Skip to content
This repository has been archived by the owner on Apr 17, 2024. It is now read-only.

Commit

Permalink
Update API Client
Browse files Browse the repository at this point in the history
#### What's Changed
---

##### `GET` /outposts/radius/{id}/

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Added property `mfa_support` (boolean)
        > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.

##### `GET` /providers/radius/{id}/

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Added property `mfa_support` (boolean)
        > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.

##### `PUT` /providers/radius/{id}/

###### Request:

Changed content type : `application/json`

* Added property `mfa_support` (boolean)
    > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Added property `mfa_support` (boolean)
        > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.

##### `PATCH` /providers/radius/{id}/

###### Request:

Changed content type : `application/json`

* Added property `mfa_support` (boolean)
    > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Added property `mfa_support` (boolean)
        > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.

##### `GET` /outposts/radius/

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Changed property `results` (array)

        Changed items (object):
            > RadiusProvider Serializer

        * Added property `mfa_support` (boolean)
            > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.

##### `POST` /providers/radius/

###### Request:

Changed content type : `application/json`

* Added property `mfa_support` (boolean)
    > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.

###### Return Type:

Changed response : **201 Created**

* Changed content type : `application/json`

    * Added property `mfa_support` (boolean)
        > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.

##### `GET` /providers/radius/

###### Return Type:

Changed response : **200 OK**

* Changed content type : `application/json`

    * Changed property `results` (array)

        Changed items (object):
            > RadiusProvider Serializer

        * Added property `mfa_support` (boolean)
            > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.

##### `PUT` /core/transactional/applications/

###### Request:

Changed content type : `application/json`

* Changed property `provider` (object)

    Updated `authentik_providers_radius.radiusprovider` provider_model:
    * Added property `mfa_support` (boolean)
        > When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
  • Loading branch information
authentik-automation[bot] committed Oct 18, 2023
1 parent bfb43c3 commit 844e29f
Show file tree
Hide file tree
Showing 9 changed files with 56 additions and 4 deletions.
1 change: 1 addition & 0 deletions docs/PatchedRadiusProviderRequest.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ Name | Type | Description | Notes
**propertyMappings** | [**kotlin.collections.List<java.util.UUID>**](java.util.UUID.md) | | [optional]
**clientNetworks** | **kotlin.String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
**sharedSecret** | **kotlin.String** | Shared secret between clients and server to hash packets. | [optional]
**mfaSupport** | **kotlin.Boolean** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]



1 change: 1 addition & 0 deletions docs/RadiusOutpostConfig.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ Name | Type | Description | Notes
**authFlowSlug** | **kotlin.String** | |
**clientNetworks** | **kotlin.String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
**sharedSecret** | **kotlin.String** | Shared secret between clients and server to hash packets. | [optional]
**mfaSupport** | **kotlin.Boolean** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]



1 change: 1 addition & 0 deletions docs/RadiusProvider.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ Name | Type | Description | Notes
**propertyMappings** | [**kotlin.collections.List<java.util.UUID>**](java.util.UUID.md) | | [optional]
**clientNetworks** | **kotlin.String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
**sharedSecret** | **kotlin.String** | Shared secret between clients and server to hash packets. | [optional]
**mfaSupport** | **kotlin.Boolean** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]



1 change: 1 addition & 0 deletions docs/RadiusProviderRequest.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ Name | Type | Description | Notes
**propertyMappings** | [**kotlin.collections.List<java.util.UUID>**](java.util.UUID.md) | | [optional]
**clientNetworks** | **kotlin.String** | List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped. | [optional]
**sharedSecret** | **kotlin.String** | Shared secret between clients and server to hash packets. | [optional]
**mfaSupport** | **kotlin.Boolean** | When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. | [optional]



