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorValidateStage' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/authenticator/validate/{stage_uuid}/: + get: + operationId: stages_authenticator_validate_retrieve + description: AuthenticatorValidateStage Viewset + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Authenticator Validation Stage. + required: true + tags: + - stages + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorValidateStage' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + put: + operationId: stages_authenticator_validate_update + description: AuthenticatorValidateStage Viewset + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Authenticator Validation Stage. + required: true + tags: + - stages + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorValidateStageRequest' + required: true + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorValidateStage' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + patch: + operationId: stages_authenticator_validate_partial_update + description: AuthenticatorValidateStage Viewset + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Authenticator Validation Stage. + required: true + tags: + - stages + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/PatchedAuthenticatorValidateStageRequest' + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorValidateStage' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + delete: + operationId: stages_authenticator_validate_destroy + description: AuthenticatorValidateStage Viewset + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Authenticator Validation Stage. + required: true + tags: + - stages + security: + - authentik: [] + responses: + '204': + description: No response body + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/authenticator/validate/{stage_uuid}/used_by/: + get: + operationId: stages_authenticator_validate_used_by_list + description: Get a list of all objects that use this object + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Authenticator Validation Stage. + required: true + tags: + - stages + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + type: array + items: + $ref: '#/components/schemas/UsedBy' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/authenticator/webauthn/: + get: + operationId: stages_authenticator_webauthn_list + description: AuthenticateWebAuthnStage Viewset + parameters: + - in: query + name: authenticator_attachment + schema: + type: string + nullable: true + enum: + - cross-platform + - platform + description: |- + * `platform` - Platform + * `cross-platform` - Cross Platform + - in: query + name: configure_flow + schema: + type: string + format: uuid + - in: query + name: friendly_name + schema: + type: string + - in: query + name: name + schema: + type: string + - name: ordering + required: false + in: query + description: Which field to use when ordering the results. + schema: + type: string + - name: page + required: false + in: query + description: A page number within the paginated result set. + schema: + type: integer + - name: page_size + required: false + in: query + description: Number of results to return per page. + schema: + type: integer + - in: query + name: resident_key_requirement + schema: + type: string + enum: + - discouraged + - preferred + - required + description: |- + * `discouraged` - Discouraged + * `preferred` - Preferred + * `required` - Required + - name: search + required: false + in: query + description: A search term. + schema: + type: string + - in: query + name: stage_uuid + schema: + type: string + format: uuid + - in: query + name: user_verification + schema: + type: string + enum: + - discouraged + - preferred + - required + description: |- + * `required` - Required + * `preferred` - Preferred + * `discouraged` - Discouraged + tags: + - stages + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/PaginatedAuthenticateWebAuthnStageList' description: '' '400': content: @@ -23428,15 +24125,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_authenticator_totp_create - description: AuthenticatorTOTPStage Viewset + operationId: stages_authenticator_webauthn_create + description: AuthenticateWebAuthnStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorTOTPStageRequest' + $ref: '#/components/schemas/AuthenticateWebAuthnStageRequest' required: true security: - authentik: [] @@ -23445,7 +24142,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorTOTPStage' + $ref: '#/components/schemas/AuthenticateWebAuthnStage' description: '' '400': content: @@ -23459,17 +24156,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/totp/{stage_uuid}/: + /stages/authenticator/webauthn/{stage_uuid}/: get: - operationId: stages_authenticator_totp_retrieve - description: AuthenticatorTOTPStage Viewset + operationId: stages_authenticator_webauthn_retrieve + description: AuthenticateWebAuthnStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this TOTP Authenticator Setup Stage. + description: A UUID string identifying this WebAuthn Authenticator Setup Stage. required: true tags: - stages @@ -23480,7 +24177,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorTOTPStage' + $ref: '#/components/schemas/AuthenticateWebAuthnStage' description: '' '400': content: @@ -23495,15 +24192,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_authenticator_totp_update - description: AuthenticatorTOTPStage Viewset + operationId: stages_authenticator_webauthn_update + description: AuthenticateWebAuthnStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this TOTP Authenticator Setup Stage. + description: A UUID string identifying this WebAuthn Authenticator Setup Stage. required: true tags: - stages @@ -23511,7 +24208,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorTOTPStageRequest' + $ref: '#/components/schemas/AuthenticateWebAuthnStageRequest' required: true security: - authentik: [] @@ -23520,7 +24217,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorTOTPStage' + $ref: '#/components/schemas/AuthenticateWebAuthnStage' description: '' '400': content: @@ -23535,15 +24232,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_authenticator_totp_partial_update - description: AuthenticatorTOTPStage Viewset + operationId: stages_authenticator_webauthn_partial_update + description: AuthenticateWebAuthnStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this TOTP Authenticator Setup Stage. + description: A UUID string identifying this WebAuthn Authenticator Setup Stage. required: true tags: - stages @@ -23551,7 +24248,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedAuthenticatorTOTPStageRequest' + $ref: '#/components/schemas/PatchedAuthenticateWebAuthnStageRequest' security: - authentik: [] responses: @@ -23559,7 +24256,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorTOTPStage' + $ref: '#/components/schemas/AuthenticateWebAuthnStage' description: '' '400': content: @@ -23574,15 +24271,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_authenticator_totp_destroy - description: AuthenticatorTOTPStage Viewset + operationId: stages_authenticator_webauthn_destroy + description: AuthenticateWebAuthnStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this TOTP Authenticator Setup Stage. + description: A UUID string identifying this WebAuthn Authenticator Setup Stage. required: true tags: - stages @@ -23603,9 +24300,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/totp/{stage_uuid}/used_by/: + /stages/authenticator/webauthn/{stage_uuid}/used_by/: get: - operationId: stages_authenticator_totp_used_by_list + operationId: stages_authenticator_webauthn_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -23613,7 +24310,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this TOTP Authenticator Setup Stage. + description: A UUID string identifying this WebAuthn Authenticator Setup Stage. required: true tags: - stages @@ -23640,36 +24337,15 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/validate/: + /stages/captcha/: get: - operationId: stages_authenticator_validate_list - description: AuthenticatorValidateStage Viewset + operationId: stages_captcha_list + description: CaptchaStage Viewset parameters: - - in: query - name: configuration_stages - schema: - type: array - items: - type: string - format: uuid - explode: true - style: form - in: query name: name schema: type: string - - in: query - name: not_configured_action - schema: - type: string - enum: - - configure - - deny - - skip - description: |- - * `skip` - Skip - * `deny` - Deny - * `configure` - Configure - name: ordering required: false in: query @@ -23688,6 +24364,10 @@ paths: description: Number of results to return per page. schema: type: integer + - in: query + name: public_key + schema: + type: string - name: search required: false in: query @@ -23703,7 +24383,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedAuthenticatorValidateStageList' + $ref: '#/components/schemas/PaginatedCaptchaStageList' description: '' '400': content: @@ -23718,15 +24398,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_authenticator_validate_create - description: AuthenticatorValidateStage Viewset + operationId: stages_captcha_create + description: CaptchaStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorValidateStageRequest' + $ref: '#/components/schemas/CaptchaStageRequest' required: true security: - authentik: [] @@ -23735,7 +24415,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorValidateStage' + $ref: '#/components/schemas/CaptchaStage' description: '' '400': content: @@ -23749,17 +24429,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/validate/{stage_uuid}/: + /stages/captcha/{stage_uuid}/: get: - operationId: stages_authenticator_validate_retrieve - description: AuthenticatorValidateStage Viewset + operationId: stages_captcha_retrieve + description: CaptchaStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Authenticator Validation Stage. + description: A UUID string identifying this Captcha Stage. required: true tags: - stages @@ -23770,7 +24450,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorValidateStage' + $ref: '#/components/schemas/CaptchaStage' description: '' '400': content: @@ -23785,15 +24465,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_authenticator_validate_update - description: AuthenticatorValidateStage Viewset + operationId: stages_captcha_update + description: CaptchaStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Authenticator Validation Stage. + description: A UUID string identifying this Captcha Stage. required: true tags: - stages @@ -23801,7 +24481,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorValidateStageRequest' + $ref: '#/components/schemas/CaptchaStageRequest' required: true security: - authentik: [] @@ -23810,7 +24490,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorValidateStage' + $ref: '#/components/schemas/CaptchaStage' description: '' '400': content: @@ -23825,15 +24505,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_authenticator_validate_partial_update - description: AuthenticatorValidateStage Viewset + operationId: stages_captcha_partial_update + description: CaptchaStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Authenticator Validation Stage. + description: A UUID string identifying this Captcha Stage. required: true tags: - stages @@ -23841,7 +24521,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedAuthenticatorValidateStageRequest' + $ref: '#/components/schemas/PatchedCaptchaStageRequest' security: - authentik: [] responses: @@ -23849,7 +24529,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorValidateStage' + $ref: '#/components/schemas/CaptchaStage' description: '' '400': content: @@ -23864,15 +24544,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_authenticator_validate_destroy - description: AuthenticatorValidateStage Viewset + operationId: stages_captcha_destroy + description: CaptchaStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Authenticator Validation Stage. + description: A UUID string identifying this Captcha Stage. required: true tags: - stages @@ -23893,9 +24573,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/validate/{stage_uuid}/used_by/: + /stages/captcha/{stage_uuid}/used_by/: get: - operationId: stages_authenticator_validate_used_by_list + operationId: stages_captcha_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -23903,7 +24583,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Authenticator Validation Stage. + description: A UUID string identifying this Captcha Stage. required: true tags: - stages @@ -23930,31 +24610,27 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/webauthn/: + /stages/consent/: get: - operationId: stages_authenticator_webauthn_list - description: AuthenticateWebAuthnStage Viewset + operationId: stages_consent_list + description: ConsentStage Viewset parameters: - in: query - name: authenticator_attachment - schema: - type: string - nullable: true - enum: - - cross-platform - - platform - description: |- - * `platform` - Platform - * `cross-platform` - Cross Platform - - in: query - name: configure_flow + name: consent_expire_in schema: type: string - format: uuid - in: query - name: friendly_name + name: mode schema: type: string + enum: + - always_require + - expiring + - permanent + description: |- + * `always_require` - Always Require + * `permanent` - Permanent + * `expiring` - Expiring - in: query name: name schema: @@ -23977,18 +24653,6 @@ paths: description: Number of results to return per page. schema: type: integer - - in: query - name: resident_key_requirement - schema: - type: string - enum: - - discouraged - - preferred - - required - description: |- - * `discouraged` - Discouraged - * `preferred` - Preferred - * `required` - Required - name: search required: false in: query @@ -24000,18 +24664,6 @@ paths: schema: type: string format: uuid - - in: query - name: user_verification - schema: - type: string - enum: - - discouraged - - preferred - - required - description: |- - * `required` - Required - * `preferred` - Preferred - * `discouraged` - Discouraged tags: - stages security: @@ -24021,7 +24673,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedAuthenticateWebAuthnStageList' + $ref: '#/components/schemas/PaginatedConsentStageList' description: '' '400': content: @@ -24036,15 +24688,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_authenticator_webauthn_create - description: AuthenticateWebAuthnStage Viewset + operationId: stages_consent_create + description: ConsentStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/AuthenticateWebAuthnStageRequest' + $ref: '#/components/schemas/ConsentStageRequest' required: true security: - authentik: [] @@ -24053,7 +24705,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticateWebAuthnStage' + $ref: '#/components/schemas/ConsentStage' description: '' '400': content: @@ -24067,17 +24719,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/webauthn/{stage_uuid}/: + /stages/consent/{stage_uuid}/: get: - operationId: stages_authenticator_webauthn_retrieve - description: AuthenticateWebAuthnStage Viewset + operationId: stages_consent_retrieve + description: ConsentStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this WebAuthn Authenticator Setup Stage. + description: A UUID string identifying this Consent Stage. required: true tags: - stages @@ -24088,7 +24740,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticateWebAuthnStage' + $ref: '#/components/schemas/ConsentStage' description: '' '400': content: @@ -24103,15 +24755,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_authenticator_webauthn_update - description: AuthenticateWebAuthnStage Viewset + operationId: stages_consent_update + description: ConsentStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this WebAuthn Authenticator Setup Stage. + description: A UUID string identifying this Consent Stage. required: true tags: - stages @@ -24119,7 +24771,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticateWebAuthnStageRequest' + $ref: '#/components/schemas/ConsentStageRequest' required: true security: - authentik: [] @@ -24128,7 +24780,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticateWebAuthnStage' + $ref: '#/components/schemas/ConsentStage' description: '' '400': content: @@ -24143,15 +24795,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_authenticator_webauthn_partial_update - description: AuthenticateWebAuthnStage Viewset + operationId: stages_consent_partial_update + description: ConsentStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this WebAuthn Authenticator Setup Stage. + description: A UUID string identifying this Consent Stage. required: true tags: - stages @@ -24159,7 +24811,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedAuthenticateWebAuthnStageRequest' + $ref: '#/components/schemas/PatchedConsentStageRequest' security: - authentik: [] responses: @@ -24167,7 +24819,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticateWebAuthnStage' + $ref: '#/components/schemas/ConsentStage' description: '' '400': content: @@ -24182,15 +24834,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_authenticator_webauthn_destroy - description: AuthenticateWebAuthnStage Viewset + operationId: stages_consent_destroy + description: ConsentStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this WebAuthn Authenticator Setup Stage. + description: A UUID string identifying this Consent Stage. required: true tags: - stages @@ -24211,9 +24863,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/webauthn/{stage_uuid}/used_by/: + /stages/consent/{stage_uuid}/used_by/: get: - operationId: stages_authenticator_webauthn_used_by_list + operationId: stages_consent_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -24221,7 +24873,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this WebAuthn Authenticator Setup Stage. + description: A UUID string identifying this Consent Stage. required: true tags: - stages @@ -24248,11 +24900,15 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/captcha/: + /stages/deny/: get: - operationId: stages_captcha_list - description: CaptchaStage Viewset + operationId: stages_deny_list + description: DenyStage Viewset parameters: + - in: query + name: deny_message + schema: + type: string - in: query name: name schema: @@ -24275,16 +24931,17 @@ paths: description: Number of results to return per page. schema: type: integer - - in: query - name: public_key - schema: - type: string - name: search required: false in: query description: A search term. schema: type: string + - in: query + name: stage_uuid + schema: + type: string + format: uuid tags: - stages security: @@ -24294,7 +24951,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedCaptchaStageList' + $ref: '#/components/schemas/PaginatedDenyStageList' description: '' '400': content: @@ -24309,15 +24966,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_captcha_create - description: CaptchaStage Viewset + operationId: stages_deny_create + description: DenyStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/CaptchaStageRequest' + $ref: '#/components/schemas/DenyStageRequest' required: true security: - authentik: [] @@ -24326,7 +24983,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/CaptchaStage' + $ref: '#/components/schemas/DenyStage' description: '' '400': content: @@ -24340,17 +24997,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/captcha/{stage_uuid}/: + /stages/deny/{stage_uuid}/: get: - operationId: stages_captcha_retrieve - description: CaptchaStage Viewset + operationId: stages_deny_retrieve + description: DenyStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Captcha Stage. + description: A UUID string identifying this Deny Stage. required: true tags: - stages @@ -24361,7 +25018,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/CaptchaStage' + $ref: '#/components/schemas/DenyStage' description: '' '400': content: @@ -24376,15 +25033,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_captcha_update - description: CaptchaStage Viewset + operationId: stages_deny_update + description: DenyStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Captcha Stage. + description: A UUID string identifying this Deny Stage. required: true tags: - stages @@ -24392,7 +25049,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/CaptchaStageRequest' + $ref: '#/components/schemas/DenyStageRequest' required: true security: - authentik: [] @@ -24401,7 +25058,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/CaptchaStage' + $ref: '#/components/schemas/DenyStage' description: '' '400': content: @@ -24416,15 +25073,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_captcha_partial_update - description: CaptchaStage Viewset + operationId: stages_deny_partial_update + description: DenyStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Captcha Stage. + description: A UUID string identifying this Deny Stage. required: true tags: - stages @@ -24432,7 +25089,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedCaptchaStageRequest' + $ref: '#/components/schemas/PatchedDenyStageRequest' security: - authentik: [] responses: @@ -24440,7 +25097,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/CaptchaStage' + $ref: '#/components/schemas/DenyStage' description: '' '400': content: @@ -24455,15 +25112,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_captcha_destroy - description: CaptchaStage Viewset + operationId: stages_deny_destroy + description: DenyStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Captcha Stage. + description: A UUID string identifying this Deny Stage. required: true tags: - stages @@ -24484,9 +25141,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/captcha/{stage_uuid}/used_by/: + /stages/deny/{stage_uuid}/used_by/: get: - operationId: stages_captcha_used_by_list + operationId: stages_deny_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -24494,7 +25151,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Captcha Stage. + description: A UUID string identifying this Deny Stage. required: true tags: - stages @@ -24521,27 +25178,11 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/consent/: + /stages/dummy/: get: - operationId: stages_consent_list - description: ConsentStage Viewset + operationId: stages_dummy_list + description: DummyStage Viewset parameters: - - in: query - name: consent_expire_in - schema: - type: string - - in: query - name: mode - schema: - type: string - enum: - - always_require - - expiring - - permanent - description: |- - * `always_require` - Always Require - * `permanent` - Permanent - * `expiring` - Expiring - in: query name: name schema: @@ -24575,6 +25216,10 @@ paths: schema: type: string format: uuid + - in: query + name: throw_error + schema: + type: boolean tags: - stages security: @@ -24584,7 +25229,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedConsentStageList' + $ref: '#/components/schemas/PaginatedDummyStageList' description: '' '400': content: @@ -24599,15 +25244,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_consent_create - description: ConsentStage Viewset + operationId: stages_dummy_create + description: DummyStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/ConsentStageRequest' + $ref: '#/components/schemas/DummyStageRequest' required: true security: - authentik: [] @@ -24616,7 +25261,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/ConsentStage' + $ref: '#/components/schemas/DummyStage' description: '' '400': content: @@ -24630,17 +25275,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/consent/{stage_uuid}/: + /stages/dummy/{stage_uuid}/: get: - operationId: stages_consent_retrieve - description: ConsentStage Viewset + operationId: stages_dummy_retrieve + description: DummyStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Consent Stage. + description: A UUID string identifying this Dummy Stage. required: true tags: - stages @@ -24651,7 +25296,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/ConsentStage' + $ref: '#/components/schemas/DummyStage' description: '' '400': content: @@ -24666,15 +25311,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_consent_update - description: ConsentStage Viewset + operationId: stages_dummy_update + description: DummyStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Consent Stage. + description: A UUID string identifying this Dummy Stage. required: true tags: - stages @@ -24682,7 +25327,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/ConsentStageRequest' + $ref: '#/components/schemas/DummyStageRequest' required: true security: - authentik: [] @@ -24691,7 +25336,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/ConsentStage' + $ref: '#/components/schemas/DummyStage' description: '' '400': content: @@ -24706,15 +25351,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_consent_partial_update - description: ConsentStage Viewset + operationId: stages_dummy_partial_update + description: DummyStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Consent Stage. + description: A UUID string identifying this Dummy Stage. required: true tags: - stages @@ -24722,7 +25367,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedConsentStageRequest' + $ref: '#/components/schemas/PatchedDummyStageRequest' security: - authentik: [] responses: @@ -24730,7 +25375,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/ConsentStage' + $ref: '#/components/schemas/DummyStage' description: '' '400': content: @@ -24745,15 +25390,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_consent_destroy - description: ConsentStage Viewset + operationId: stages_dummy_destroy + description: DummyStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Consent Stage. + description: A UUID string identifying this Dummy Stage. required: true tags: - stages @@ -24774,9 +25419,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/consent/{stage_uuid}/used_by/: + /stages/dummy/{stage_uuid}/used_by/: get: - operationId: stages_consent_used_by_list + operationId: stages_dummy_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -24784,7 +25429,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Consent Stage. + description: A UUID string identifying this Dummy Stage. required: true tags: - stages @@ -24811,13 +25456,21 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/deny/: + /stages/email/: get: - operationId: stages_deny_list - description: DenyStage Viewset + operationId: stages_email_list + description: EmailStage Viewset parameters: - in: query - name: deny_message + name: activate_user_on_success + schema: + type: boolean + - in: query + name: from_address + schema: + type: string + - in: query + name: host schema: type: string - in: query @@ -24842,6 +25495,10 @@ paths: description: Number of results to return per page. schema: type: integer + - in: query + name: port + schema: + type: integer - name: search required: false in: query @@ -24849,10 +25506,37 @@ paths: schema: type: string - in: query - name: stage_uuid + name: subject + schema: + type: string + - in: query + name: template + schema: + type: string + - in: query + name: timeout + schema: + type: integer + - in: query + name: token_expiry + schema: + type: integer + - in: query + name: use_global_settings + schema: + type: boolean + - in: query + name: use_ssl + schema: + type: boolean + - in: query + name: use_tls + schema: + type: boolean + - in: query + name: username schema: type: string - format: uuid tags: - stages security: @@ -24862,7 +25546,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedDenyStageList' + $ref: '#/components/schemas/PaginatedEmailStageList' description: '' '400': content: @@ -24877,15 +25561,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_deny_create - description: DenyStage Viewset + operationId: stages_email_create + description: EmailStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/DenyStageRequest' + $ref: '#/components/schemas/EmailStageRequest' required: true security: - authentik: [] @@ -24894,7 +25578,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DenyStage' + $ref: '#/components/schemas/EmailStage' description: '' '400': content: @@ -24908,17 +25592,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/deny/{stage_uuid}/: + /stages/email/{stage_uuid}/: get: - operationId: stages_deny_retrieve - description: DenyStage Viewset + operationId: stages_email_retrieve + description: EmailStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Deny Stage. + description: A UUID string identifying this Email Stage. required: true tags: - stages @@ -24929,7 +25613,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DenyStage' + $ref: '#/components/schemas/EmailStage' description: '' '400': content: @@ -24944,15 +25628,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_deny_update - description: DenyStage Viewset + operationId: stages_email_update + description: EmailStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Deny Stage. + description: A UUID string identifying this Email Stage. required: true tags: - stages @@ -24960,7 +25644,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DenyStageRequest' + $ref: '#/components/schemas/EmailStageRequest' required: true security: - authentik: [] @@ -24969,7 +25653,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DenyStage' + $ref: '#/components/schemas/EmailStage' description: '' '400': content: @@ -24984,15 +25668,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_deny_partial_update - description: DenyStage Viewset + operationId: stages_email_partial_update + description: EmailStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Deny Stage. + description: A UUID string identifying this Email Stage. required: true tags: - stages @@ -25000,7 +25684,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedDenyStageRequest' + $ref: '#/components/schemas/PatchedEmailStageRequest' security: - authentik: [] responses: @@ -25008,7 +25692,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DenyStage' + $ref: '#/components/schemas/EmailStage' description: '' '400': content: @@ -25023,15 +25707,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_deny_destroy - description: DenyStage Viewset + operationId: stages_email_destroy + description: EmailStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Deny Stage. + description: A UUID string identifying this Email Stage. required: true tags: - stages @@ -25052,9 +25736,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/deny/{stage_uuid}/used_by/: + /stages/email/{stage_uuid}/used_by/: get: - operationId: stages_deny_used_by_list + operationId: stages_email_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -25062,7 +25746,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Deny Stage. + description: A UUID string identifying this Email Stage. required: true tags: - stages @@ -25089,11 +25773,49 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/dummy/: + /stages/email/templates/: get: - operationId: stages_dummy_list - description: DummyStage Viewset + operationId: stages_email_templates_list + description: Get all available templates, including custom templates + tags: + - stages + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + type: array + items: + $ref: '#/components/schemas/TypeCreate' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/identification/: + get: + operationId: stages_identification_list + description: IdentificationStage Viewset parameters: + - in: query + name: case_insensitive_matching + schema: + type: boolean + - in: query + name: enrollment_flow + schema: + type: string + format: uuid - in: query name: name schema: @@ -25116,6 +25838,21 @@ paths: description: Number of results to return per page. schema: type: integer + - in: query + name: password_stage + schema: + type: string + format: uuid + - in: query + name: passwordless_flow + schema: + type: string + format: uuid + - in: query + name: recovery_flow + schema: + type: string + format: uuid - name: search required: false in: query @@ -25123,12 +25860,11 @@ paths: schema: type: string - in: query - name: stage_uuid + name: show_matched_user schema: - type: string - format: uuid + type: boolean - in: query - name: throw_error + name: show_source_labels schema: type: boolean tags: @@ -25140,7 +25876,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedDummyStageList' + $ref: '#/components/schemas/PaginatedIdentificationStageList' description: '' '400': content: @@ -25155,15 +25891,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_dummy_create - description: DummyStage Viewset + operationId: stages_identification_create + description: IdentificationStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/DummyStageRequest' + $ref: '#/components/schemas/IdentificationStageRequest' required: true security: - authentik: [] @@ -25172,7 +25908,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DummyStage' + $ref: '#/components/schemas/IdentificationStage' description: '' '400': content: @@ -25186,17 +25922,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/dummy/{stage_uuid}/: + /stages/identification/{stage_uuid}/: get: - operationId: stages_dummy_retrieve - description: DummyStage Viewset + operationId: stages_identification_retrieve + description: IdentificationStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Dummy Stage. + description: A UUID string identifying this Identification Stage. required: true tags: - stages @@ -25207,7 +25943,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DummyStage' + $ref: '#/components/schemas/IdentificationStage' description: '' '400': content: @@ -25222,15 +25958,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_dummy_update - description: DummyStage Viewset + operationId: stages_identification_update + description: IdentificationStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Dummy Stage. + description: A UUID string identifying this Identification Stage. required: true tags: - stages @@ -25238,7 +25974,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DummyStageRequest' + $ref: '#/components/schemas/IdentificationStageRequest' required: true security: - authentik: [] @@ -25247,7 +25983,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DummyStage' + $ref: '#/components/schemas/IdentificationStage' description: '' '400': content: @@ -25262,15 +25998,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_dummy_partial_update - description: DummyStage Viewset + operationId: stages_identification_partial_update + description: IdentificationStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Dummy Stage. + description: A UUID string identifying this Identification Stage. required: true tags: - stages @@ -25278,7 +26014,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedDummyStageRequest' + $ref: '#/components/schemas/PatchedIdentificationStageRequest' security: - authentik: [] responses: @@ -25286,7 +26022,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DummyStage' + $ref: '#/components/schemas/IdentificationStage' description: '' '400': content: @@ -25301,15 +26037,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_dummy_destroy - description: DummyStage Viewset + operationId: stages_identification_destroy + description: IdentificationStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Dummy Stage. + description: A UUID string identifying this Identification Stage. required: true tags: - stages @@ -25330,9 +26066,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/dummy/{stage_uuid}/used_by/: + /stages/identification/{stage_uuid}/used_by/: get: - operationId: stages_dummy_used_by_list + operationId: stages_identification_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -25340,7 +26076,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Dummy Stage. + description: A UUID string identifying this Identification Stage. required: true tags: - stages @@ -25367,21 +26103,22 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/email/: + /stages/invitation/invitations/: get: - operationId: stages_email_list - description: EmailStage Viewset + operationId: stages_invitation_invitations_list + description: Invitation Viewset parameters: - in: query - name: activate_user_on_success + name: created_by__username schema: - type: boolean + type: string - in: query - name: from_address + name: expires schema: type: string + format: date-time - in: query - name: host + name: flow__slug schema: type: string - in: query @@ -25406,48 +26143,12 @@ paths: description: Number of results to return per page. schema: type: integer - - in: query - name: port - schema: - type: integer - name: search required: false in: query description: A search term. schema: type: string - - in: query - name: subject - schema: - type: string - - in: query - name: template - schema: - type: string - - in: query - name: timeout - schema: - type: integer - - in: query - name: token_expiry - schema: - type: integer - - in: query - name: use_global_settings - schema: - type: boolean - - in: query - name: use_ssl - schema: - type: boolean - - in: query - name: use_tls - schema: - type: boolean - - in: query - name: username - schema: - type: string tags: - stages security: @@ -25457,7 +26158,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedEmailStageList' + $ref: '#/components/schemas/PaginatedInvitationList' description: '' '400': content: @@ -25472,15 +26173,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_email_create - description: EmailStage Viewset + operationId: stages_invitation_invitations_create + description: Invitation Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/EmailStageRequest' + $ref: '#/components/schemas/InvitationRequest' required: true security: - authentik: [] @@ -25489,7 +26190,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/EmailStage' + $ref: '#/components/schemas/Invitation' description: '' '400': content: @@ -25503,17 +26204,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/email/{stage_uuid}/: + /stages/invitation/invitations/{invite_uuid}/: get: - operationId: stages_email_retrieve - description: EmailStage Viewset + operationId: stages_invitation_invitations_retrieve + description: Invitation Viewset parameters: - in: path - name: stage_uuid + name: invite_uuid schema: type: string format: uuid - description: A UUID string identifying this Email Stage. + description: A UUID string identifying this Invitation. required: true tags: - stages @@ -25524,7 +26225,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/EmailStage' + $ref: '#/components/schemas/Invitation' description: '' '400': content: @@ -25539,15 +26240,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_email_update - description: EmailStage Viewset + operationId: stages_invitation_invitations_update + description: Invitation Viewset parameters: - in: path - name: stage_uuid + name: invite_uuid schema: type: string format: uuid - description: A UUID string identifying this Email Stage. + description: A UUID string identifying this Invitation. required: true tags: - stages @@ -25555,7 +26256,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/EmailStageRequest' + $ref: '#/components/schemas/InvitationRequest' required: true security: - authentik: [] @@ -25564,7 +26265,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/EmailStage' + $ref: '#/components/schemas/Invitation' description: '' '400': content: @@ -25579,15 +26280,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_email_partial_update - description: EmailStage Viewset + operationId: stages_invitation_invitations_partial_update + description: Invitation Viewset parameters: - in: path - name: stage_uuid + name: invite_uuid schema: type: string format: uuid - description: A UUID string identifying this Email Stage. + description: A UUID string identifying this Invitation. required: true tags: - stages @@ -25595,7 +26296,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedEmailStageRequest' + $ref: '#/components/schemas/PatchedInvitationRequest' security: - authentik: [] responses: @@ -25603,7 +26304,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/EmailStage' + $ref: '#/components/schemas/Invitation' description: '' '400': content: @@ -25618,15 +26319,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_email_destroy - description: EmailStage Viewset + operationId: stages_invitation_invitations_destroy + description: Invitation Viewset parameters: - in: path - name: stage_uuid + name: invite_uuid schema: type: string format: uuid - description: A UUID string identifying this Email Stage. + description: A UUID string identifying this Invitation. required: true tags: - stages @@ -25647,17 +26348,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/email/{stage_uuid}/used_by/: + /stages/invitation/invitations/{invite_uuid}/used_by/: get: - operationId: stages_email_used_by_list + operationId: stages_invitation_invitations_used_by_list description: Get a list of all objects that use this object parameters: - in: path - name: stage_uuid + name: invite_uuid schema: type: string format: uuid - description: A UUID string identifying this Email Stage. + description: A UUID string identifying this Invitation. required: true tags: - stages @@ -25684,53 +26385,23 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/email/templates/: - get: - operationId: stages_email_templates_list - description: Get all available templates, including custom templates - tags: - - stages - security: - - authentik: [] - responses: - '200': - content: - application/json: - schema: - type: array - items: - $ref: '#/components/schemas/TypeCreate' - description: '' - '400': - content: - application/json: - schema: - $ref: '#/components/schemas/ValidationError' - description: '' - '403': - content: - application/json: - schema: - $ref: '#/components/schemas/GenericError' - description: '' - /stages/identification/: + /stages/invitation/stages/: get: - operationId: stages_identification_list - description: IdentificationStage Viewset + operationId: stages_invitation_stages_list + description: InvitationStage Viewset parameters: - in: query - name: case_insensitive_matching + name: continue_flow_without_invitation schema: type: boolean - in: query - name: enrollment_flow + name: name schema: type: string - format: uuid - in: query - name: name + name: no_flows schema: - type: string + type: boolean - name: ordering required: false in: query @@ -25749,21 +26420,6 @@ paths: description: Number of results to return per page. schema: type: integer - - in: query - name: password_stage - schema: - type: string - format: uuid - - in: query - name: passwordless_flow - schema: - type: string - format: uuid - - in: query - name: recovery_flow - schema: - type: string - format: uuid - name: search required: false in: query @@ -25771,13 +26427,10 @@ paths: schema: type: string - in: query - name: show_matched_user - schema: - type: boolean - - in: query - name: show_source_labels + name: stage_uuid schema: - type: boolean + type: string + format: uuid tags: - stages security: @@ -25787,7 +26440,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedIdentificationStageList' + $ref: '#/components/schemas/PaginatedInvitationStageList' description: '' '400': content: @@ -25802,15 +26455,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_identification_create - description: IdentificationStage Viewset + operationId: stages_invitation_stages_create + description: InvitationStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/IdentificationStageRequest' + $ref: '#/components/schemas/InvitationStageRequest' required: true security: - authentik: [] @@ -25819,7 +26472,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/IdentificationStage' + $ref: '#/components/schemas/InvitationStage' description: '' '400': content: @@ -25833,17 +26486,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/identification/{stage_uuid}/: + /stages/invitation/stages/{stage_uuid}/: get: - operationId: stages_identification_retrieve - description: IdentificationStage Viewset + operationId: stages_invitation_stages_retrieve + description: InvitationStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Identification Stage. + description: A UUID string identifying this Invitation Stage. required: true tags: - stages @@ -25854,7 +26507,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/IdentificationStage' + $ref: '#/components/schemas/InvitationStage' description: '' '400': content: @@ -25869,15 +26522,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_identification_update - description: IdentificationStage Viewset + operationId: stages_invitation_stages_update + description: InvitationStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Identification Stage. + description: A UUID string identifying this Invitation Stage. required: true tags: - stages @@ -25885,7 +26538,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/IdentificationStageRequest' + $ref: '#/components/schemas/InvitationStageRequest' required: true security: - authentik: [] @@ -25894,7 +26547,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/IdentificationStage' + $ref: '#/components/schemas/InvitationStage' description: '' '400': content: @@ -25909,15 +26562,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_identification_partial_update - description: IdentificationStage Viewset + operationId: stages_invitation_stages_partial_update + description: InvitationStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Identification Stage. + description: A UUID string identifying this Invitation Stage. required: true tags: - stages @@ -25925,7 +26578,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedIdentificationStageRequest' + $ref: '#/components/schemas/PatchedInvitationStageRequest' security: - authentik: [] responses: @@ -25933,7 +26586,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/IdentificationStage' + $ref: '#/components/schemas/InvitationStage' description: '' '400': content: @@ -25948,15 +26601,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_identification_destroy - description: IdentificationStage Viewset + operationId: stages_invitation_stages_destroy + description: InvitationStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Identification Stage. + description: A UUID string identifying this Invitation Stage. required: true tags: - stages @@ -25977,9 +26630,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/identification/{stage_uuid}/used_by/: + /stages/invitation/stages/{stage_uuid}/used_by/: get: - operationId: stages_identification_used_by_list + operationId: stages_invitation_stages_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -25987,7 +26640,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Identification Stage. + description: A UUID string identifying this Invitation Stage. required: true tags: - stages @@ -26014,24 +26667,20 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/invitation/invitations/: + /stages/password/: get: - operationId: stages_invitation_invitations_list - description: Invitation Viewset + operationId: stages_password_list + description: PasswordStage Viewset parameters: - in: query - name: created_by__username - schema: - type: string - - in: query - name: expires + name: configure_flow schema: type: string - format: date-time + format: uuid - in: query - name: flow__slug + name: failed_attempts_before_cancel schema: - type: string + type: integer - in: query name: name schema: @@ -26069,7 +26718,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedInvitationList' + $ref: '#/components/schemas/PaginatedPasswordStageList' description: '' '400': content: @@ -26084,15 +26733,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_invitation_invitations_create - description: Invitation Viewset + operationId: stages_password_create + description: PasswordStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/InvitationRequest' + $ref: '#/components/schemas/PasswordStageRequest' required: true security: - authentik: [] @@ -26101,7 +26750,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Invitation' + $ref: '#/components/schemas/PasswordStage' description: '' '400': content: @@ -26115,17 +26764,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/invitation/invitations/{invite_uuid}/: + /stages/password/{stage_uuid}/: get: - operationId: stages_invitation_invitations_retrieve - description: Invitation Viewset + operationId: stages_password_retrieve + description: PasswordStage Viewset parameters: - in: path - name: invite_uuid + name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Invitation. + description: A UUID string identifying this Password Stage. required: true tags: - stages @@ -26136,7 +26785,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Invitation' + $ref: '#/components/schemas/PasswordStage' description: '' '400': content: @@ -26151,15 +26800,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_invitation_invitations_update - description: Invitation Viewset + operationId: stages_password_update + description: PasswordStage Viewset parameters: - in: path - name: invite_uuid + name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Invitation. + description: A UUID string identifying this Password Stage. required: true tags: - stages @@ -26167,7 +26816,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/InvitationRequest' + $ref: '#/components/schemas/PasswordStageRequest' required: true security: - authentik: [] @@ -26176,7 +26825,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Invitation' + $ref: '#/components/schemas/PasswordStage' description: '' '400': content: @@ -26191,15 +26840,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_invitation_invitations_partial_update - description: Invitation Viewset + operationId: stages_password_partial_update + description: PasswordStage Viewset parameters: - in: path - name: invite_uuid + name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Invitation. + description: A UUID string identifying this Password Stage. required: true tags: - stages @@ -26207,7 +26856,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedInvitationRequest' + $ref: '#/components/schemas/PatchedPasswordStageRequest' security: - authentik: [] responses: @@ -26215,7 +26864,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Invitation' + $ref: '#/components/schemas/PasswordStage' description: '' '400': content: @@ -26230,15 +26879,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_invitation_invitations_destroy - description: Invitation Viewset + operationId: stages_password_destroy + description: PasswordStage Viewset parameters: - in: path - name: invite_uuid + name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Invitation. + description: A UUID string identifying this Password Stage. required: true tags: - stages @@ -26259,17 +26908,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/invitation/invitations/{invite_uuid}/used_by/: + /stages/password/{stage_uuid}/used_by/: get: - operationId: stages_invitation_invitations_used_by_list + operationId: stages_password_used_by_list description: Get a list of all objects that use this object parameters: - in: path - name: invite_uuid + name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Invitation. + description: A UUID string identifying this Password Stage. required: true tags: - stages @@ -26296,23 +26945,23 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/invitation/stages/: + /stages/prompt/prompts/: get: - operationId: stages_invitation_stages_list - description: InvitationStage Viewset + operationId: stages_prompt_prompts_list + description: Prompt Viewset parameters: - in: query - name: continue_flow_without_invitation + name: field_key schema: - type: boolean + type: string - in: query - name: name + name: label schema: type: string - in: query - name: no_flows + name: name schema: - type: boolean + type: string - name: ordering required: false in: query @@ -26331,6 +26980,10 @@ paths: description: Number of results to return per page. schema: type: integer + - in: query + name: placeholder + schema: + type: string - name: search required: false in: query @@ -26338,10 +26991,47 @@ paths: schema: type: string - in: query - name: stage_uuid + name: type schema: type: string - format: uuid + enum: + - ak-locale + - checkbox + - date + - date-time + - dropdown + - email + - file + - hidden + - number + - password + - radio-button-group + - separator + - static + - text + - text_area + - text_area_read_only + - text_read_only + - username + description: |- + * `text` - Text: Simple Text input + * `text_area` - Text area: Multiline Text Input. + * `text_read_only` - Text (read-only): Simple Text input, but cannot be edited. + * `text_area_read_only` - Text area (read-only): Multiline Text input, but cannot be edited. + * `username` - Username: Same as Text input, but checks for and prevents duplicate usernames. + * `email` - Email: Text field with Email type. + * `password` - Password: Masked input, multiple inputs of this type on the same prompt need to be identical. + * `number` - Number + * `checkbox` - Checkbox + * `radio-button-group` - Fixed choice field rendered as a group of radio buttons. + * `dropdown` - Fixed choice field rendered as a dropdown. + * `date` - Date + * `date-time` - Date Time + * `file` - File: File upload for arbitrary files. File content will be available in flow context as data-URI + * `separator` - Separator: Static Separator Line + * `hidden` - Hidden: Hidden field, can be used to insert data into form. + * `static` - Static: Static value, displayed as-is. + * `ak-locale` - authentik: Selection of locales authentik supports tags: - stages security: @@ -26351,7 +27041,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedInvitationStageList' + $ref: '#/components/schemas/PaginatedPromptList' description: '' '400': content: @@ -26366,15 +27056,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_invitation_stages_create - description: InvitationStage Viewset + operationId: stages_prompt_prompts_create + description: Prompt Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/InvitationStageRequest' + $ref: '#/components/schemas/PromptRequest' required: true security: - authentik: [] @@ -26383,7 +27073,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/InvitationStage' + $ref: '#/components/schemas/Prompt' description: '' '400': content: @@ -26397,17 +27087,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/invitation/stages/{stage_uuid}/: + /stages/prompt/prompts/{prompt_uuid}/: get: - operationId: stages_invitation_stages_retrieve - description: InvitationStage Viewset + operationId: stages_prompt_prompts_retrieve + description: Prompt Viewset parameters: - in: path - name: stage_uuid + name: prompt_uuid schema: type: string format: uuid - description: A UUID string identifying this Invitation Stage. + description: A UUID string identifying this Prompt. required: true tags: - stages @@ -26418,7 +27108,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/InvitationStage' + $ref: '#/components/schemas/Prompt' description: '' '400': content: @@ -26433,15 +27123,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_invitation_stages_update - description: InvitationStage Viewset + operationId: stages_prompt_prompts_update + description: Prompt Viewset parameters: - in: path - name: stage_uuid + name: prompt_uuid schema: type: string format: uuid - description: A UUID string identifying this Invitation Stage. + description: A UUID string identifying this Prompt. required: true tags: - stages @@ -26449,7 +27139,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/InvitationStageRequest' + $ref: '#/components/schemas/PromptRequest' required: true security: - authentik: [] @@ -26458,7 +27148,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/InvitationStage' + $ref: '#/components/schemas/Prompt' description: '' '400': content: @@ -26473,15 +27163,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_invitation_stages_partial_update - description: InvitationStage Viewset + operationId: stages_prompt_prompts_partial_update + description: Prompt Viewset parameters: - in: path - name: stage_uuid + name: prompt_uuid schema: type: string format: uuid - description: A UUID string identifying this Invitation Stage. + description: A UUID string identifying this Prompt. required: true tags: - stages @@ -26489,7 +27179,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedInvitationStageRequest' + $ref: '#/components/schemas/PatchedPromptRequest' security: - authentik: [] responses: @@ -26497,7 +27187,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/InvitationStage' + $ref: '#/components/schemas/Prompt' description: '' '400': content: @@ -26512,15 +27202,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_invitation_stages_destroy - description: InvitationStage Viewset + operationId: stages_prompt_prompts_destroy + description: Prompt Viewset parameters: - in: path - name: stage_uuid + name: prompt_uuid schema: type: string format: uuid - description: A UUID string identifying this Invitation Stage. + description: A UUID string identifying this Prompt. required: true tags: - stages @@ -26541,17 +27231,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/invitation/stages/{stage_uuid}/used_by/: + /stages/prompt/prompts/{prompt_uuid}/used_by/: get: - operationId: stages_invitation_stages_used_by_list + operationId: stages_prompt_prompts_used_by_list description: Get a list of all objects that use this object parameters: - in: path - name: stage_uuid + name: prompt_uuid schema: type: string format: uuid - description: A UUID string identifying this Invitation Stage. + description: A UUID string identifying this Prompt. required: true tags: - stages @@ -26578,20 +27268,53 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/password/: + /stages/prompt/prompts/preview/: + post: + operationId: stages_prompt_prompts_preview_create + description: Preview a prompt as a challenge, just like a flow would receive + tags: + - stages + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/PromptRequest' + required: true + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/PromptChallenge' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/prompt/stages/: get: - operationId: stages_password_list - description: PasswordStage Viewset + operationId: stages_prompt_stages_list + description: PromptStage Viewset parameters: - in: query - name: configure_flow - schema: - type: string - format: uuid - - in: query - name: failed_attempts_before_cancel + name: fields schema: - type: integer + type: array + items: + type: string + format: uuid + explode: true + style: form - in: query name: name schema: @@ -26620,6 +27343,20 @@ paths: description: A search term. schema: type: string + - in: query + name: stage_uuid + schema: + type: string + format: uuid + - in: query + name: validation_policies + schema: + type: array + items: + type: string + format: uuid + explode: true + style: form tags: - stages security: @@ -26629,7 +27366,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedPasswordStageList' + $ref: '#/components/schemas/PaginatedPromptStageList' description: '' '400': content: @@ -26644,15 +27381,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_password_create - description: PasswordStage Viewset + operationId: stages_prompt_stages_create + description: PromptStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/PasswordStageRequest' + $ref: '#/components/schemas/PromptStageRequest' required: true security: - authentik: [] @@ -26661,7 +27398,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PasswordStage' + $ref: '#/components/schemas/PromptStage' description: '' '400': content: @@ -26675,17 +27412,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/password/{stage_uuid}/: + /stages/prompt/stages/{stage_uuid}/: get: - operationId: stages_password_retrieve - description: PasswordStage Viewset + operationId: stages_prompt_stages_retrieve + description: PromptStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Password Stage. + description: A UUID string identifying this Prompt Stage. required: true tags: - stages @@ -26696,7 +27433,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PasswordStage' + $ref: '#/components/schemas/PromptStage' description: '' '400': content: @@ -26711,15 +27448,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_password_update - description: PasswordStage Viewset + operationId: stages_prompt_stages_update + description: PromptStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Password Stage. + description: A UUID string identifying this Prompt Stage. required: true tags: - stages @@ -26727,7 +27464,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PasswordStageRequest' + $ref: '#/components/schemas/PromptStageRequest' required: true security: - authentik: [] @@ -26736,7 +27473,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PasswordStage' + $ref: '#/components/schemas/PromptStage' description: '' '400': content: @@ -26751,15 +27488,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_password_partial_update - description: PasswordStage Viewset + operationId: stages_prompt_stages_partial_update + description: PromptStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Password Stage. + description: A UUID string identifying this Prompt Stage. required: true tags: - stages @@ -26767,7 +27504,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedPasswordStageRequest' + $ref: '#/components/schemas/PatchedPromptStageRequest' security: - authentik: [] responses: @@ -26775,7 +27512,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PasswordStage' + $ref: '#/components/schemas/PromptStage' description: '' '400': content: @@ -26790,15 +27527,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_password_destroy - description: PasswordStage Viewset + operationId: stages_prompt_stages_destroy + description: PromptStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Password Stage. + description: A UUID string identifying this Prompt Stage. required: true tags: - stages @@ -26819,9 +27556,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/password/{stage_uuid}/used_by/: + /stages/prompt/stages/{stage_uuid}/used_by/: get: - operationId: stages_password_used_by_list + operationId: stages_prompt_stages_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -26829,7 +27566,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Password Stage. + description: A UUID string identifying this Prompt Stage. required: true tags: - stages @@ -26856,19 +27593,11 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/prompt/prompts/: + /stages/user_delete/: get: - operationId: stages_prompt_prompts_list - description: Prompt Viewset + operationId: stages_user_delete_list + description: UserDeleteStage Viewset parameters: - - in: query - name: field_key - schema: - type: string - - in: query - name: label - schema: - type: string - in: query name: name schema: @@ -26891,10 +27620,6 @@ paths: description: Number of results to return per page. schema: type: integer - - in: query - name: placeholder - schema: - type: string - name: search required: false in: query @@ -26902,47 +27627,10 @@ paths: schema: type: string - in: query - name: type + name: stage_uuid schema: type: string - enum: - - ak-locale - - checkbox - - date - - date-time - - dropdown - - email - - file - - hidden - - number - - password - - radio-button-group - - separator - - static - - text - - text_area - - text_area_read_only - - text_read_only - - username - description: |- - * `text` - Text: Simple Text input - * `text_area` - Text area: Multiline Text Input. - * `text_read_only` - Text (read-only): Simple Text input, but cannot be edited. - * `text_area_read_only` - Text area (read-only): Multiline Text input, but cannot be edited. - * `username` - Username: Same as Text input, but checks for and prevents duplicate usernames. - * `email` - Email: Text field with Email type. - * `password` - Password: Masked input, multiple inputs of this type on the same prompt need to be identical. - * `number` - Number - * `checkbox` - Checkbox - * `radio-button-group` - Fixed choice field rendered as a group of radio buttons. - * `dropdown` - Fixed choice field rendered as a dropdown. - * `date` - Date - * `date-time` - Date Time - * `file` - File: File upload for arbitrary files. File content will be available in flow context as data-URI - * `separator` - Separator: Static Separator Line - * `hidden` - Hidden: Hidden field, can be used to insert data into form. - * `static` - Static: Static value, displayed as-is. - * `ak-locale` - authentik: Selection of locales authentik supports + format: uuid tags: - stages security: @@ -26952,7 +27640,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedPromptList' + $ref: '#/components/schemas/PaginatedUserDeleteStageList' description: '' '400': content: @@ -26967,15 +27655,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_prompt_prompts_create - description: Prompt Viewset + operationId: stages_user_delete_create + description: UserDeleteStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/PromptRequest' + $ref: '#/components/schemas/UserDeleteStageRequest' required: true security: - authentik: [] @@ -26984,7 +27672,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Prompt' + $ref: '#/components/schemas/UserDeleteStage' description: '' '400': content: @@ -26998,17 +27686,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/prompt/prompts/{prompt_uuid}/: + /stages/user_delete/{stage_uuid}/: get: - operationId: stages_prompt_prompts_retrieve - description: Prompt Viewset + operationId: stages_user_delete_retrieve + description: UserDeleteStage Viewset parameters: - in: path - name: prompt_uuid + name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Prompt. + description: A UUID string identifying this User Delete Stage. required: true tags: - stages @@ -27019,7 +27707,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Prompt' + $ref: '#/components/schemas/UserDeleteStage' description: '' '400': content: @@ -27034,15 +27722,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_prompt_prompts_update - description: Prompt Viewset + operationId: stages_user_delete_update + description: UserDeleteStage Viewset parameters: - in: path - name: prompt_uuid + name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Prompt. + description: A UUID string identifying this User Delete Stage. required: true tags: - stages @@ -27050,7 +27738,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PromptRequest' + $ref: '#/components/schemas/UserDeleteStageRequest' required: true security: - authentik: [] @@ -27059,7 +27747,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Prompt' + $ref: '#/components/schemas/UserDeleteStage' description: '' '400': content: @@ -27074,15 +27762,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_prompt_prompts_partial_update - description: Prompt Viewset + operationId: stages_user_delete_partial_update + description: UserDeleteStage Viewset parameters: - in: path - name: prompt_uuid + name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Prompt. + description: A UUID string identifying this User Delete Stage. required: true tags: - stages @@ -27090,7 +27778,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedPromptRequest' + $ref: '#/components/schemas/PatchedUserDeleteStageRequest' security: - authentik: [] responses: @@ -27098,7 +27786,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Prompt' + $ref: '#/components/schemas/UserDeleteStage' description: '' '400': content: @@ -27113,15 +27801,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_prompt_prompts_destroy - description: Prompt Viewset + operationId: stages_user_delete_destroy + description: UserDeleteStage Viewset parameters: - in: path - name: prompt_uuid + name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Prompt. + description: A UUID string identifying this User Delete Stage. required: true tags: - stages @@ -27142,17 +27830,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/prompt/prompts/{prompt_uuid}/used_by/: + /stages/user_delete/{stage_uuid}/used_by/: get: - operationId: stages_prompt_prompts_used_by_list + operationId: stages_user_delete_used_by_list description: Get a list of all objects that use this object parameters: - in: path - name: prompt_uuid + name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Prompt. + description: A UUID string identifying this User Delete Stage. required: true tags: - stages @@ -27179,57 +27867,47 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/prompt/prompts/preview/: - post: - operationId: stages_prompt_prompts_preview_create - description: Preview a prompt as a challenge, just like a flow would receive - tags: - - stages - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/PromptRequest' - required: true - security: - - authentik: [] - responses: - '200': - content: - application/json: - schema: - $ref: '#/components/schemas/PromptChallenge' - description: '' - '400': - content: - application/json: - schema: - $ref: '#/components/schemas/ValidationError' - description: '' - '403': - content: - application/json: - schema: - $ref: '#/components/schemas/GenericError' - description: '' - /stages/prompt/stages/: + /stages/user_login/: get: - operationId: stages_prompt_stages_list - description: PromptStage Viewset + operationId: stages_user_login_list + description: UserLoginStage Viewset parameters: - in: query - name: fields + name: geoip_binding schema: - type: array - items: - type: string - format: uuid - explode: true - style: form + type: string + enum: + - bind_continent + - bind_continent_country + - bind_continent_country_city + - no_binding + description: |- + Bind sessions created by this stage to the configured GeoIP location + + * `no_binding` - No Binding + * `bind_continent` - Bind Continent + * `bind_continent_country` - Bind Continent Country + * `bind_continent_country_city` - Bind Continent Country City - in: query name: name schema: type: string + - in: query + name: network_binding + schema: + type: string + enum: + - bind_asn + - bind_asn_network + - bind_asn_network_ip + - no_binding + description: |- + Bind sessions created by this stage to the configured network + + * `no_binding` - No Binding + * `bind_asn` - Bind Asn + * `bind_asn_network` - Bind Asn Network + * `bind_asn_network_ip` - Bind Asn Network Ip - name: ordering required: false in: query @@ -27248,26 +27926,29 @@ paths: description: Number of results to return per page. schema: type: integer + - in: query + name: remember_me_offset + schema: + type: string - name: search required: false in: query description: A search term. schema: type: string + - in: query + name: session_duration + schema: + type: string - in: query name: stage_uuid schema: type: string format: uuid - in: query - name: validation_policies + name: terminate_other_sessions schema: - type: array - items: - type: string - format: uuid - explode: true - style: form + type: boolean tags: - stages security: @@ -27277,7 +27958,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedPromptStageList' + $ref: '#/components/schemas/PaginatedUserLoginStageList' description: '' '400': content: @@ -27292,15 +27973,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_prompt_stages_create - description: PromptStage Viewset + operationId: stages_user_login_create + description: UserLoginStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/PromptStageRequest' + $ref: '#/components/schemas/UserLoginStageRequest' required: true security: - authentik: [] @@ -27309,7 +27990,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PromptStage' + $ref: '#/components/schemas/UserLoginStage' description: '' '400': content: @@ -27323,17 +28004,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/prompt/stages/{stage_uuid}/: + /stages/user_login/{stage_uuid}/: get: - operationId: stages_prompt_stages_retrieve - description: PromptStage Viewset + operationId: stages_user_login_retrieve + description: UserLoginStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Prompt Stage. + description: A UUID string identifying this User Login Stage. required: true tags: - stages @@ -27344,7 +28025,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PromptStage' + $ref: '#/components/schemas/UserLoginStage' description: '' '400': content: @@ -27359,15 +28040,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_prompt_stages_update - description: PromptStage Viewset + operationId: stages_user_login_update + description: UserLoginStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Prompt Stage. + description: A UUID string identifying this User Login Stage. required: true tags: - stages @@ -27375,7 +28056,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PromptStageRequest' + $ref: '#/components/schemas/UserLoginStageRequest' required: true security: - authentik: [] @@ -27384,7 +28065,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PromptStage' + $ref: '#/components/schemas/UserLoginStage' description: '' '400': content: @@ -27399,15 +28080,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_prompt_stages_partial_update - description: PromptStage Viewset + operationId: stages_user_login_partial_update + description: UserLoginStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Prompt Stage. + description: A UUID string identifying this User Login Stage. required: true tags: - stages @@ -27415,7 +28096,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedPromptStageRequest' + $ref: '#/components/schemas/PatchedUserLoginStageRequest' security: - authentik: [] responses: @@ -27423,7 +28104,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PromptStage' + $ref: '#/components/schemas/UserLoginStage' description: '' '400': content: @@ -27438,15 +28119,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_prompt_stages_destroy - description: PromptStage Viewset + operationId: stages_user_login_destroy + description: UserLoginStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Prompt Stage. + description: A UUID string identifying this User Login Stage. required: true tags: - stages @@ -27467,9 +28148,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/prompt/stages/{stage_uuid}/used_by/: + /stages/user_login/{stage_uuid}/used_by/: get: - operationId: stages_prompt_stages_used_by_list + operationId: stages_user_login_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -27477,7 +28158,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Prompt Stage. + description: A UUID string identifying this User Login Stage. required: true tags: - stages @@ -27504,10 +28185,10 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/user_delete/: + /stages/user_logout/: get: - operationId: stages_user_delete_list - description: UserDeleteStage Viewset + operationId: stages_user_logout_list + description: UserLogoutStage Viewset parameters: - in: query name: name @@ -27551,7 +28232,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedUserDeleteStageList' + $ref: '#/components/schemas/PaginatedUserLogoutStageList' description: '' '400': content: @@ -27566,15 +28247,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_user_delete_create - description: UserDeleteStage Viewset + operationId: stages_user_logout_create + description: UserLogoutStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/UserDeleteStageRequest' + $ref: '#/components/schemas/UserLogoutStageRequest' required: true security: - authentik: [] @@ -27583,7 +28264,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/UserDeleteStage' + $ref: '#/components/schemas/UserLogoutStage' description: '' '400': content: @@ -27597,17 +28278,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/user_delete/{stage_uuid}/: + /stages/user_logout/{stage_uuid}/: get: - operationId: stages_user_delete_retrieve - description: UserDeleteStage Viewset + operationId: stages_user_logout_retrieve + description: UserLogoutStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this User Delete Stage. + description: A UUID string identifying this User Logout Stage. required: true tags: - stages @@ -27618,7 +28299,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/UserDeleteStage' + $ref: '#/components/schemas/UserLogoutStage' description: '' '400': content: @@ -27633,15 +28314,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_user_delete_update - description: UserDeleteStage Viewset + operationId: stages_user_logout_update + description: UserLogoutStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this User Delete Stage. + description: A UUID string identifying this User Logout Stage. required: true tags: - stages @@ -27649,7 +28330,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/UserDeleteStageRequest' + $ref: '#/components/schemas/UserLogoutStageRequest' required: true security: - authentik: [] @@ -27658,7 +28339,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/UserDeleteStage' + $ref: '#/components/schemas/UserLogoutStage' description: '' '400': content: @@ -27673,15 +28354,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_user_delete_partial_update - description: UserDeleteStage Viewset + operationId: stages_user_logout_partial_update + description: UserLogoutStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this User Delete Stage. + description: A UUID string identifying this User Logout Stage. required: true tags: - stages @@ -27689,7 +28370,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedUserDeleteStageRequest' + $ref: '#/components/schemas/PatchedUserLogoutStageRequest' security: - authentik: [] responses: @@ -27697,7 +28378,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/UserDeleteStage' + $ref: '#/components/schemas/UserLogoutStage' description: '' '400': content: @@ -27712,15 +28393,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_user_delete_destroy - description: UserDeleteStage Viewset + operationId: stages_user_logout_destroy + description: UserLogoutStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this User Delete Stage. + description: A UUID string identifying this User Logout Stage. required: true tags: - stages @@ -27741,9 +28422,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/user_delete/{stage_uuid}/used_by/: + /stages/user_logout/{stage_uuid}/used_by/: get: - operationId: stages_user_delete_used_by_list + operationId: stages_user_logout_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -27751,7 +28432,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this User Delete Stage. + description: A UUID string identifying this User Logout Stage. required: true tags: - stages @@ -27778,47 +28459,24 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/user_login/: + /stages/user_write/: get: - operationId: stages_user_login_list - description: UserLoginStage Viewset + operationId: stages_user_write_list + description: UserWriteStage Viewset parameters: - in: query - name: geoip_binding + name: create_users_as_inactive schema: - type: string - enum: - - bind_continent - - bind_continent_country - - bind_continent_country_city - - no_binding - description: |- - Bind sessions created by this stage to the configured GeoIP location - - * `no_binding` - No Binding - * `bind_continent` - Bind Continent - * `bind_continent_country` - Bind Continent Country - * `bind_continent_country_city` - Bind Continent Country City + type: boolean - in: query - name: name + name: create_users_group schema: type: string + format: uuid - in: query - name: network_binding + name: name schema: type: string - enum: - - bind_asn - - bind_asn_network - - bind_asn_network_ip - - no_binding - description: |- - Bind sessions created by this stage to the configured network - - * `no_binding` - No Binding - * `bind_asn` - Bind Asn - * `bind_asn_network` - Bind Asn Network - * `bind_asn_network_ip` - Bind Asn Network Ip - name: ordering required: false in: query @@ -27837,10 +28495,6 @@ paths: description: Number of results to return per page. schema: type: integer - - in: query - name: remember_me_offset - schema: - type: string - name: search required: false in: query @@ -27848,18 +28502,40 @@ paths: schema: type: string - in: query - name: session_duration + name: stage_uuid schema: type: string + format: uuid - in: query - name: stage_uuid + name: user_creation_mode schema: type: string - format: uuid + enum: + - always_create + - create_when_required + - never_create + description: |- + * `never_create` - Never Create + * `create_when_required` - Create When Required + * `always_create` - Always Create - in: query - name: terminate_other_sessions + name: user_path_template schema: - type: boolean + type: string + - in: query + name: user_type + schema: + type: string + enum: + - external + - internal + - internal_service_account + - service_account + description: |- + * `internal` - Internal + * `external` - External + * `service_account` - Service Account + * `internal_service_account` - Internal Service Account tags: - stages security: @@ -27869,7 +28545,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedUserLoginStageList' + $ref: '#/components/schemas/PaginatedUserWriteStageList' description: '' '400': content: @@ -27884,15 +28560,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_user_login_create - description: UserLoginStage Viewset + operationId: stages_user_write_create + description: UserWriteStage Viewset tags: - stages requestBody: content: application/json: schema: - $ref: '#/components/schemas/UserLoginStageRequest' + $ref: '#/components/schemas/UserWriteStageRequest' required: true security: - authentik: [] @@ -27901,7 +28577,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/UserLoginStage' + $ref: '#/components/schemas/UserWriteStage' description: '' '400': content: @@ -27915,17 +28591,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/user_login/{stage_uuid}/: + /stages/user_write/{stage_uuid}/: get: - operationId: stages_user_login_retrieve - description: UserLoginStage Viewset + operationId: stages_user_write_retrieve + description: UserWriteStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this User Login Stage. + description: A UUID string identifying this User Write Stage. required: true tags: - stages @@ -27936,7 +28612,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/UserLoginStage' + $ref: '#/components/schemas/UserWriteStage' description: '' '400': content: @@ -27951,15 +28627,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_user_login_update - description: UserLoginStage Viewset + operationId: stages_user_write_update + description: UserWriteStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this User Login Stage. + description: A UUID string identifying this User Write Stage. required: true tags: - stages @@ -27967,7 +28643,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/UserLoginStageRequest' + $ref: '#/components/schemas/UserWriteStageRequest' required: true security: - authentik: [] @@ -27976,7 +28652,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/UserLoginStage' + $ref: '#/components/schemas/UserWriteStage' description: '' '400': content: @@ -27991,15 +28667,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_user_login_partial_update - description: UserLoginStage Viewset + operationId: stages_user_write_partial_update + description: UserWriteStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this User Login Stage. + description: A UUID string identifying this User Write Stage. required: true tags: - stages @@ -28007,7 +28683,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedUserLoginStageRequest' + $ref: '#/components/schemas/PatchedUserWriteStageRequest' security: - authentik: [] responses: @@ -28015,7 +28691,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/UserLoginStage' + $ref: '#/components/schemas/UserWriteStage' description: '' '400': content: @@ -28030,15 +28706,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_user_login_destroy - description: UserLoginStage Viewset + operationId: stages_user_write_destroy + description: UserWriteStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this User Login Stage. + description: A UUID string identifying this User Write Stage. required: true tags: - stages @@ -28059,9 +28735,9 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/user_login/{stage_uuid}/used_by/: + /stages/user_write/{stage_uuid}/used_by/: get: - operationId: stages_user_login_used_by_list + operationId: stages_user_write_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -28069,7 +28745,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this User Login Stage. + description: A UUID string identifying this User Write Stage. required: true tags: - stages @@ -28096,15 +28772,11 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/user_logout/: + /tenants/domains/: get: - operationId: stages_user_logout_list - description: UserLogoutStage Viewset + operationId: tenants_domains_list + description: Domain ViewSet parameters: - - in: query - name: name - schema: - type: string - name: ordering required: false in: query @@ -28129,21 +28801,14 @@ paths: description: A search term. schema: type: string - - in: query - name: stage_uuid - schema: - type: string - format: uuid tags: - - stages - security: - - authentik: [] + - tenants responses: '200': content: application/json: schema: - $ref: '#/components/schemas/PaginatedUserLogoutStageList' + $ref: '#/components/schemas/PaginatedDomainList' description: '' '400': content: @@ -28158,24 +28823,22 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_user_logout_create - description: UserLogoutStage Viewset + operationId: tenants_domains_create + description: Domain ViewSet tags: - - stages + - tenants requestBody: content: application/json: schema: - $ref: '#/components/schemas/UserLogoutStageRequest' + $ref: '#/components/schemas/DomainRequest' required: true - security: - - authentik: [] responses: '201': content: application/json: schema: - $ref: '#/components/schemas/UserLogoutStage' + $ref: '#/components/schemas/Domain' description: '' '400': content: @@ -28189,28 +28852,25 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/user_logout/{stage_uuid}/: + /tenants/domains/{id}/: get: - operationId: stages_user_logout_retrieve - description: UserLogoutStage Viewset + operationId: tenants_domains_retrieve + description: Domain ViewSet parameters: - in: path - name: stage_uuid + name: id schema: - type: string - format: uuid - description: A UUID string identifying this User Logout Stage. + type: integer + description: A unique integer value identifying this Domain. required: true tags: - - stages - security: - - authentik: [] + - tenants responses: '200': content: application/json: schema: - $ref: '#/components/schemas/UserLogoutStage' + $ref: '#/components/schemas/Domain' description: '' '400': content: @@ -28225,32 +28885,29 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_user_logout_update - description: UserLogoutStage Viewset + operationId: tenants_domains_update + description: Domain ViewSet parameters: - in: path - name: stage_uuid + name: id schema: - type: string - format: uuid - description: A UUID string identifying this User Logout Stage. + type: integer + description: A unique integer value identifying this Domain. required: true tags: - - stages + - tenants requestBody: content: application/json: schema: - $ref: '#/components/schemas/UserLogoutStageRequest' + $ref: '#/components/schemas/DomainRequest' required: true - security: - - authentik: [] responses: '200': content: application/json: schema: - $ref: '#/components/schemas/UserLogoutStage' + $ref: '#/components/schemas/Domain' description: '' '400': content: @@ -28265,31 +28922,28 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_user_logout_partial_update - description: UserLogoutStage Viewset + operationId: tenants_domains_partial_update + description: Domain ViewSet parameters: - in: path - name: stage_uuid + name: id schema: - type: string - format: uuid - description: A UUID string identifying this User Logout Stage. + type: integer + description: A unique integer value identifying this Domain. required: true tags: - - stages + - tenants requestBody: content: application/json: schema: - $ref: '#/components/schemas/PatchedUserLogoutStageRequest' - security: - - authentik: [] + $ref: '#/components/schemas/PatchedDomainRequest' responses: '200': content: application/json: schema: - $ref: '#/components/schemas/UserLogoutStage' + $ref: '#/components/schemas/Domain' description: '' '400': content: @@ -28304,20 +28958,17 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_user_logout_destroy - description: UserLogoutStage Viewset + operationId: tenants_domains_destroy + description: Domain ViewSet parameters: - in: path - name: stage_uuid + name: id schema: - type: string - format: uuid - description: A UUID string identifying this User Logout Stage. + type: integer + description: A unique integer value identifying this Domain. required: true tags: - - stages - security: - - authentik: [] + - tenants responses: '204': description: No response body @@ -28333,61 +28984,11 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/user_logout/{stage_uuid}/used_by/: - get: - operationId: stages_user_logout_used_by_list - description: Get a list of all objects that use this object - parameters: - - in: path - name: stage_uuid - schema: - type: string - format: uuid - description: A UUID string identifying this User Logout Stage. - required: true - tags: - - stages - security: - - authentik: [] - responses: - '200': - content: - application/json: - schema: - type: array - items: - $ref: '#/components/schemas/UsedBy' - description: '' - '400': - content: - application/json: - schema: - $ref: '#/components/schemas/ValidationError' - description: '' - '403': - content: - application/json: - schema: - $ref: '#/components/schemas/GenericError' - description: '' - /stages/user_write/: + /tenants/tenants/: get: - operationId: stages_user_write_list - description: UserWriteStage Viewset + operationId: tenants_tenants_list + description: Tenant Viewset parameters: - - in: query - name: create_users_as_inactive - schema: - type: boolean - - in: query - name: create_users_group - schema: - type: string - format: uuid - - in: query - name: name - schema: - type: string - name: ordering required: false in: query @@ -28412,51 +29013,14 @@ paths: description: A search term. schema: type: string - - in: query - name: stage_uuid - schema: - type: string - format: uuid - - in: query - name: user_creation_mode - schema: - type: string - enum: - - always_create - - create_when_required - - never_create - description: |- - * `never_create` - Never Create - * `create_when_required` - Create When Required - * `always_create` - Always Create - - in: query - name: user_path_template - schema: - type: string - - in: query - name: user_type - schema: - type: string - enum: - - external - - internal - - internal_service_account - - service_account - description: |- - * `internal` - Internal - * `external` - External - * `service_account` - Service Account - * `internal_service_account` - Internal Service Account tags: - - stages - security: - - authentik: [] + - tenants responses: '200': content: application/json: schema: - $ref: '#/components/schemas/PaginatedUserWriteStageList' + $ref: '#/components/schemas/PaginatedTenantList' description: '' '400': content: @@ -28471,24 +29035,22 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: stages_user_write_create - description: UserWriteStage Viewset + operationId: tenants_tenants_create + description: Tenant Viewset tags: - - stages + - tenants requestBody: content: application/json: schema: - $ref: '#/components/schemas/UserWriteStageRequest' + $ref: '#/components/schemas/TenantRequest' required: true - security: - - authentik: [] responses: '201': content: application/json: schema: - $ref: '#/components/schemas/UserWriteStage' + $ref: '#/components/schemas/Tenant' description: '' '400': content: @@ -28502,28 +29064,26 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/user_write/{stage_uuid}/: + /tenants/tenants/{tenant_uuid}/: get: - operationId: stages_user_write_retrieve - description: UserWriteStage Viewset + operationId: tenants_tenants_retrieve + description: Tenant Viewset parameters: - in: path - name: stage_uuid + name: tenant_uuid schema: type: string format: uuid - description: A UUID string identifying this User Write Stage. + description: A UUID string identifying this Tenant. required: true tags: - - stages - security: - - authentik: [] + - tenants responses: '200': content: application/json: schema: - $ref: '#/components/schemas/UserWriteStage' + $ref: '#/components/schemas/Tenant' description: '' '400': content: @@ -28538,32 +29098,30 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: stages_user_write_update - description: UserWriteStage Viewset + operationId: tenants_tenants_update + description: Tenant Viewset parameters: - in: path - name: stage_uuid + name: tenant_uuid schema: type: string format: uuid - description: A UUID string identifying this User Write Stage. + description: A UUID string identifying this Tenant. required: true tags: - - stages + - tenants requestBody: content: application/json: schema: - $ref: '#/components/schemas/UserWriteStageRequest' + $ref: '#/components/schemas/TenantRequest' required: true - security: - - authentik: [] responses: '200': content: application/json: schema: - $ref: '#/components/schemas/UserWriteStage' + $ref: '#/components/schemas/Tenant' description: '' '400': content: @@ -28578,31 +29136,29 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: stages_user_write_partial_update - description: UserWriteStage Viewset + operationId: tenants_tenants_partial_update + description: Tenant Viewset parameters: - in: path - name: stage_uuid + name: tenant_uuid schema: type: string format: uuid - description: A UUID string identifying this User Write Stage. + description: A UUID string identifying this Tenant. required: true tags: - - stages + - tenants requestBody: content: application/json: schema: - $ref: '#/components/schemas/PatchedUserWriteStageRequest' - security: - - authentik: [] + $ref: '#/components/schemas/PatchedTenantRequest' responses: '200': content: application/json: schema: - $ref: '#/components/schemas/UserWriteStage' + $ref: '#/components/schemas/Tenant' description: '' '400': content: @@ -28617,20 +29173,18 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: stages_user_write_destroy - description: UserWriteStage Viewset + operationId: tenants_tenants_destroy + description: Tenant Viewset parameters: - in: path - name: stage_uuid + name: tenant_uuid schema: type: string format: uuid - description: A UUID string identifying this User Write Stage. + description: A UUID string identifying this Tenant. required: true tags: - - stages - security: - - authentik: [] + - tenants responses: '204': description: No response body @@ -28646,37 +29200,70 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/user_write/{stage_uuid}/used_by/: - get: - operationId: stages_user_write_used_by_list - description: Get a list of all objects that use this object + /tenants/tenants/{tenant_uuid}/create_admin_group/: + post: + operationId: tenants_tenants_create_admin_group_create + description: Create admin group and add user to it. parameters: - in: path - name: stage_uuid + name: tenant_uuid schema: type: string format: uuid - description: A UUID string identifying this User Write Stage. + description: A UUID string identifying this Tenant. required: true tags: - - stages - security: - - authentik: [] + - tenants + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/TenantAdminGroupRequestRequest' + required: true responses: - '200': + '204': + description: Group created successfully. + '400': + description: Bad request + '404': + description: User not found + '403': content: application/json: schema: - type: array - items: - $ref: '#/components/schemas/UsedBy' + $ref: '#/components/schemas/GenericError' description: '' - '400': + /tenants/tenants/{tenant_uuid}/create_recovery_key/: + post: + operationId: tenants_tenants_create_recovery_key_create + description: Create recovery key for user. + parameters: + - in: path + name: tenant_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Tenant. + required: true + tags: + - tenants + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/TenantRecoveryKeyRequestRequest' + required: true + responses: + '200': content: application/json: schema: - $ref: '#/components/schemas/ValidationError' + $ref: '#/components/schemas/TenantRecoveryKeyResponse' description: '' + '400': + description: Bad request + '404': + description: User not found '403': content: application/json: @@ -28725,6 +29312,7 @@ components: - name AppEnum: enum: + - authentik.tenants - authentik.admin - authentik.api - authentik.crypto @@ -28770,13 +29358,14 @@ components: - authentik.stages.user_login - authentik.stages.user_logout - authentik.stages.user_write - - authentik.tenants + - authentik.brands - authentik.blueprints - authentik.core - authentik.enterprise - authentik.enterprise.providers.rac type: string description: |- + * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto @@ -28822,7 +29411,7 @@ components: * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write - * `authentik.tenants` - authentik Tenants + * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise @@ -30159,6 +30748,111 @@ components: * `error` - Error * `orphaned` - Orphaned * `unknown` - Unknown + Brand: + type: object + description: Brand Serializer + properties: + brand_uuid: + type: string + format: uuid + readOnly: true + domain: + type: string + description: Domain that activates this brand. Can be a superset, i.e. `a.b` + for `aa.b` and `ba.b` + default: + type: boolean + branding_title: + type: string + branding_logo: + type: string + branding_favicon: + type: string + flow_authentication: + type: string + format: uuid + nullable: true + flow_invalidation: + type: string + format: uuid + nullable: true + flow_recovery: + type: string + format: uuid + nullable: true + flow_unenrollment: + type: string + format: uuid + nullable: true + flow_user_settings: + type: string + format: uuid + nullable: true + flow_device_code: + type: string + format: uuid + nullable: true + web_certificate: + type: string + format: uuid + nullable: true + description: Web Certificate used by the authentik Core webserver. + attributes: {} + required: + - brand_uuid + - domain + BrandRequest: + type: object + description: Brand Serializer + properties: + domain: + type: string + minLength: 1 + description: Domain that activates this brand. Can be a superset, i.e. `a.b` + for `aa.b` and `ba.b` + default: + type: boolean + branding_title: + type: string + minLength: 1 + branding_logo: + type: string + minLength: 1 + branding_favicon: + type: string + minLength: 1 + flow_authentication: + type: string + format: uuid + nullable: true + flow_invalidation: + type: string + format: uuid + nullable: true + flow_recovery: + type: string + format: uuid + nullable: true + flow_unenrollment: + type: string + format: uuid + nullable: true + flow_user_settings: + type: string + format: uuid + nullable: true + flow_device_code: + type: string + format: uuid + nullable: true + web_certificate: + type: string + format: uuid + nullable: true + description: Web Certificate used by the authentik Core webserver. + attributes: {} + required: + - domain Cache: type: object description: Generic cache stats for an object @@ -30691,9 +31385,9 @@ components: required: - x_cord - y_cord - CurrentTenant: + CurrentBrand: type: object - description: Partial tenant information for styling + description: Partial brand information for styling properties: matched_domain: type: string @@ -30708,7 +31402,6 @@ components: items: $ref: '#/components/schemas/FooterLink' readOnly: true - default: [] ui_theme: allOf: - $ref: '#/components/schemas/UiThemeEnum' @@ -30989,6 +31682,41 @@ components: required: - name - url + Domain: + type: object + description: Domain Serializer + properties: + id: + type: integer + readOnly: true + domain: + type: string + maxLength: 253 + is_primary: + type: boolean + tenant: + type: string + format: uuid + required: + - domain + - id + - tenant + DomainRequest: + type: object + description: Domain Serializer + properties: + domain: + type: string + minLength: 1 + maxLength: 253 + is_primary: + type: boolean + tenant: + type: string + format: uuid + required: + - domain + - tenant DummyChallenge: type: object description: Dummy challenge @@ -31492,7 +32220,7 @@ components: expires: type: string format: date-time - tenant: {} + brand: {} required: - action - app @@ -31637,6 +32365,7 @@ components: description: |- Match events created by selected application. When left empty, all applications are matched. + * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto @@ -31682,7 +32411,7 @@ components: * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write - * `authentik.tenants` - authentik Tenants + * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise @@ -31694,6 +32423,7 @@ components: description: |- Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. + * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport @@ -31761,7 +32491,7 @@ components: * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage - * `authentik_tenants.tenant` - Tenant + * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User @@ -31837,6 +32567,7 @@ components: description: |- Match events created by selected application. When left empty, all applications are matched. + * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto @@ -31882,7 +32613,7 @@ components: * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write - * `authentik.tenants` - authentik Tenants + * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise @@ -31894,6 +32625,7 @@ components: description: |- Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. + * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport @@ -31961,7 +32693,7 @@ components: * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage - * `authentik_tenants.tenant` - Tenant + * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User @@ -31991,7 +32723,7 @@ components: expires: type: string format: date-time - tenant: {} + brand: {} required: - action - app @@ -34212,6 +34944,7 @@ components: - name ModelEnum: enum: + - authentik_tenants.domain - authentik_crypto.certificatekeypair - authentik_events.event - authentik_events.notificationtransport @@ -34279,7 +35012,7 @@ components: - authentik_stages_user_login.userloginstage - authentik_stages_user_logout.userlogoutstage - authentik_stages_user_write.userwritestage - - authentik_tenants.tenant + - authentik_brands.brand - authentik_blueprints.blueprintinstance - authentik_core.group - authentik_core.user @@ -34291,6 +35024,7 @@ components: - authentik_providers_rac.racpropertymapping type: string description: |- + * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport @@ -34358,7 +35092,7 @@ components: * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage - * `authentik_tenants.tenant` - Tenant + * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User @@ -35469,6 +36203,18 @@ components: required: - pagination - results + PaginatedBrandList: + type: object + properties: + pagination: + $ref: '#/components/schemas/Pagination' + results: + type: array + items: + $ref: '#/components/schemas/Brand' + required: + - pagination + - results PaginatedCaptchaStageList: type: object properties: @@ -35529,6 +36275,18 @@ components: required: - pagination - results + PaginatedDomainList: + type: object + properties: + pagination: + $ref: '#/components/schemas/Pagination' + results: + type: array + items: + $ref: '#/components/schemas/Domain' + required: + - pagination + - results PaginatedDummyPolicyList: type: object properties: @@ -37088,6 +37846,56 @@ components: type: boolean content: type: string + PatchedBrandRequest: + type: object + description: Brand Serializer + properties: + domain: + type: string + minLength: 1 + description: Domain that activates this brand. Can be a superset, i.e. `a.b` + for `aa.b` and `ba.b` + default: + type: boolean + branding_title: + type: string + minLength: 1 + branding_logo: + type: string + minLength: 1 + branding_favicon: + type: string + minLength: 1 + flow_authentication: + type: string + format: uuid + nullable: true + flow_invalidation: + type: string + format: uuid + nullable: true + flow_recovery: + type: string + format: uuid + nullable: true + flow_unenrollment: + type: string + format: uuid + nullable: true + flow_user_settings: + type: string + format: uuid + nullable: true + flow_device_code: + type: string + format: uuid + nullable: true + web_certificate: + type: string + format: uuid + nullable: true + description: Web Certificate used by the authentik Core webserver. + attributes: {} PatchedCaptchaStageRequest: type: object description: CaptchaStage Serializer @@ -37191,6 +37999,19 @@ components: nullable: true description: Certificate/Key used for authentication. Can be left empty for no authentication. + PatchedDomainRequest: + type: object + description: Domain Serializer + properties: + domain: + type: string + minLength: 1 + maxLength: 253 + is_primary: + type: boolean + tenant: + type: string + format: uuid PatchedDummyPolicyRequest: type: object description: Dummy Policy Serializer @@ -37372,6 +38193,7 @@ components: description: |- Match events created by selected application. When left empty, all applications are matched. + * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto @@ -37417,7 +38239,7 @@ components: * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write - * `authentik.tenants` - authentik Tenants + * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise @@ -37429,6 +38251,7 @@ components: description: |- Match events created by selected model. When left empty, all models are matched. When an app is selected, all the application's models are matched. + * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport @@ -37496,7 +38319,7 @@ components: * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage - * `authentik_tenants.tenant` - Tenant + * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User @@ -37524,7 +38347,7 @@ components: expires: type: string format: date-time - tenant: {} + brand: {} PatchedExpressionPolicyRequest: type: object description: Group Membership Policy Serializer @@ -39049,6 +39872,37 @@ components: type: string description: Description shown to the user when consenting. If left empty, the user won't be informed. + PatchedSettingsRequest: + type: object + description: Settings Serializer + properties: + avatars: + type: string + minLength: 1 + description: Configure how authentik should show avatars for users. + default_user_change_name: + type: boolean + description: Enable the ability for users to change their name. + default_user_change_email: + type: boolean + description: Enable the ability for users to change their email address. + default_user_change_username: + type: boolean + description: Enable the ability for users to change their username. + event_retention: + type: string + minLength: 1 + description: 'Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2).' + footer_links: + description: The option configures the footer links on the flow executor + pages. + gdpr_compliance: + type: boolean + description: When enabled, all the events caused by a user will be deleted + upon the user's deletion. + impersonation: + type: boolean + description: Globally enable/disable impersonation. PatchedStaticDeviceRequest: type: object description: Serializer for static authenticator devices @@ -39071,56 +39925,15 @@ components: type: object description: Tenant Serializer properties: - domain: + schema_name: type: string minLength: 1 - description: Domain that activates this tenant. Can be a superset, i.e. - `a.b` for `aa.b` and `ba.b` - default: - type: boolean - branding_title: - type: string - minLength: 1 - branding_logo: - type: string - minLength: 1 - branding_favicon: - type: string - minLength: 1 - flow_authentication: - type: string - format: uuid - nullable: true - flow_invalidation: - type: string - format: uuid - nullable: true - flow_recovery: - type: string - format: uuid - nullable: true - flow_unenrollment: - type: string - format: uuid - nullable: true - flow_user_settings: - type: string - format: uuid - nullable: true - flow_device_code: - type: string - format: uuid - nullable: true - event_retention: + maxLength: 63 + name: type: string minLength: 1 - description: 'Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2).' - web_certificate: - type: string - format: uuid - nullable: true - description: Web Certificate used by the authentik Core webserver. - attributes: {} + ready: + type: boolean PatchedTokenRequest: type: object description: Token Serializer @@ -42189,6 +43002,66 @@ components: $ref: '#/components/schemas/UserSelf' required: - user + Settings: + type: object + description: Settings Serializer + properties: + avatars: + type: string + description: Configure how authentik should show avatars for users. + default_user_change_name: + type: boolean + description: Enable the ability for users to change their name. + default_user_change_email: + type: boolean + description: Enable the ability for users to change their email address. + default_user_change_username: + type: boolean + description: Enable the ability for users to change their username. + event_retention: + type: string + description: 'Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2).' + footer_links: + description: The option configures the footer links on the flow executor + pages. + gdpr_compliance: + type: boolean + description: When enabled, all the events caused by a user will be deleted + upon the user's deletion. + impersonation: + type: boolean + description: Globally enable/disable impersonation. + SettingsRequest: + type: object + description: Settings Serializer + properties: + avatars: + type: string + minLength: 1 + description: Configure how authentik should show avatars for users. + default_user_change_name: + type: boolean + description: Enable the ability for users to change their name. + default_user_change_email: + type: boolean + description: Enable the ability for users to change their email address. + default_user_change_username: + type: boolean + description: Enable the ability for users to change their username. + event_retention: + type: string + minLength: 1 + description: 'Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2).' + footer_links: + description: The option configures the footer links on the flow executor + pages. + gdpr_compliance: + type: boolean + description: When enabled, all the events caused by a user will be deleted + upon the user's deletion. + impersonation: + type: boolean + description: Globally enable/disable impersonation. SeverityEnum: enum: - notice @@ -42613,27 +43486,32 @@ components: - python_version - uname readOnly: true - tenant: + brand: type: string - description: Currently active tenant + description: Currently active brand readOnly: true server_time: type: string format: date-time description: Current server time readOnly: true + embedded_outpost_disabled: + type: boolean + description: Whether the embedded outpost is disabled + readOnly: true embedded_outpost_host: type: string description: Get the FQDN configured on the embedded outpost readOnly: true required: + - brand + - embedded_outpost_disabled - embedded_outpost_host - http_headers - http_host - http_is_secure - runtime - server_time - - tenant TOTPDevice: type: object description: Serializer for totp authenticator devices @@ -42707,110 +43585,66 @@ components: type: string format: uuid readOnly: true - domain: - type: string - description: Domain that activates this tenant. Can be a superset, i.e. - `a.b` for `aa.b` and `ba.b` - default: - type: boolean - branding_title: + schema_name: type: string - branding_logo: - type: string - branding_favicon: - type: string - flow_authentication: - type: string - format: uuid - nullable: true - flow_invalidation: - type: string - format: uuid - nullable: true - flow_recovery: - type: string - format: uuid - nullable: true - flow_unenrollment: - type: string - format: uuid - nullable: true - flow_user_settings: - type: string - format: uuid - nullable: true - flow_device_code: - type: string - format: uuid - nullable: true - event_retention: - type: string - description: 'Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2).' - web_certificate: + maxLength: 63 + name: type: string - format: uuid - nullable: true - description: Web Certificate used by the authentik Core webserver. - attributes: {} + ready: + type: boolean required: - - domain + - name + - schema_name - tenant_uuid - TenantRequest: + TenantAdminGroupRequestRequest: type: object - description: Tenant Serializer + description: Tenant admin group creation request serializer properties: - domain: - type: string - minLength: 1 - description: Domain that activates this tenant. Can be a superset, i.e. - `a.b` for `aa.b` and `ba.b` - default: - type: boolean - branding_title: - type: string - minLength: 1 - branding_logo: + user: type: string minLength: 1 - branding_favicon: + required: + - user + TenantRecoveryKeyRequestRequest: + type: object + description: Tenant recovery key creation request serializer + properties: + user: type: string minLength: 1 - flow_authentication: - type: string - format: uuid - nullable: true - flow_invalidation: - type: string - format: uuid - nullable: true - flow_recovery: - type: string - format: uuid - nullable: true - flow_unenrollment: - type: string - format: uuid - nullable: true - flow_user_settings: + duration_days: + type: integer + required: + - duration_days + - user + TenantRecoveryKeyResponse: + type: object + description: Tenant recovery key creation response serializer + properties: + expiry: type: string - format: uuid - nullable: true - flow_device_code: + format: date-time + url: type: string - format: uuid - nullable: true - event_retention: + required: + - expiry + - url + TenantRequest: + type: object + description: Tenant Serializer + properties: + schema_name: type: string minLength: 1 - description: 'Events will be deleted after this duration.(Format: weeks=3;days=2;hours=3,seconds=2).' - web_certificate: + maxLength: 63 + name: type: string - format: uuid - nullable: true - description: Web Certificate used by the authentik Core webserver. - attributes: {} + minLength: 1 + ready: + type: boolean required: - - domain + - name + - schema_name Token: type: object description: Token Serializer @@ -43745,7 +44579,7 @@ components: settings: type: object additionalProperties: {} - description: Get user settings with tenant and group settings applied + description: Get user settings with brand and group settings applied readOnly: true type: $ref: '#/components/schemas/UserTypeEnum'