Skip to content

Commit 20f930d

Browse files
-e Update API Client
#### What's Changed --- ##### `GET` /providers/oauth2/{id}/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ##### `PUT` /providers/oauth2/{id}/ ###### Request: Changed content type : `application/json` * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ##### `PATCH` /providers/oauth2/{id}/ ###### Request: Changed content type : `application/json` * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ##### `GET` /oauth2/access_tokens/{id}/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `provider` (object) > OAuth2Provider Serializer * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ##### `GET` /oauth2/authorization_codes/{id}/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `provider` (object) > OAuth2Provider Serializer * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ##### `GET` /oauth2/refresh_tokens/{id}/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `provider` (object) > OAuth2Provider Serializer * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ##### `POST` /providers/oauth2/ ###### Request: Changed content type : `application/json` * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ###### Return Type: Changed response : **201 Created** * Changed content type : `application/json` * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ##### `GET` /providers/oauth2/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `results` (array) Changed items (object): > OAuth2Provider Serializer * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ##### `PUT` /core/transactional/applications/ ###### Request: Changed content type : `application/json` * Changed property `provider` (object) Updated `authentik_providers_oauth2.oauth2provider` provider_model: * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ##### `GET` /oauth2/access_tokens/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `results` (array) Changed items (object): > Serializer for BaseGrantModel and RefreshToken * Changed property `provider` (object) > OAuth2Provider Serializer * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ##### `GET` /oauth2/authorization_codes/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `results` (array) Changed items (object): > Serializer for BaseGrantModel and ExpiringBaseGrant * Changed property `provider` (object) > OAuth2Provider Serializer * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). ##### `GET` /oauth2/refresh_tokens/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `results` (array) Changed items (object): > Serializer for BaseGrantModel and RefreshToken * Changed property `provider` (object) > OAuth2Provider Serializer * Added property `refresh_token_threshold` (string) > When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3).
1 parent ed98b6d commit 20f930d

23 files changed

+50
-9
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This repo contains a generated API client to talk with authentik's API from Pyth
1616
This Python package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
1717

1818
- API version: 2025.10.0-rc1
19-
- Package version: 2025.10.0-rc1-1758902937
19+
- Package version: 2025.10.0-rc1-1758925462
2020
- Generator version: 7.15.0
2121
- Build package: org.openapitools.codegen.languages.PythonClientCodegen
2222

authentik_client/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
""" # noqa: E501
1616

1717

18-
__version__ = "2025.10.0-rc1-1758902937"
18+
__version__ = "2025.10.0-rc1-1758925462"
1919

2020
# Define package exports
2121
__all__ = [

authentik_client/api_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ def __init__(
9292
self.default_headers[header_name] = header_value
9393
self.cookie = cookie
9494
# Set default User-Agent.
95-
self.user_agent = 'OpenAPI-Generator/2025.10.0-rc1-1758902937/python'
95+
self.user_agent = 'OpenAPI-Generator/2025.10.0-rc1-1758925462/python'
9696
self.client_side_validation = configuration.client_side_validation
9797

9898
def __enter__(self):

authentik_client/configuration.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -511,7 +511,7 @@ def to_debug_report(self) -> str:
511511
"OS: {env}\n"\
512512
"Python Version: {pyversion}\n"\
513513
"Version of the API: 2025.10.0-rc1\n"\
514-
"SDK Package Version: 2025.10.0-rc1-1758902937".\
514+
"SDK Package Version: 2025.10.0-rc1-1758925462".\
515515
format(env=sys.platform, pyversion=sys.version)
516516

517517
def get_host_settings(self) -> List[HostSetting]:

authentik_client/models/o_auth2_provider.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ class OAuth2Provider(BaseModel):
5353
access_code_validity: Optional[StrictStr] = Field(default=None, description="Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).")
5454
access_token_validity: Optional[StrictStr] = Field(default=None, description="Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).")
5555
refresh_token_validity: Optional[StrictStr] = Field(default=None, description="Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).")
56+
refresh_token_threshold: Optional[StrictStr] = Field(default=None, description="When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3).")
5657
include_claims_in_id_token: Optional[StrictBool] = Field(default=None, description="Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.")
5758
signing_key: Optional[UUID] = Field(default=None, description="Key used to sign the tokens.")
5859
encryption_key: Optional[UUID] = Field(default=None, description="Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.")
@@ -62,7 +63,7 @@ class OAuth2Provider(BaseModel):
6263
issuer_mode: Optional[IssuerModeEnum] = Field(default=None, description="Configure how the issuer field of the ID Token should be filled.")
6364
jwt_federation_sources: Optional[List[UUID]] = None
6465
jwt_federation_providers: Optional[List[StrictInt]] = None
65-
__properties: ClassVar[List[str]] = ["pk", "name", "authentication_flow", "authorization_flow", "invalidation_flow", "property_mappings", "component", "assigned_application_slug", "assigned_application_name", "assigned_backchannel_application_slug", "assigned_backchannel_application_name", "verbose_name", "verbose_name_plural", "meta_model_name", "client_type", "client_id", "client_secret", "access_code_validity", "access_token_validity", "refresh_token_validity", "include_claims_in_id_token", "signing_key", "encryption_key", "redirect_uris", "backchannel_logout_uri", "sub_mode", "issuer_mode", "jwt_federation_sources", "jwt_federation_providers"]
66+
__properties: ClassVar[List[str]] = ["pk", "name", "authentication_flow", "authorization_flow", "invalidation_flow", "property_mappings", "component", "assigned_application_slug", "assigned_application_name", "assigned_backchannel_application_slug", "assigned_backchannel_application_name", "verbose_name", "verbose_name_plural", "meta_model_name", "client_type", "client_id", "client_secret", "access_code_validity", "access_token_validity", "refresh_token_validity", "refresh_token_threshold", "include_claims_in_id_token", "signing_key", "encryption_key", "redirect_uris", "backchannel_logout_uri", "sub_mode", "issuer_mode", "jwt_federation_sources", "jwt_federation_providers"]
6667

6768
model_config = ConfigDict(
6869
populate_by_name=True,
@@ -175,6 +176,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
175176
"access_code_validity": obj.get("access_code_validity"),
176177
"access_token_validity": obj.get("access_token_validity"),
177178
"refresh_token_validity": obj.get("refresh_token_validity"),
179+
"refresh_token_threshold": obj.get("refresh_token_threshold"),
178180
"include_claims_in_id_token": obj.get("include_claims_in_id_token"),
179181
"signing_key": obj.get("signing_key"),
180182
"encryption_key": obj.get("encryption_key"),

authentik_client/models/o_auth2_provider_request.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ class OAuth2ProviderRequest(BaseModel):
4444
access_code_validity: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).")
4545
access_token_validity: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).")
4646
refresh_token_validity: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).")
47+
refresh_token_threshold: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3).")
4748
include_claims_in_id_token: Optional[StrictBool] = Field(default=None, description="Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.")
4849
signing_key: Optional[UUID] = Field(default=None, description="Key used to sign the tokens.")
4950
encryption_key: Optional[UUID] = Field(default=None, description="Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.")
@@ -53,7 +54,7 @@ class OAuth2ProviderRequest(BaseModel):
5354
issuer_mode: Optional[IssuerModeEnum] = Field(default=None, description="Configure how the issuer field of the ID Token should be filled.")
5455
jwt_federation_sources: Optional[List[UUID]] = None
5556
jwt_federation_providers: Optional[List[StrictInt]] = None
56-
__properties: ClassVar[List[str]] = ["name", "authentication_flow", "authorization_flow", "invalidation_flow", "property_mappings", "client_type", "client_id", "client_secret", "access_code_validity", "access_token_validity", "refresh_token_validity", "include_claims_in_id_token", "signing_key", "encryption_key", "redirect_uris", "backchannel_logout_uri", "sub_mode", "issuer_mode", "jwt_federation_sources", "jwt_federation_providers"]
57+
__properties: ClassVar[List[str]] = ["name", "authentication_flow", "authorization_flow", "invalidation_flow", "property_mappings", "client_type", "client_id", "client_secret", "access_code_validity", "access_token_validity", "refresh_token_validity", "refresh_token_threshold", "include_claims_in_id_token", "signing_key", "encryption_key", "redirect_uris", "backchannel_logout_uri", "sub_mode", "issuer_mode", "jwt_federation_sources", "jwt_federation_providers"]
5758

