Switched kc_sdk to fetch
This commit is contained in:
157
backend/keycloak/kc-client/apis/AttackDetectionApi.ts
Normal file
157
backend/keycloak/kc-client/apis/AttackDetectionApi.ts
Normal file
@@ -0,0 +1,157 @@
|
||||
/* tslint:disable */
|
||||
/* eslint-disable */
|
||||
/**
|
||||
* Keycloak Admin REST API
|
||||
* This is a REST API reference for the Keycloak Admin
|
||||
*
|
||||
* The version of the OpenAPI document: 1
|
||||
*
|
||||
*
|
||||
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
||||
* https://openapi-generator.tech
|
||||
* Do not edit the class manually.
|
||||
*/
|
||||
|
||||
|
||||
import * as runtime from '../runtime';
|
||||
|
||||
export interface RealmAttackDetectionBruteForceUsersDeleteRequest {
|
||||
realm: string;
|
||||
}
|
||||
|
||||
export interface RealmAttackDetectionBruteForceUsersUserIdDeleteRequest {
|
||||
realm: string;
|
||||
userId: string;
|
||||
}
|
||||
|
||||
export interface RealmAttackDetectionBruteForceUsersUserIdGetRequest {
|
||||
realm: string;
|
||||
userId: string;
|
||||
}
|
||||
|
||||
/**
|
||||
*
|
||||
*/
|
||||
export class AttackDetectionApi extends runtime.BaseAPI {
|
||||
|
||||
/**
|
||||
* Clear any user login failures for all users This can release temporary disabled users
|
||||
*/
|
||||
async realmAttackDetectionBruteForceUsersDeleteRaw(requestParameters: RealmAttackDetectionBruteForceUsersDeleteRequest): Promise<runtime.ApiResponse<void>> {
|
||||
if (requestParameters.realm === null || requestParameters.realm === undefined) {
|
||||
throw new runtime.RequiredError('realm','Required parameter requestParameters.realm was null or undefined when calling realmAttackDetectionBruteForceUsersDelete.');
|
||||
}
|
||||
|
||||
const queryParameters: runtime.HTTPQuery = {};
|
||||
|
||||
const headerParameters: runtime.HTTPHeaders = {};
|
||||
|
||||
if (this.configuration && this.configuration.accessToken) {
|
||||
const token = this.configuration.accessToken;
|
||||
const tokenString = typeof token === 'function' ? token("access_token", []) : token;
|
||||
|
||||
if (tokenString) {
|
||||
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
||||
}
|
||||
}
|
||||
const response = await this.request({
|
||||
path: `/{realm}/attack-detection/brute-force/users`.replace(`{${"realm"}}`, encodeURIComponent(String(requestParameters.realm))),
|
||||
method: 'DELETE',
|
||||
headers: headerParameters,
|
||||
query: queryParameters,
|
||||
});
|
||||
|
||||
return new runtime.VoidApiResponse(response);
|
||||
}
|
||||
|
||||
/**
|
||||
* Clear any user login failures for all users This can release temporary disabled users
|
||||
*/
|
||||
async realmAttackDetectionBruteForceUsersDelete(requestParameters: RealmAttackDetectionBruteForceUsersDeleteRequest): Promise<void> {
|
||||
await this.realmAttackDetectionBruteForceUsersDeleteRaw(requestParameters);
|
||||
}
|
||||
|
||||
/**
|
||||
* Clear any user login failures for the user This can release temporary disabled user
|
||||
*/
|
||||
async realmAttackDetectionBruteForceUsersUserIdDeleteRaw(requestParameters: RealmAttackDetectionBruteForceUsersUserIdDeleteRequest): Promise<runtime.ApiResponse<void>> {
|
||||
if (requestParameters.realm === null || requestParameters.realm === undefined) {
|
||||
throw new runtime.RequiredError('realm','Required parameter requestParameters.realm was null or undefined when calling realmAttackDetectionBruteForceUsersUserIdDelete.');
|
||||
}
|
||||
|
||||
if (requestParameters.userId === null || requestParameters.userId === undefined) {
|
||||
