Skip to content

Commit 18043fc

Browse files
-e Update API Client
#### What's Changed --- ##### `GET` /core/authenticated_sessions/{uuid}/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `geo_ip` (object) > Get GeoIP Data * Changed property `continent` (string) * Changed property `country` (string) * Changed property `lat` (number) * Changed property `long` (number) * Changed property `asn` (object) > Get ASN Data * Changed property `asn` (integer) ##### `GET` /policies/event_matcher/{policy_uuid}/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `app` (string) > Match events created by selected application. When left empty, all applications are matched. Added enum value: * `authentik.enterprise.providers.radius` ##### `PUT` /policies/event_matcher/{policy_uuid}/ ###### Request: Changed content type : `application/json` * Changed property `app` (string) > Match events created by selected application. When left empty, all applications are matched. Added enum value: * `authentik.enterprise.providers.radius` ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `app` (string) > Match events created by selected application. When left empty, all applications are matched. Added enum value: * `authentik.enterprise.providers.radius` ##### `PATCH` /policies/event_matcher/{policy_uuid}/ ###### Request: Changed content type : `application/json` * Changed property `app` (string) > Match events created by selected application. When left empty, all applications are matched. Added enum value: * `authentik.enterprise.providers.radius` ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `app` (string) > Match events created by selected application. When left empty, all applications are matched. Added enum value: * `authentik.enterprise.providers.radius` ##### `GET` /providers/radius/{id}/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `certificate` (string) ##### `PUT` /providers/radius/{id}/ ###### Request: Changed content type : `application/json` * Added property `certificate` (string) ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `certificate` (string) ##### `PATCH` /providers/radius/{id}/ ###### Request: Changed content type : `application/json` * Added property `certificate` (string) ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `certificate` (string) ##### `GET` /core/authenticated_sessions/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `results` (array) Changed items (object): > AuthenticatedSession Serializer * Changed property `geo_ip` (object) > Get GeoIP Data * Changed property `continent` (string) * Changed property `country` (string) * Changed property `lat` (number) * Changed property `long` (number) * Changed property `asn` (object) > Get ASN Data * Changed property `asn` (integer) ##### `GET` /outposts/radius/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `results` (array) Changed items (object): > RadiusProvider Serializer * Added property `certificate` (string) ##### `POST` /policies/event_matcher/ ###### Request: Changed content type : `application/json` * Changed property `app` (string) > Match events created by selected application. When left empty, all applications are matched. Added enum value: * `authentik.enterprise.providers.radius` ###### Return Type: Changed response : **201 Created** * Changed content type : `application/json` * Changed property `app` (string) > Match events created by selected application. When left empty, all applications are matched. Added enum value: * `authentik.enterprise.providers.radius` ##### `GET` /policies/event_matcher/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `results` (array) Changed items (object): > Event Matcher Policy Serializer * Changed property `app` (string) > Match events created by selected application. When left empty, all applications are matched. Added enum value: * `authentik.enterprise.providers.radius` ##### `POST` /providers/radius/ ###### Request: Changed content type : `application/json` * Added property `certificate` (string) ###### Return Type: Changed response : **201 Created** * Changed content type : `application/json` * Added property `certificate` (string) ##### `GET` /providers/radius/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `results` (array) Changed items (object): > RadiusProvider Serializer * Added property `certificate` (string) ##### `PUT` /core/transactional/applications/ ###### Request: Changed content type : `application/json` * Changed property `provider` (object) Updated `authentik_providers_radius.radiusprovider` provider_model: * Added property `certificate` (string)
1 parent 90115ef commit 18043fc

25 files changed

+119
-28
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This repo contains a generated API client to talk with authentik's API from Pyth
1616
This Python package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
1717

1818
- API version: 2025.10.0-rc1
19-
- Package version: 2025.10.0-rc1-1758643784
19+
- Package version: 2025.10.0-rc1-1758665240
2020
- Generator version: 7.15.0
2121
- Build package: org.openapitools.codegen.languages.PythonClientCodegen
2222

authentik_client/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
""" # noqa: E501
1616