28 changes: 28 additions & 0 deletions schema.yml
Original file line number Diff line number Diff line change
Expand Up @@ -37484,6 +37484,13 @@ components:
type: string
minLength: 1
description: Shared secret between clients and server to hash packets.
mfa_support:
type: boolean
description: When enabled, code-based multi-factor authentication can be
used by appending a semicolon and the TOTP code to the password. This
should only be enabled if all users that will bind to this provider have
a TOTP device configured, as otherwise a password may incorrectly be rejected
if it contains a semicolon.
PatchedReputationPolicyRequest:
type: object
description: Reputation Policy Serializer
Expand Down Expand Up @@ -39379,6 +39386,13 @@ components:
shared_secret:
type: string
description: Shared secret between clients and server to hash packets.
mfa_support:
type: boolean
description: When enabled, code-based multi-factor authentication can be
used by appending a semicolon and the TOTP code to the password. This
should only be enabled if all users that will bind to this provider have
a TOTP device configured, as otherwise a password may incorrectly be rejected
if it contains a semicolon.
required:
- application_slug
- auth_flow_slug
Expand Down Expand Up @@ -39454,6 +39468,13 @@ components:
items:
type: string
readOnly: true
mfa_support:
type: boolean
description: When enabled, code-based multi-factor authentication can be
used by appending a semicolon and the TOTP code to the password. This
should only be enabled if all users that will bind to this provider have
a TOTP device configured, as otherwise a password may incorrectly be rejected
if it contains a semicolon.
required:
- assigned_application_name
- assigned_application_slug
Expand Down Expand Up @@ -39499,6 +39520,13 @@ components:
type: string
minLength: 1
description: Shared secret between clients and server to hash packets.
mfa_support:
type: boolean
description: When enabled, code-based multi-factor authentication can be
used by appending a semicolon and the TOTP code to the password. This
should only be enabled if all users that will bind to this provider have
a TOTP device configured, as otherwise a password may incorrectly be rejected
if it contains a semicolon.
required:
- authorization_flow
- name
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ import com.squareup.moshi.Json
* @param propertyMappings
* @param clientNetworks List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped.
* @param sharedSecret Shared secret between clients and server to hash packets.
* @param mfaSupport When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
*/

data class PatchedRadiusProviderRequest (
Expand All @@ -56,7 +57,11 @@ data class PatchedRadiusProviderRequest (

/* Shared secret between clients and server to hash packets. */
@Json(name = "shared_secret")
val sharedSecret: kotlin.String? = null
val sharedSecret: kotlin.String? = null,

/* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
@Json(name = "mfa_support")
val mfaSupport: kotlin.Boolean? = null

)

Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ import com.squareup.moshi.Json
* @param authFlowSlug
* @param clientNetworks List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped.
* @param sharedSecret Shared secret between clients and server to hash packets.
* @param mfaSupport When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
*/

data class RadiusOutpostConfig (
Expand All @@ -54,7 +55,11 @@ data class RadiusOutpostConfig (

/* Shared secret between clients and server to hash packets. */
@Json(name = "shared_secret")
val sharedSecret: kotlin.String? = null
val sharedSecret: kotlin.String? = null,

/* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
@Json(name = "mfa_support")
val mfaSupport: kotlin.Boolean? = null

)

7 changes: 6 additions & 1 deletion src/main/kotlin/io/goauthentik/api/models/RadiusProvider.kt
Original file line number Diff line number Diff line change
Expand Up @@ -42,6 +42,7 @@ import com.squareup.moshi.Json
* @param propertyMappings
* @param clientNetworks List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped.
* @param sharedSecret Shared secret between clients and server to hash packets.
* @param mfaSupport When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
*/

data class RadiusProvider (
Expand Down Expand Up @@ -104,7 +105,11 @@ data class RadiusProvider (

/* Shared secret between clients and server to hash packets. */
@Json(name = "shared_secret")
val sharedSecret: kotlin.String? = null
val sharedSecret: kotlin.String? = null,

/* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
@Json(name = "mfa_support")
val mfaSupport: kotlin.Boolean? = null

)

Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ import com.squareup.moshi.Json
* @param propertyMappings
* @param clientNetworks List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped.
* @param sharedSecret Shared secret between clients and server to hash packets.
* @param mfaSupport When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.
*/

data class RadiusProviderRequest (
Expand All @@ -56,7 +57,11 @@ data class RadiusProviderRequest (

/* Shared secret between clients and server to hash packets. */
@Json(name = "shared_secret")
val sharedSecret: kotlin.String? = null
val sharedSecret: kotlin.String? = null,

/* When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon. */
@Json(name = "mfa_support")
val mfaSupport: kotlin.Boolean? = null

)

0 comments on commit 844e29f

Please sign in to comment.