Skip to content
This repository was archived by the owner on Apr 17, 2024. It is now read-only.

Commit 31bea9f

Browse files
Update API Client
#### What's Changed --- ##### `GET` /outposts/radius/{id}/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `mfa_support` (boolean) > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. ##### `GET` /providers/radius/{id}/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `mfa_support` (boolean) > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. ##### `PUT` /providers/radius/{id}/ ###### Request: Changed content type : `application/json` * Added property `mfa_support` (boolean) > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `mfa_support` (boolean) > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. ##### `PATCH` /providers/radius/{id}/ ###### Request: Changed content type : `application/json` * Added property `mfa_support` (boolean) > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `mfa_support` (boolean) > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. ##### `GET` /outposts/radius/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `results` (array) Changed items (object): > RadiusProvider Serializer * Added property `mfa_support` (boolean) > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. ##### `POST` /providers/radius/ ###### Request: Changed content type : `application/json` * Added property `mfa_support` (boolean) > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. ###### Return Type: Changed response : **201 Created** * Changed content type : `application/json` * Added property `mfa_support` (boolean) > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. ##### `GET` /providers/radius/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `results` (array) Changed items (object): > RadiusProvider Serializer * Added property `mfa_support` (boolean) > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. ##### `PUT` /core/transactional/applications/ ###### Request: Changed content type : `application/json` * Changed property `provider` (object) Updated `authentik_providers_radius.radiusprovider` provider_model: * Added property `mfa_support` (boolean) > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
1 parent 796bdd1 commit 31bea9f

10 files changed

+59
-7
lines changed

authentikClient/Classes/OpenAPIs/Models/PatchedRadiusProviderRequest.swift

+6-1
Original file line numberDiff line numberDiff line change
@@ -23,14 +23,17 @@ public struct PatchedRadiusProviderRequest: Codable, JSONEncodable, Hashable {
2323
public var clientNetworks: String?
2424
/** Shared secret between clients and server to hash packets. */
2525
public var sharedSecret: String?
26+
/** When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
27+
public var mfaSupport: Bool?
2628

27-
public init(name: String? = nil, authenticationFlow: UUID? = nil, authorizationFlow: UUID? = nil, propertyMappings: [UUID]? = nil, clientNetworks: String? = nil, sharedSecret: String? = nil) {
29+
public init(name: String? = nil, authenticationFlow: UUID? = nil, authorizationFlow: UUID? = nil, propertyMappings: [UUID]? = nil, clientNetworks: String? = nil, sharedSecret: String? = nil, mfaSupport: Bool? = nil) {
2830
self.name = name
2931
self.authenticationFlow = authenticationFlow
3032
self.authorizationFlow = authorizationFlow
3133
self.propertyMappings = propertyMappings
3234
self.clientNetworks = clientNetworks
3335
self.sharedSecret = sharedSecret
36+
self.mfaSupport = mfaSupport
3437
}
3538

3639
public enum CodingKeys: String, CodingKey, CaseIterable {
@@ -40,6 +43,7 @@ public struct PatchedRadiusProviderRequest: Codable, JSONEncodable, Hashable {
4043
case propertyMappings = "property_mappings"
4144
case clientNetworks = "client_networks"
4245
case sharedSecret = "shared_secret"
46+
case mfaSupport = "mfa_support"
4347
}
4448

4549
// Encodable protocol methods
@@ -52,6 +56,7 @@ public struct PatchedRadiusProviderRequest: Codable, JSONEncodable, Hashable {
5256
try container.encodeIfPresent(propertyMappings, forKey: .propertyMappings)
5357
try container.encodeIfPresent(clientNetworks, forKey: .clientNetworks)
5458
try container.encodeIfPresent(sharedSecret, forKey: .sharedSecret)
59+
try container.encodeIfPresent(mfaSupport, forKey: .mfaSupport)
5560
}
5661
}
5762

authentikClient/Classes/OpenAPIs/Models/RadiusOutpostConfig.swift

+6-1
Original file line numberDiff line numberDiff line change
@@ -21,14 +21,17 @@ public struct RadiusOutpostConfig: Codable, JSONEncodable, Hashable {
2121
public var clientNetworks: String?
2222
/** Shared secret between clients and server to hash packets. */
2323
public var sharedSecret: String?
24+
/** When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
25+
public var mfaSupport: Bool?
2426

