Skip to content

Commit

Permalink
Update API Client
Browse files Browse the repository at this point in the history
#### What's Changed
---

##### `GET` /sources/ldap/{slug}/

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Added property `client_certificate` (string)
        > Client certificate to authenticate against the LDAP Server's Certificate.

    * Added property `sni` (boolean)

##### `PUT` /sources/ldap/{slug}/

###### Request:

Changed content type : `application/json`

* Added property `client_certificate` (string)
    > Client certificate to authenticate against the LDAP Server's Certificate.

* Added property `sni` (boolean)

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Added property `client_certificate` (string)
        > Client certificate to authenticate against the LDAP Server's Certificate.

    * Added property `sni` (boolean)

##### `PATCH` /sources/ldap/{slug}/

###### Request:

Changed content type : `application/json`

* Added property `client_certificate` (string)
    > Client certificate to authenticate against the LDAP Server's Certificate.

* Added property `sni` (boolean)

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Added property `client_certificate` (string)
        > Client certificate to authenticate against the LDAP Server's Certificate.

    * Added property `sni` (boolean)

##### `POST` /sources/ldap/

###### Request:

Changed content type : `application/json`

* Added property `client_certificate` (string)
    > Client certificate to authenticate against the LDAP Server's Certificate.

* Added property `sni` (boolean)

###### Return Type:

Changed response : **201 Created**

* Changed content type : `application/json`

    * Added property `client_certificate` (string)
        > Client certificate to authenticate against the LDAP Server's Certificate.

    * Added property `sni` (boolean)

##### `GET` /sources/ldap/

###### Parameters:

Added: `client_certificate` in `query`

Added: `sni` in `query`

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Changed property `results` (array)

        Changed items (object):
            > LDAP Source Serializer

        * Added property `client_certificate` (string)
            > Client certificate to authenticate against the LDAP Server's Certificate.

        * Added property `sni` (boolean)
  • Loading branch information
authentik-automation[bot] committed Jun 12, 2023
1 parent 4119741 commit 84b50dc
Show file tree
Hide file tree
Showing 10 changed files with 561 additions and 13 deletions.
52 changes: 52 additions & 0 deletions api/openapi.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -19033,6 +19033,14 @@ paths:
schema:
type: string
style: form
- explode: true
in: query
name: client_certificate
required: false
schema:
format: uuid
type: string
style: form
- explode: true
in: query
name: enabled
Expand Down Expand Up @@ -19142,6 +19150,13 @@ paths:
schema:
type: string
style: form
- explode: true
in: query
name: sni
required: false
schema:
type: boolean
style: form
- explode: true
in: query
name: start_tls
Expand Down Expand Up @@ -35242,6 +35257,7 @@ components:
sync_users: true
icon: icon
enabled: true
client_certificate: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
base_dn: base_dn
managed: managed
additional_group_dn: additional_group_dn
Expand All @@ -35256,6 +35272,7 @@ components:
user_path_template: user_path_template
sync_groups: true
group_object_filter: group_object_filter
sni: true
authentication_flow: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
policy_engine_mode: null
enrollment_flow: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
Expand Down Expand Up @@ -35349,11 +35366,20 @@ components:
format: uuid
nullable: true
type: string
client_certificate:
description: Client certificate to authenticate against the LDAP Server's
Certificate.
format: uuid
nullable: true
type: string
bind_cn:
type: string
start_tls:
title: Enable Start TLS
type: boolean
sni:
title: Use Server URI for SNI verification
type: boolean
base_dn:
type: string
additional_user_dn:
Expand Down Expand Up @@ -35424,6 +35450,7 @@ components:
additional_user_dn: additional_user_dn
sync_users: true
enabled: true
client_certificate: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
base_dn: base_dn
additional_group_dn: additional_group_dn
sync_parent_group: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
Expand All @@ -35437,6 +35464,7 @@ components:
user_path_template: user_path_template
sync_groups: true
group_object_filter: group_object_filter
sni: true
authentication_flow: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
policy_engine_mode: null
enrollment_flow: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
Expand Down Expand Up @@ -35494,6 +35522,12 @@ components:
format: uuid
nullable: true
type: string
client_certificate:
description: Client certificate to authenticate against the LDAP Server's
Certificate.
format: uuid
nullable: true
type: string
bind_cn:
type: string
bind_password:
Expand All @@ -35502,6 +35536,9 @@ components:
start_tls:
title: Enable Start TLS
type: boolean
sni:
title: Use Server URI for SNI verification
type: boolean
base_dn:
minLength: 1
type: string
Expand Down Expand Up @@ -39261,6 +39298,7 @@ components:
sync_users: true
icon: icon
enabled: true
client_certificate: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
base_dn: base_dn
managed: managed
additional_group_dn: additional_group_dn
Expand All @@ -39275,6 +39313,7 @@ components:
user_path_template: user_path_template
sync_groups: true
group_object_filter: group_object_filter
sni: true
authentication_flow: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
policy_engine_mode: null
enrollment_flow: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
Expand All @@ -39297,6 +39336,7 @@ components:
sync_users: true
icon: icon
enabled: true
client_certificate: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
base_dn: base_dn
managed: managed
additional_group_dn: additional_group_dn
Expand All @@ -39311,6 +39351,7 @@ components:
user_path_template: user_path_template
sync_groups: true
group_object_filter: group_object_filter
sni: true
authentication_flow: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
policy_engine_mode: null
enrollment_flow: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
Expand Down Expand Up @@ -44246,6 +44287,7 @@ components:
additional_user_dn: additional_user_dn
sync_users: true
enabled: true
client_certificate: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
base_dn: base_dn
additional_group_dn: additional_group_dn
sync_parent_group: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
Expand All @@ -44259,6 +44301,7 @@ components:
user_path_template: user_path_template
sync_groups: true
group_object_filter: group_object_filter
sni: true
authentication_flow: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
policy_engine_mode: null
enrollment_flow: 046b6c7f-0b8a-43b9-b35d-6489e6daee91
Expand Down Expand Up @@ -44316,6 +44359,12 @@ components:
format: uuid
nullable: true
type: string
client_certificate:
description: Client certificate to authenticate against the LDAP Server's
Certificate.
format: uuid
nullable: true
type: string
bind_cn:
type: string
bind_password:
Expand All @@ -44324,6 +44373,9 @@ components:
start_tls:
title: Enable Start TLS
type: boolean
sni:
title: Use Server URI for SNI verification
type: boolean
base_dn:
minLength: 1
type: string
Expand Down
18 changes: 18 additions & 0 deletions api_sources.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