1717

18-
__version__ = "2025.10.0-rc1-1758643784"
18+
__version__ = "2025.10.0-rc1-1758665240"
1919

2020
# Define package exports
2121
__all__ = [

authentik_client/api_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ def __init__(
9292
self.default_headers[header_name] = header_value
9393
self.cookie = cookie
9494
# Set default User-Agent.
95-
self.user_agent = 'OpenAPI-Generator/2025.10.0-rc1-1758643784/python'
95+
self.user_agent = 'OpenAPI-Generator/2025.10.0-rc1-1758665240/python'
9696
self.client_side_validation = configuration.client_side_validation
9797

9898
def __enter__(self):

authentik_client/configuration.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -511,7 +511,7 @@ def to_debug_report(self) -> str:
511511
"OS: {env}\n"\
512512
"Python Version: {pyversion}\n"\
513513
"Version of the API: 2025.10.0-rc1\n"\
514-
"SDK Package Version: 2025.10.0-rc1-1758643784".\
514+
"SDK Package Version: 2025.10.0-rc1-1758665240".\
515515
format(env=sys.platform, pyversion=sys.version)
516516

517517
def get_host_settings(self) -> List[HostSetting]:

authentik_client/models/app_enum.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,7 @@ class AppEnum(str, Enum):
8989
AUTHENTIK_DOT_ENTERPRISE_DOT_POLICIES_DOT_UNIQUE_PASSWORD = 'authentik.enterprise.policies.unique_password'
9090
AUTHENTIK_DOT_ENTERPRISE_DOT_PROVIDERS_DOT_GOOGLE_WORKSPACE = 'authentik.enterprise.providers.google_workspace'
9191
AUTHENTIK_DOT_ENTERPRISE_DOT_PROVIDERS_DOT_MICROSOFT_ENTRA = 'authentik.enterprise.providers.microsoft_entra'
92+
AUTHENTIK_DOT_ENTERPRISE_DOT_PROVIDERS_DOT_RADIUS = 'authentik.enterprise.providers.radius'
9293
AUTHENTIK_DOT_ENTERPRISE_DOT_PROVIDERS_DOT_SCIM = 'authentik.enterprise.providers.scim'
9394
AUTHENTIK_DOT_ENTERPRISE_DOT_PROVIDERS_DOT_SSF = 'authentik.enterprise.providers.ssf'
9495
AUTHENTIK_DOT_ENTERPRISE_DOT_SEARCH = 'authentik.enterprise.search'

authentik_client/models/authenticated_session_asn.py

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ class AuthenticatedSessionAsn(BaseModel):
2727
"""
2828
Get ASN Data
2929
""" # noqa: E501
30-
asn: StrictInt
30+
asn: Optional[StrictInt]
3131
as_org: Optional[StrictStr]
3232
network: Optional[StrictStr]
3333
__properties: ClassVar[List[str]] = ["asn", "as_org", "network"]
@@ -71,6 +71,11 @@ def to_dict(self) -> Dict[str, Any]:
7171
exclude=excluded_fields,
7272
exclude_none=True,
7373
)
74+
# set to None if asn (nullable) is None
75+
# and model_fields_set contains the field
76+
if self.asn is None and "asn" in self.model_fields_set:
77+
_dict['asn'] = None
78+
7479
# set to None if as_org (nullable) is None
7580
# and model_fields_set contains the field
7681
if self.as_org is None and "as_org" in self.model_fields_set:

authentik_client/models/authenticated_session_geo_ip.py

Lines changed: 25 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,18 +19,18 @@
1919
import json
2020

2121
from pydantic import BaseModel, ConfigDict, StrictFloat, StrictInt, StrictStr
22-
from typing import Any, ClassVar, Dict, List, Union
22+
from typing import Any, ClassVar, Dict, List, Optional, Union
2323
from typing import Optional, Set
2424
from typing_extensions import Self
2525