25-
public init(pk: Int, name: String, applicationSlug: String, authFlowSlug: String, clientNetworks: String? = nil, sharedSecret: String? = nil) {
27+
public init(pk: Int, name: String, applicationSlug: String, authFlowSlug: String, clientNetworks: String? = nil, sharedSecret: String? = nil, mfaSupport: Bool? = nil) {
2628
self.pk = pk
2729
self.name = name
2830
self.applicationSlug = applicationSlug
2931
self.authFlowSlug = authFlowSlug
3032
self.clientNetworks = clientNetworks
3133
self.sharedSecret = sharedSecret
34+
self.mfaSupport = mfaSupport
3235
}
3336

3437
public enum CodingKeys: String, CodingKey, CaseIterable {
@@ -38,6 +41,7 @@ public struct RadiusOutpostConfig: Codable, JSONEncodable, Hashable {
3841
case authFlowSlug = "auth_flow_slug"
3942
case clientNetworks = "client_networks"
4043
case sharedSecret = "shared_secret"
44+
case mfaSupport = "mfa_support"
4145
}
4246

4347
// Encodable protocol methods
@@ -50,6 +54,7 @@ public struct RadiusOutpostConfig: Codable, JSONEncodable, Hashable {
5054
try container.encode(authFlowSlug, forKey: .authFlowSlug)
5155
try container.encodeIfPresent(clientNetworks, forKey: .clientNetworks)
5256
try container.encodeIfPresent(sharedSecret, forKey: .sharedSecret)
57+
try container.encodeIfPresent(mfaSupport, forKey: .mfaSupport)
5358
}
5459
}
5560

authentikClient/Classes/OpenAPIs/Models/RadiusProvider.swift

+6-1
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,10 @@ public struct RadiusProvider: Codable, JSONEncodable, Hashable {
4141
/** Shared secret between clients and server to hash packets. */
4242
public var sharedSecret: String?
4343
public var outpostSet: [String]
44+
/** When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
45+
public var mfaSupport: Bool?
4446

45-
public init(pk: Int, name: String, authenticationFlow: UUID? = nil, authorizationFlow: UUID, propertyMappings: [UUID]? = nil, component: String, assignedApplicationSlug: String, assignedApplicationName: String, assignedBackchannelApplicationSlug: String, assignedBackchannelApplicationName: String, verboseName: String, verboseNamePlural: String, metaModelName: String, clientNetworks: String? = nil, sharedSecret: String? = nil, outpostSet: [String]) {
47+
public init(pk: Int, name: String, authenticationFlow: UUID? = nil, authorizationFlow: UUID, propertyMappings: [UUID]? = nil, component: String, assignedApplicationSlug: String, assignedApplicationName: String, assignedBackchannelApplicationSlug: String, assignedBackchannelApplicationName: String, verboseName: String, verboseNamePlural: String, metaModelName: String, clientNetworks: String? = nil, sharedSecret: String? = nil, outpostSet: [String], mfaSupport: Bool? = nil) {
4648
self.pk = pk
4749
self.name = name
4850
self.authenticationFlow = authenticationFlow
@@ -59,6 +61,7 @@ public struct RadiusProvider: Codable, JSONEncodable, Hashable {
5961
self.clientNetworks = clientNetworks
6062
self.sharedSecret = sharedSecret
6163
self.outpostSet = outpostSet
64+
self.mfaSupport = mfaSupport
6265
}
6366

6467
public enum CodingKeys: String, CodingKey, CaseIterable {
@@ -78,6 +81,7 @@ public struct RadiusProvider: Codable, JSONEncodable, Hashable {
7881
case clientNetworks = "client_networks"
7982
case sharedSecret = "shared_secret"
8083
case outpostSet = "outpost_set"
84+
case mfaSupport = "mfa_support"
8185
}
8286

8387
// Encodable protocol methods
@@ -100,6 +104,7 @@ public struct RadiusProvider: Codable, JSONEncodable, Hashable {
100104
try container.encodeIfPresent(clientNetworks, forKey: .clientNetworks)
101105
try container.encodeIfPresent(sharedSecret, forKey: .sharedSecret)
102106
try container.encode(outpostSet, forKey: .outpostSet)
107+
try container.encodeIfPresent(mfaSupport, forKey: .mfaSupport)
103108
}
104109
}
105110

authentikClient/Classes/OpenAPIs/Models/RadiusProviderRequest.swift

+6-1
Original file line numberDiff line numberDiff line change
@@ -23,14 +23,17 @@ public struct RadiusProviderRequest: Codable, JSONEncodable, Hashable {
2323
public var clientNetworks: String?
2424
/** Shared secret between clients and server to hash packets. */
2525
public var sharedSecret: String?
26+
/** When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
27+
public var mfaSupport: Bool?
2628