62 changes: 62 additions & 0 deletions docs/LDAPSource.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,10 @@ Name | Type | Description | Notes
**Icon** | **NullableString** | Get the URL to the Icon. If the name is /static or starts with http it is returned as-is | [readonly]
**ServerUri** | **string** | |
**PeerCertificate** | Pointer to **NullableString** | Optionally verify the LDAP Server's Certificate against the CA Chain in this keypair. | [optional]
**ClientCertificate** | Pointer to **NullableString** | Client certificate to authenticate against the LDAP Server's Certificate. | [optional]
**BindCn** | Pointer to **string** | | [optional]
**StartTls** | Pointer to **bool** | | [optional]
**Sni** | Pointer to **bool** | | [optional]
**BaseDn** | **string** | |
**AdditionalUserDn** | Pointer to **string** | Prepended to Base DN for User-queries. | [optional]
**AdditionalGroupDn** | Pointer to **string** | Prepended to Base DN for Group-queries. | [optional]
Expand Down Expand Up @@ -481,6 +483,41 @@ HasPeerCertificate returns a boolean if a field has been set.
`func (o *LDAPSource) UnsetPeerCertificate()`

UnsetPeerCertificate ensures that no value is present for PeerCertificate, not even an explicit nil
### GetClientCertificate

`func (o *LDAPSource) GetClientCertificate() string`

GetClientCertificate returns the ClientCertificate field if non-nil, zero value otherwise.

### GetClientCertificateOk

`func (o *LDAPSource) GetClientCertificateOk() (*string, bool)`

GetClientCertificateOk returns a tuple with the ClientCertificate field if it's non-nil, zero value otherwise
and a boolean to check if the value has been set.

### SetClientCertificate

`func (o *LDAPSource) SetClientCertificate(v string)`

SetClientCertificate sets ClientCertificate field to given value.

### HasClientCertificate

`func (o *LDAPSource) HasClientCertificate() bool`

HasClientCertificate returns a boolean if a field has been set.

### SetClientCertificateNil

`func (o *LDAPSource) SetClientCertificateNil(b bool)`

SetClientCertificateNil sets the value for ClientCertificate to be an explicit nil

### UnsetClientCertificate
`func (o *LDAPSource) UnsetClientCertificate()`

UnsetClientCertificate ensures that no value is present for ClientCertificate, not even an explicit nil
### GetBindCn

`func (o *LDAPSource) GetBindCn() string`
Expand Down Expand Up @@ -531,6 +568,31 @@ SetStartTls sets StartTls field to given value.

HasStartTls returns a boolean if a field has been set.

### GetSni

`func (o *LDAPSource) GetSni() bool`

GetSni returns the Sni field if non-nil, zero value otherwise.

### GetSniOk

`func (o *LDAPSource) GetSniOk() (*bool, bool)`

GetSniOk returns a tuple with the Sni field if it's non-nil, zero value otherwise
and a boolean to check if the value has been set.

### SetSni

`func (o *LDAPSource) SetSni(v bool)`

SetSni sets Sni field to given value.

### HasSni

`func (o *LDAPSource) HasSni() bool`

HasSni returns a boolean if a field has been set.

### GetBaseDn

`func (o *LDAPSource) GetBaseDn() string`
Expand Down
Loading

0 comments on commit 84b50dc

Please sign in to comment.