2626
class AuthenticatedSessionGeoIp(BaseModel):
2727
"""
2828
Get GeoIP Data
2929
""" # noqa: E501
30-
continent: StrictStr
31-
country: StrictStr
32-
lat: Union[StrictFloat, StrictInt]
33-
long: Union[StrictFloat, StrictInt]
30+
continent: Optional[StrictStr]
31+
country: Optional[StrictStr]
32+
lat: Optional[Union[StrictFloat, StrictInt]]
33+
long: Optional[Union[StrictFloat, StrictInt]]
3434
city: StrictStr
3535
__properties: ClassVar[List[str]] = ["continent", "country", "lat", "long", "city"]
3636

@@ -73,6 +73,26 @@ def to_dict(self) -> Dict[str, Any]:
7373
exclude=excluded_fields,
7474
exclude_none=True,
7575
)
76+
# set to None if continent (nullable) is None
77+
# and model_fields_set contains the field
78+
if self.continent is None and "continent" in self.model_fields_set:
79+
_dict['continent'] = None
80+
81+
# set to None if country (nullable) is None
82+
# and model_fields_set contains the field
83+
if self.country is None and "country" in self.model_fields_set:
84+
_dict['country'] = None
85+
86+
# set to None if lat (nullable) is None
87+
# and model_fields_set contains the field
88+
if self.lat is None and "lat" in self.model_fields_set:
89+
_dict['lat'] = None
90+
91+
# set to None if long (nullable) is None
92+
# and model_fields_set contains the field
93+
if self.long is None and "long" in self.model_fields_set:
94+
_dict['long'] = None
95+
7696
return _dict
7797

7898
@classmethod

authentik_client/models/patched_radius_provider_request.py

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,8 @@ class PatchedRadiusProviderRequest(BaseModel):
3737
client_networks: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped.")
3838
shared_secret: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="Shared secret between clients and server to hash packets.")
3939
mfa_support: Optional[StrictBool] = Field(default=None, description="When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.")
40-
__properties: ClassVar[List[str]] = ["name", "authentication_flow", "authorization_flow", "invalidation_flow", "property_mappings", "client_networks", "shared_secret", "mfa_support"]
40+
certificate: Optional[UUID] = None
41+
__properties: ClassVar[List[str]] = ["name", "authentication_flow", "authorization_flow", "invalidation_flow", "property_mappings", "client_networks", "shared_secret", "mfa_support", "certificate"]
4142

4243
model_config = ConfigDict(
4344
populate_by_name=True,
@@ -83,6 +84,11 @@ def to_dict(self) -> Dict[str, Any]:
8384
if self.authentication_flow is None and "authentication_flow" in self.model_fields_set:
8485
_dict['authentication_flow'] = None
8586

87+
# set to None if certificate (nullable) is None
88+
# and model_fields_set contains the field
89+
if self.certificate is None and "certificate" in self.model_fields_set:
90+
_dict['certificate'] = None
91+
8692
return _dict
8793

8894
@classmethod
@@ -102,7 +108,8 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
102108
"property_mappings": obj.get("property_mappings"),
103109
"client_networks": obj.get("client_networks"),
104110
"shared_secret": obj.get("shared_secret"),
105-
"mfa_support": obj.get("mfa_support")
111+
"mfa_support": obj.get("mfa_support"),
112+
"certificate": obj.get("certificate")
106113
})
107114
return _obj
108115

authentik_client/models/radius_outpost_config.py

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020

2121
from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt, StrictStr
2222
from typing import Any, ClassVar, Dict, List, Optional
23+
from uuid import UUID
2324
from typing import Optional, Set
2425
from typing_extensions import Self
2526