27-
public init(name: String, authenticationFlow: UUID? = nil, authorizationFlow: UUID, propertyMappings: [UUID]? = nil, clientNetworks: String? = nil, sharedSecret: String? = nil) {
29+
public init(name: String, authenticationFlow: UUID? = nil, authorizationFlow: UUID, propertyMappings: [UUID]? = nil, clientNetworks: String? = nil, sharedSecret: String? = nil, mfaSupport: Bool? = nil) {
2830
self.name = name
2931
self.authenticationFlow = authenticationFlow
3032
self.authorizationFlow = authorizationFlow
3133
self.propertyMappings = propertyMappings
3234
self.clientNetworks = clientNetworks
3335
self.sharedSecret = sharedSecret
36+
self.mfaSupport = mfaSupport
3437
}
3538

3639
public enum CodingKeys: String, CodingKey, CaseIterable {
@@ -40,6 +43,7 @@ public struct RadiusProviderRequest: Codable, JSONEncodable, Hashable {
4043
case propertyMappings = "property_mappings"
4144
case clientNetworks = "client_networks"
4245
case sharedSecret = "shared_secret"
46+
case mfaSupport = "mfa_support"
4347
}
4448

4549
// Encodable protocol methods
@@ -52,6 +56,7 @@ public struct RadiusProviderRequest: Codable, JSONEncodable, Hashable {
5256
try container.encodeIfPresent(propertyMappings, forKey: .propertyMappings)
5357
try container.encodeIfPresent(clientNetworks, forKey: .clientNetworks)
5458
try container.encodeIfPresent(sharedSecret, forKey: .sharedSecret)
59+
try container.encodeIfPresent(mfaSupport, forKey: .mfaSupport)
5560
}
5661
}
5762

docs/PatchedRadiusProviderRequest.md

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ Name | Type | Description | Notes
99
**propertyMappings** | **[UUID]** | | [optional]
1010
**clientNetworks** | **String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
1111
**sharedSecret** | **String** | Shared secret between clients and server to hash packets. | [optional]
12+
**mfaSupport** | **Bool** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]
1213

1314
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)
1415

docs/ProvidersAPI.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -1563,7 +1563,7 @@ RadiusProvider Viewset
15631563
// The following code samples are still beta. For any issue, please report via http://github.com/OpenAPITools/openapi-generator/issues/new
15641564
import authentikClient
15651565

1566-
let radiusProviderRequest = RadiusProviderRequest(name: "name_example", authenticationFlow: 123, authorizationFlow: 123, propertyMappings: [123], clientNetworks: "clientNetworks_example", sharedSecret: "sharedSecret_example") // RadiusProviderRequest |
1566+
let radiusProviderRequest = RadiusProviderRequest(name: "name_example", authenticationFlow: 123, authorizationFlow: 123, propertyMappings: [123], clientNetworks: "clientNetworks_example", sharedSecret: "sharedSecret_example", mfaSupport: false) // RadiusProviderRequest |
15671567

15681568
ProvidersAPI.providersRadiusCreate(radiusProviderRequest: radiusProviderRequest) { (response, error) in
15691569
guard error == nil else {
@@ -1725,7 +1725,7 @@ RadiusProvider Viewset
17251725
import authentikClient
17261726

17271727
let id = 987 // Int | A unique integer value identifying this Radius Provider.
1728-
let patchedRadiusProviderRequest = PatchedRadiusProviderRequest(name: "name_example", authenticationFlow: 123, authorizationFlow: 123, propertyMappings: [123], clientNetworks: "clientNetworks_example", sharedSecret: "sharedSecret_example") // PatchedRadiusProviderRequest | (optional)
1728+
let patchedRadiusProviderRequest = PatchedRadiusProviderRequest(name: "name_example", authenticationFlow: 123, authorizationFlow: 123, propertyMappings: [123], clientNetworks: "clientNetworks_example", sharedSecret: "sharedSecret_example", mfaSupport: false) // PatchedRadiusProviderRequest | (optional)
17291729

17301730
ProvidersAPI.providersRadiusPartialUpdate(id: id, patchedRadiusProviderRequest: patchedRadiusProviderRequest) { (response, error) in
17311731
guard error == nil else {
@@ -1825,7 +1825,7 @@ RadiusProvider Viewset
18251825
import authentikClient
18261826

