authentik_client/models/
kerberos_source_request.rs1use crate::models;
12use serde::{Deserialize, Serialize};
13
14#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
16pub struct KerberosSourceRequest {
17 #[serde(rename = "name")]
19 pub name: String,
20 #[serde(rename = "slug")]
22 pub slug: String,
23 #[serde(rename = "enabled", skip_serializing_if = "Option::is_none")]
24 pub enabled: Option<bool>,
25 #[serde(
27 rename = "authentication_flow",
28 default,
29 with = "::serde_with::rust::double_option",
30 skip_serializing_if = "Option::is_none"
31 )]
32 pub authentication_flow: Option<Option<uuid::Uuid>>,
33 #[serde(
35 rename = "enrollment_flow",
36 default,
37 with = "::serde_with::rust::double_option",
38 skip_serializing_if = "Option::is_none"
39 )]
40 pub enrollment_flow: Option<Option<uuid::Uuid>>,
41 #[serde(rename = "user_property_mappings", skip_serializing_if = "Option::is_none")]
42 pub user_property_mappings: Option<Vec<uuid::Uuid>>,
43 #[serde(rename = "group_property_mappings", skip_serializing_if = "Option::is_none")]
44 pub group_property_mappings: Option<Vec<uuid::Uuid>>,
45 #[serde(rename = "policy_engine_mode", skip_serializing_if = "Option::is_none")]
46 pub policy_engine_mode: Option<models::PolicyEngineMode>,
47 #[serde(rename = "user_matching_mode", skip_serializing_if = "Option::is_none")]
49 pub user_matching_mode: Option<models::UserMatchingModeEnum>,
50 #[serde(rename = "user_path_template", skip_serializing_if = "Option::is_none")]
51 pub user_path_template: Option<String>,
52 #[serde(rename = "group_matching_mode", skip_serializing_if = "Option::is_none")]
54 pub group_matching_mode: Option<models::GroupMatchingModeEnum>,
55 #[serde(rename = "realm")]
57 pub realm: String,
58 #[serde(rename = "krb5_conf", skip_serializing_if = "Option::is_none")]
60 pub krb5_conf: Option<String>,
61 #[serde(rename = "kadmin_type", skip_serializing_if = "Option::is_none")]
63 pub kadmin_type: Option<models::KadminTypeEnum>,
64 #[serde(rename = "sync_users", skip_serializing_if = "Option::is_none")]
66 pub sync_users: Option<bool>,
67 #[serde(rename = "sync_users_password", skip_serializing_if = "Option::is_none")]
69 pub sync_users_password: Option<bool>,
70 #[serde(rename = "sync_principal", skip_serializing_if = "Option::is_none")]
72 pub sync_principal: Option<String>,
73 #[serde(rename = "sync_password", skip_serializing_if = "Option::is_none")]
75 pub sync_password: Option<String>,
76 #[serde(rename = "sync_keytab", skip_serializing_if = "Option::is_none")]
78 pub sync_keytab: Option<String>,
79 #[serde(rename = "sync_ccache", skip_serializing_if = "Option::is_none")]
81 pub sync_ccache: Option<String>,
82 #[serde(rename = "spnego_server_name", skip_serializing_if = "Option::is_none")]
84 pub spnego_server_name: Option<String>,
85 #[serde(rename = "spnego_keytab", skip_serializing_if = "Option::is_none")]
87 pub spnego_keytab: Option<String>,
88 #[serde(rename = "spnego_ccache", skip_serializing_if = "Option::is_none")]
90 pub spnego_ccache: Option<String>,
91 #[serde(
93 rename = "password_login_update_internal_password",
94 skip_serializing_if = "Option::is_none"
95 )]
96 pub password_login_update_internal_password: Option<bool>,
97}
98
99impl KerberosSourceRequest {
100 pub fn new(name: String, slug: String, realm: String) -> KerberosSourceRequest {
102 KerberosSourceRequest {
103 name,
104 slug,
105 enabled: None,
106 authentication_flow: None,
107 enrollment_flow: None,
108 user_property_mappings: None,
109 group_property_mappings: None,
110 policy_engine_mode: None,
111 user_matching_mode: None,
112 user_path_template: None,
113 group_matching_mode: None,
114 realm,
115 krb5_conf: None,
116 kadmin_type: None,
117 sync_users: None,
118 sync_users_password: None,
119 sync_principal: None,
120 sync_password: None,
121 sync_keytab: None,
122 sync_ccache: None,
123 spnego_server_name: None,
124 spnego_keytab: None,
125 spnego_ccache: None,
126 password_login_update_internal_password: None,
127 }
128 }
129}