@@ -34,7 +35,8 @@ class RadiusOutpostConfig(BaseModel):
3435
client_networks: Optional[StrictStr] = Field(default=None, description="List of CIDRs (comma-separated) that clients can connect from. A more specific CIDR will match before a looser one. Clients connecting from a non-specified CIDR will be dropped.")
3536
shared_secret: Optional[StrictStr] = Field(default=None, description="Shared secret between clients and server to hash packets.")
3637
mfa_support: Optional[StrictBool] = Field(default=None, description="When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.")
37-
__properties: ClassVar[List[str]] = ["pk", "name", "application_slug", "auth_flow_slug", "client_networks", "shared_secret", "mfa_support"]
38+
certificate: Optional[UUID] = None
39+
__properties: ClassVar[List[str]] = ["pk", "name", "application_slug", "auth_flow_slug", "client_networks", "shared_secret", "mfa_support", "certificate"]
3840

3941
model_config = ConfigDict(
4042
populate_by_name=True,
@@ -77,6 +79,11 @@ def to_dict(self) -> Dict[str, Any]:
7779
exclude=excluded_fields,
7880
exclude_none=True,
7981
)
82+
# set to None if certificate (nullable) is None
83+
# and model_fields_set contains the field
84+
if self.certificate is None and "certificate" in self.model_fields_set:
85+
_dict['certificate'] = None
86+
8087
return _dict
8188

8289
@classmethod
@@ -95,7 +102,8 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
95102
"auth_flow_slug": obj.get("auth_flow_slug"),
96103
"client_networks": obj.get("client_networks"),
97104
"shared_secret": obj.get("shared_secret"),
98-
"mfa_support": obj.get("mfa_support")
105+
"mfa_support": obj.get("mfa_support"),
106+
"certificate": obj.get("certificate")
99107
})
100108
return _obj
101109

authentik_client/models/radius_provider.py

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@ class RadiusProvider(BaseModel):
4646
shared_secret: Optional[StrictStr] = Field(default=None, description="Shared secret between clients and server to hash packets.")
4747
outpost_set: List[StrictStr]
4848
mfa_support: Optional[StrictBool] = Field(default=None, description="When enabled, code-based multi-factor authentication can be used by appending a semicolon and the TOTP code to the password. This should only be enabled if all users that will bind to this provider have a TOTP device configured, as otherwise a password may incorrectly be rejected if it contains a semicolon.")
49-
__properties: ClassVar[List[str]] = ["pk", "name", "authentication_flow", "authorization_flow", "invalidation_flow", "property_mappings", "component", "assigned_application_slug", "assigned_application_name", "assigned_backchannel_application_slug", "assigned_backchannel_application_name", "verbose_name", "verbose_name_plural", "meta_model_name", "client_networks", "shared_secret", "outpost_set", "mfa_support"]
49+
certificate: Optional[UUID] = None
50+
__properties: ClassVar[List[str]] = ["pk", "name", "authentication_flow", "authorization_flow", "invalidation_flow", "property_mappings", "component", "assigned_application_slug", "assigned_application_name", "assigned_backchannel_application_slug", "assigned_backchannel_application_name", "verbose_name", "verbose_name_plural", "meta_model_name", "client_networks", "shared_secret", "outpost_set", "mfa_support", "certificate"]
5051

5152
model_config = ConfigDict(
5253
populate_by_name=True,
@@ -112,6 +113,11 @@ def to_dict(self) -> Dict[str, Any]:
112113
if self.authentication_flow is None and "authentication_flow" in self.model_fields_set:
113114
_dict['authentication_flow'] = None
114115

116+
# set to None if certificate (nullable) is None
117+
# and model_fields_set contains the field
118+
if self.certificate is None and "certificate" in self.model_fields_set:
119+
_dict['certificate'] = None
120+
115121
return _dict
116122

117123
@classmethod
@@ -141,7 +147,8 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
141147
"client_networks": obj.get("client_networks"),
142148
"shared_secret": obj.get("shared_secret"),
143149
"outpost_set": obj.get("outpost_set"),
144-
"mfa_support": obj.get("mfa_support")
150+
"mfa_support": obj.get("mfa_support"),
151+
"certificate": obj.get("certificate")
145152
})
146153
return _obj
147154

0 commit comments

Comments
 (0)