throw new runtime.RequiredError('userId','Required parameter requestParameters.userId was null or undefined when calling realmAttackDetectionBruteForceUsersUserIdDelete.');
|
||||
}
|
||||
|
||||
const queryParameters: runtime.HTTPQuery = {};
|
||||
|
||||
const headerParameters: runtime.HTTPHeaders = {};
|
||||
|
||||
if (this.configuration && this.configuration.accessToken) {
|
||||
const token = this.configuration.accessToken;
|
||||
const tokenString = typeof token === 'function' ? token("access_token", []) : token;
|
||||
|
||||
if (tokenString) {
|
||||
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
||||
}
|
||||
}
|
||||
const response = await this.request({
|
||||
path: `/{realm}/attack-detection/brute-force/users/{userId}`.replace(`{${"realm"}}`, encodeURIComponent(String(requestParameters.realm))).replace(`{${"userId"}}`, encodeURIComponent(String(requestParameters.userId))),
|
||||
method: 'DELETE',
|
||||
headers: headerParameters,
|
||||
query: queryParameters,
|
||||
});
|
||||
|
||||
return new runtime.VoidApiResponse(response);
|
||||
}
|
||||
|
||||
/**
|
||||
* Clear any user login failures for the user This can release temporary disabled user
|
||||
*/
|
||||
async realmAttackDetectionBruteForceUsersUserIdDelete(requestParameters: RealmAttackDetectionBruteForceUsersUserIdDeleteRequest): Promise<void> {
|
||||
await this.realmAttackDetectionBruteForceUsersUserIdDeleteRaw(requestParameters);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get status of a username in brute force detection
|
||||
*/
|
||||
async realmAttackDetectionBruteForceUsersUserIdGetRaw(requestParameters: RealmAttackDetectionBruteForceUsersUserIdGetRequest): Promise<runtime.ApiResponse<{ [key: string]: object; }>> {
|
||||
if (requestParameters.realm === null || requestParameters.realm === undefined) {
|
||||
throw new runtime.RequiredError('realm','Required parameter requestParameters.realm was null or undefined when calling realmAttackDetectionBruteForceUsersUserIdGet.');
|
||||
}
|
||||
|
||||
if (requestParameters.userId === null || requestParameters.userId === undefined) {
|
||||
throw new runtime.RequiredError('userId','Required parameter requestParameters.userId was null or undefined when calling realmAttackDetectionBruteForceUsersUserIdGet.');
|
||||
}
|
||||
|
||||
const queryParameters: runtime.HTTPQuery = {};
|
||||
|
||||
const headerParameters: runtime.HTTPHeaders = {};
|
||||
|
||||
if (this.configuration && this.configuration.accessToken) {
|
||||
const token = this.configuration.accessToken;
|
||||
const tokenString = typeof token === 'function' ? token("access_token", []) : token;
|
||||
|
||||
if (tokenString) {
|
||||
headerParameters["Authorization"] = `Bearer ${tokenString}`;
|
||||
}
|
||||
}
|
||||
const response = await this.request({
|
||||
path: `/{realm}/attack-detection/brute-force/users/{userId}`.replace(`{${"realm"}}`, encodeURIComponent(String(requestParameters.realm))).replace(`{${"userId"}}`, encodeURIComponent(String(requestParameters.userId))),
|
||||
method: 'GET',
|
||||
headers: headerParameters,
|
||||
query: queryParameters,
|
||||
});
|
||||
|
||||
return new runtime.JSONApiResponse<any>(response);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get status of a username in brute force detection
|
||||
*/
|
||||
async realmAttackDetectionBruteForceUsersUserIdGet(requestParameters: RealmAttackDetectionBruteForceUsersUserIdGetRequest): Promise<{ [key: string]: object; }> {
|
||||
const response = await this.realmAttackDetectionBruteForceUsersUserIdGetRaw(requestParameters);
|
||||
return await response.value();
|
||||
}
|
||||
|
||||
}
|
||||
Reference in New Issue
Block a user