Skip to content

Commit ed98b6d

Browse files
-e Update API Client
#### What's Changed --- ##### `GET` /sources/saml/{slug}/ ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `signed_assertion` (boolean) * Added property `signed_response` (boolean) ##### `PUT` /sources/saml/{slug}/ ###### Request: Changed content type : `application/json` * Added property `signed_assertion` (boolean) * Added property `signed_response` (boolean) ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `signed_assertion` (boolean) * Added property `signed_response` (boolean) ##### `PATCH` /sources/saml/{slug}/ ###### Request: Changed content type : `application/json` * Added property `signed_assertion` (boolean) * Added property `signed_response` (boolean) ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Added property `signed_assertion` (boolean) * Added property `signed_response` (boolean) ##### `POST` /sources/saml/ ###### Request: Changed content type : `application/json` * Added property `signed_assertion` (boolean) * Added property `signed_response` (boolean) ###### Return Type: Changed response : **201 Created** * Changed content type : `application/json` * Added property `signed_assertion` (boolean) * Added property `signed_response` (boolean) ##### `GET` /sources/saml/ ###### Parameters: Added: `signed_assertion` in `query` Added: `signed_response` in `query` ###### Return Type: Changed response : **200 OK** * Changed content type : `application/json` * Changed property `results` (array) Changed items (object): > SAMLSource Serializer * Added property `signed_assertion` (boolean) * Added property `signed_response` (boolean)
1 parent 89ddd77 commit ed98b6d

19 files changed

+105
-19
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This repo contains a generated API client to talk with authentik's API from Pyth
1616
This Python package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
1717

1818
- API version: 2025.10.0-rc1
19-
- Package version: 2025.10.0-rc1-1758891598
19+
- Package version: 2025.10.0-rc1-1758902937
2020
- Generator version: 7.15.0
2121
- Build package: org.openapitools.codegen.languages.PythonClientCodegen
2222

authentik_client/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
""" # noqa: E501
1616

1717

18-
__version__ = "2025.10.0-rc1-1758891598"
18+
__version__ = "2025.10.0-rc1-1758902937"
1919

2020
# Define package exports
2121
__all__ = [

authentik_client/api/sources_api.py

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25613,6 +25613,8 @@ def sources_saml_list(
2561325613
pre_authentication_flow: Optional[UUID] = None,
2561425614
search: Annotated[Optional[StrictStr], Field(description="A search term.")] = None,
2561525615
signature_algorithm: Optional[StrictStr] = None,
25616+
signed_assertion: Optional[StrictBool] = None,
25617+
signed_response: Optional[StrictBool] = None,
2561625618
signing_kp: Optional[UUID] = None,
2561725619
slo_url: Optional[StrictStr] = None,
2561825620
slug: Optional[StrictStr] = None,
@@ -25673,6 +25675,10 @@ def sources_saml_list(
2567325675
:type search: str
2567425676
:param signature_algorithm:
2567525677
:type signature_algorithm: str
25678+
:param signed_assertion:
25679+
:type signed_assertion: bool
25680+
:param signed_response:
25681+
:type signed_response: bool
2567625682
:param signing_kp:
2567725683
:type signing_kp: str
2567825684
:param slo_url:
@@ -25728,6 +25734,8 @@ def sources_saml_list(
2572825734
pre_authentication_flow=pre_authentication_flow,
2572925735
search=search,
2573025736
signature_algorithm=signature_algorithm,
25737+
signed_assertion=signed_assertion,
25738+
signed_response=signed_response,
2573125739
signing_kp=signing_kp,
2573225740
slo_url=slo_url,
2573325741
slug=slug,
@@ -25778,6 +25786,8 @@ def sources_saml_list_with_http_info(
2577825786
pre_authentication_flow: Optional[UUID] = None,
2577925787
search: Annotated[Optional[StrictStr], Field(description="A search term.")] = None,
2578025788
signature_algorithm: Optional[StrictStr] = None,
25789+
signed_assertion: Optional[StrictBool] = None,
25790+
signed_response: Optional[StrictBool] = None,
2578125791
signing_kp: Optional[UUID] = None,
2578225792
slo_url: Optional[StrictStr] = None,
2578325793
slug: Optional[StrictStr] = None,
@@ -25838,6 +25848,10 @@ def sources_saml_list_with_http_info(
2583825848
:type search: str
2583925849
:param signature_algorithm:
2584025850
:type signature_algorithm: str
25851+
:param signed_assertion:
25852+
:type signed_assertion: bool
25853+
:param signed_response:
25854+
:type signed_response: bool
2584125855
:param signing_kp:
2584225856
:type signing_kp: str
2584325857
:param slo_url:
@@ -25893,6 +25907,8 @@ def sources_saml_list_with_http_info(
2589325907
pre_authentication_flow=pre_authentication_flow,
2589425908
search=search,
2589525909
signature_algorithm=signature_algorithm,
25910+
signed_assertion=signed_assertion,
25911+
signed_response=signed_response,
2589625912
signing_kp=signing_kp,
2589725913
slo_url=slo_url,
2589825914
slug=slug,
@@ -25943,6 +25959,8 @@ def sources_saml_list_without_preload_content(
2594325959
pre_authentication_flow: Optional[UUID] = None,
2594425960
search: Annotated[Optional[StrictStr], Field(description="A search term.")] = None,
2594525961
signature_algorithm: Optional[StrictStr] = None,
25962+
signed_assertion: Optional[StrictBool] = None,
25963+
signed_response: Optional[StrictBool] = None,
2594625964
signing_kp: Optional[UUID] = None,
2594725965
slo_url: Optional[StrictStr] = None,
2594825966
slug: Optional[StrictStr] = None,
@@ -26003,6 +26021,10 @@ def sources_saml_list_without_preload_content(
2600326021
:type search: str
2600426022
:param signature_algorithm:
2600526023
:type signature_algorithm: str
26024+
:param signed_assertion:
26025+
:type signed_assertion: bool
26026+
:param signed_response:
26027+
:type signed_response: bool
2600626028
:param signing_kp:
2600726029
:type signing_kp: str
2600826030
:param slo_url:
@@ -26058,6 +26080,8 @@ def sources_saml_list_without_preload_content(
2605826080
pre_authentication_flow=pre_authentication_flow,
2605926081
search=search,
2606026082
signature_algorithm=signature_algorithm,
26083+
signed_assertion=signed_assertion,
26084+
signed_response=signed_response,
2606126085
signing_kp=signing_kp,
2606226086
slo_url=slo_url,
2606326087
slug=slug,
@@ -26103,6 +26127,8 @@ def _sources_saml_list_serialize(
2610326127
pre_authentication_flow,
2610426128
search,
2610526129
signature_algorithm,
26130+
signed_assertion,
26131+
signed_response,
2610626132
signing_kp,
2610726133
slo_url,
2610826134
slug,
@@ -26204,6 +26230,14 @@ def _sources_saml_list_serialize(
2620426230