5859
model_config = ConfigDict(
5960
populate_by_name=True,
@@ -139,6 +140,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
139140
"access_code_validity": obj.get("access_code_validity"),
140141
"access_token_validity": obj.get("access_token_validity"),
141142
"refresh_token_validity": obj.get("refresh_token_validity"),
143+
"refresh_token_threshold": obj.get("refresh_token_threshold"),
142144
"include_claims_in_id_token": obj.get("include_claims_in_id_token"),
143145
"signing_key": obj.get("signing_key"),
144146
"encryption_key": obj.get("encryption_key"),

authentik_client/models/patched_o_auth2_provider_request.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ class PatchedOAuth2ProviderRequest(BaseModel):
4444
access_code_validity: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).")
4545
access_token_validity: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).")
4646
refresh_token_validity: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3).")
47+
refresh_token_threshold: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3).")
4748
include_claims_in_id_token: Optional[StrictBool] = Field(default=None, description="Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint.")
4849
signing_key: Optional[UUID] = Field(default=None, description="Key used to sign the tokens.")
4950
encryption_key: Optional[UUID] = Field(default=None, description="Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs.")
@@ -53,7 +54,7 @@ class PatchedOAuth2ProviderRequest(BaseModel):
5354
issuer_mode: Optional[IssuerModeEnum] = Field(default=None, description="Configure how the issuer field of the ID Token should be filled.")
5455
jwt_federation_sources: Optional[List[UUID]] = None
5556
jwt_federation_providers: Optional[List[StrictInt]] = None
56-
__properties: ClassVar[List[str]] = ["name", "authentication_flow", "authorization_flow", "invalidation_flow", "property_mappings", "client_type", "client_id", "client_secret", "access_code_validity", "access_token_validity", "refresh_token_validity", "include_claims_in_id_token", "signing_key", "encryption_key", "redirect_uris", "backchannel_logout_uri", "sub_mode", "issuer_mode", "jwt_federation_sources", "jwt_federation_providers"]
57+
__properties: ClassVar[List[str]] = ["name", "authentication_flow", "authorization_flow", "invalidation_flow", "property_mappings", "client_type", "client_id", "client_secret", "access_code_validity", "access_token_validity", "refresh_token_validity", "refresh_token_threshold", "include_claims_in_id_token", "signing_key", "encryption_key", "redirect_uris", "backchannel_logout_uri", "sub_mode", "issuer_mode", "jwt_federation_sources", "jwt_federation_providers"]
5758

5859
model_config = ConfigDict(
5960
populate_by_name=True,
@@ -139,6 +140,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
139140
"access_code_validity": obj.get("access_code_validity"),
140141
"access_token_validity": obj.get("access_token_validity"),
141142
"refresh_token_validity": obj.get("refresh_token_validity"),
143+
"refresh_token_threshold": obj.get("refresh_token_threshold"),
142144
"include_claims_in_id_token": obj.get("include_claims_in_id_token"),
143145
"signing_key": obj.get("signing_key"),
144146
"encryption_key": obj.get("encryption_key"),

docs/ModelRequest.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ Name | Type | Description | Notes
3535
**access_code_validity** | **str** | Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional]
3636
**access_token_validity** | **str** | Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional]
3737
**refresh_token_validity** | **str** | Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional]
38+
**refresh_token_threshold** | **str** | When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). | [optional]
3839
**include_claims_in_id_token** | **bool** | Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint. | [optional]
3940
**signing_key** | **str** | Key used to sign the SSF Events. |
4041
**encryption_key** | **str** | Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs. | [optional]

docs/OAuth2Provider.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ Name | Type | Description | Notes
2626
**access_code_validity** | **str** | Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional]
2727
**access_token_validity** | **str** | Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional]
2828
**refresh_token_validity** | **str** | Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional]
29+
**refresh_token_threshold** | **str** | When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). | [optional]
2930
**include_claims_in_id_token** | **bool** | Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint. | [optional]
3031
**signing_key** | **str** | Key used to sign the tokens. | [optional]
3132
**encryption_key** | **str** | Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs. | [optional]

docs/OAuth2ProviderRequest.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ Name | Type | Description | Notes
1717
**access_code_validity** | **str** | Access codes not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional]
1818
**access_token_validity** | **str** | Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional]
1919
**refresh_token_validity** | **str** | Tokens not valid on or after current time + this value (Format: hours=1;minutes=2;seconds=3). | [optional]
20+
**refresh_token_threshold** | **str** | When refreshing a token, if the refresh token is valid for less than this duration, it will be renewed. When set to seconds=0, token will always be renewed. (Format: hours=1;minutes=2;seconds=3). | [optional]
2021
**include_claims_in_id_token** | **bool** | Include User claims from scopes in the id_token, for applications that don't access the userinfo endpoint. | [optional]
2122
**signing_key** | **str** | Key used to sign the tokens. | [optional]
2223
**encryption_key** | **str** | Key used to encrypt the tokens. When set, tokens will be encrypted and returned as JWEs. | [optional]

0 commit comments

Comments
 (0)