18271827
let id = 987 // Int | A unique integer value identifying this Radius Provider.
1828-
let radiusProviderRequest = RadiusProviderRequest(name: "name_example", authenticationFlow: 123, authorizationFlow: 123, propertyMappings: [123], clientNetworks: "clientNetworks_example", sharedSecret: "sharedSecret_example") // RadiusProviderRequest |
1828+
let radiusProviderRequest = RadiusProviderRequest(name: "name_example", authenticationFlow: 123, authorizationFlow: 123, propertyMappings: [123], clientNetworks: "clientNetworks_example", sharedSecret: "sharedSecret_example", mfaSupport: false) // RadiusProviderRequest |
18291829

18301830
ProvidersAPI.providersRadiusUpdate(id: id, radiusProviderRequest: radiusProviderRequest) { (response, error) in
18311831
guard error == nil else {

docs/RadiusOutpostConfig.md

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ Name | Type | Description | Notes
99
**authFlowSlug** | **String** | |
1010
**clientNetworks** | **String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
1111
**sharedSecret** | **String** | Shared secret between clients and server to hash packets. | [optional]
12+
**mfaSupport** | **Bool** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]
1213

1314
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)
1415

docs/RadiusProvider.md

+1
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ Name | Type | Description | Notes
1919
**clientNetworks** | **String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
2020
**sharedSecret** | **String** | Shared secret between clients and server to hash packets. | [optional]
2121
**outpostSet** | **[String]** | | [readonly]
22+
**mfaSupport** | **Bool** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]
2223

2324
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)
2425

docs/RadiusProviderRequest.md

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ Name | Type | Description | Notes
99
**propertyMappings** | **[UUID]** | | [optional]
1010
**clientNetworks** | **String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
1111
**sharedSecret** | **String** | Shared secret between clients and server to hash packets. | [optional]
12+
**mfaSupport** | **Bool** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]
1213

1314
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)
1415

schema.yml

+28
Original file line numberDiff line numberDiff line change
@@ -37484,6 +37484,13 @@ components:
3748437484
type: string
3748537485
minLength: 1
3748637486
description: Shared secret between clients and server to hash packets.
37487+
mfa_support:
37488+
type: boolean
37489+
description: When enabled, code-based multi-factor authentication can be
37490+
used by appending a semicolon and the TOTP code to the password. This
37491+
should only be enabled if all users that will bind to this provider have
37492+
a TOTP device configured, as otherwise a password may incorrectly be rejected
37493+
if it contains a semicolon.
3748737494
PatchedReputationPolicyRequest:
3748837495
type: object
3748937496
description: Reputation Policy Serializer
@@ -39379,6 +39386,13 @@ components:
3937939386
shared_secret:
3938039387
type: string
3938139388
description: Shared secret between clients and server to hash packets.
39389+
mfa_support:
39390+
type: boolean
39391+
description: When enabled, code-based multi-factor authentication can be
39392+
used by appending a semicolon and the TOTP code to the password. This
39393+
should only be enabled if all users that will bind to this provider have
39394+
a TOTP device configured, as otherwise a password may incorrectly be rejected
39395+
if it contains a semicolon.
3938239396
required:
3938339397
- application_slug
3938439398
- auth_flow_slug
@@ -39454,6 +39468,13 @@ components:
3945439468
items:
3945539469
type: string
3945639470
readOnly: true
39471+
mfa_support:
39472+
type: boolean
39473+
description: When enabled, code-based multi-factor authentication can be
39474+
used by appending a semicolon and the TOTP code to the password. This
39475+
should only be enabled if all users that will bind to this provider have
39476+
a TOTP device configured, as otherwise a password may incorrectly be rejected
39477+
if it contains a semicolon.
3945739478
required:
3945839479
- assigned_application_name
3945939480
- assigned_application_slug
@@ -39499,6 +39520,13 @@ components:
3949939520
type: string
3950039521
minLength: 1
3950139522
description: Shared secret between clients and server to hash packets.
39523+
mfa_support:
39524+
type: boolean
39525+
description: When enabled, code-based multi-factor authentication can be
39526+
used by appending a semicolon and the TOTP code to the password. This
39527+
should only be enabled if all users that will bind to this provider have
39528+
a TOTP device configured, as otherwise a password may incorrectly be rejected
39529+
if it contains a semicolon.
3950239530
required:
3950339531
- authorization_flow
3950439532
- name

0 commit comments

Comments
 (0)