2620526231
_query_params.append(('signature_algorithm', signature_algorithm))
2620626232

26233+
if signed_assertion is not None:
26234+
26235+
_query_params.append(('signed_assertion', signed_assertion))
26236+
26237+
if signed_response is not None:
26238+
26239+
_query_params.append(('signed_response', signed_response))
26240+
2620726241
if signing_kp is not None:
2620826242

2620926243
_query_params.append(('signing_kp', signing_kp))

authentik_client/api_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ def __init__(
9292
self.default_headers[header_name] = header_value
9393
self.cookie = cookie
9494
# Set default User-Agent.
95-
self.user_agent = 'OpenAPI-Generator/2025.10.0-rc1-1758891598/python'
95+
self.user_agent = 'OpenAPI-Generator/2025.10.0-rc1-1758902937/python'
9696
self.client_side_validation = configuration.client_side_validation
9797

9898
def __enter__(self):

authentik_client/configuration.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -511,7 +511,7 @@ def to_debug_report(self) -> str:
511511
"OS: {env}\n"\
512512
"Python Version: {pyversion}\n"\
513513
"Version of the API: 2025.10.0-rc1\n"\
514-
"SDK Package Version: 2025.10.0-rc1-1758891598".\
514+
"SDK Package Version: 2025.10.0-rc1-1758902937".\
515515
format(env=sys.platform, pyversion=sys.version)
516516

517517
def get_host_settings(self) -> List[HostSetting]:

authentik_client/models/patched_saml_source_request.py

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,9 @@ class PatchedSAMLSourceRequest(BaseModel):
6060
signature_algorithm: Optional[SignatureAlgorithmEnum] = None
6161
temporary_user_delete_after: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="Time offset when temporary users should be deleted. This only applies if your IDP uses the NameID Format 'transient', and the user doesn't log out manually. (Format: hours=1;minutes=2;seconds=3).")
6262
encryption_kp: Optional[UUID] = Field(default=None, description="When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.")
63-
__properties: ClassVar[List[str]] = ["name", "slug", "enabled", "authentication_flow", "enrollment_flow", "user_property_mappings", "group_property_mappings", "policy_engine_mode", "user_matching_mode", "user_path_template", "group_matching_mode", "pre_authentication_flow", "issuer", "sso_url", "slo_url", "allow_idp_initiated", "name_id_policy", "binding_type", "verification_kp", "signing_kp", "digest_algorithm", "signature_algorithm", "temporary_user_delete_after", "encryption_kp"]
63+
signed_assertion: Optional[StrictBool] = None
64+
signed_response: Optional[StrictBool] = None
65+
__properties: ClassVar[List[str]] = ["name", "slug", "enabled", "authentication_flow", "enrollment_flow", "user_property_mappings", "group_property_mappings", "policy_engine_mode", "user_matching_mode", "user_path_template", "group_matching_mode", "pre_authentication_flow", "issuer", "sso_url", "slo_url", "allow_idp_initiated", "name_id_policy", "binding_type", "verification_kp", "signing_kp", "digest_algorithm", "signature_algorithm", "temporary_user_delete_after", "encryption_kp", "signed_assertion", "signed_response"]
6466

6567
@field_validator('slug')
6668
def slug_validate_regular_expression(cls, value):
@@ -176,7 +178,9 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
176178
"digest_algorithm": obj.get("digest_algorithm"),
177179
"signature_algorithm": obj.get("signature_algorithm"),
178180
"temporary_user_delete_after": obj.get("temporary_user_delete_after"),
179-
"encryption_kp": obj.get("encryption_kp")
181+
"encryption_kp": obj.get("encryption_kp"),
182+
"signed_assertion": obj.get("signed_assertion"),
183+
"signed_response": obj.get("signed_response")
180184
})
181185
return _obj
182186

authentik_client/models/saml_source.py

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,9 @@ class SAMLSource(BaseModel):
6767
signature_algorithm: Optional[SignatureAlgorithmEnum] = None
6868
temporary_user_delete_after: Optional[StrictStr] = Field(default=None, description="Time offset when temporary users should be deleted. This only applies if your IDP uses the NameID Format 'transient', and the user doesn't log out manually. (Format: hours=1;minutes=2;seconds=3).")
6969
encryption_kp: Optional[UUID] = Field(default=None, description="When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.")
70-
__properties: ClassVar[List[str]] = ["pk", "name", "slug", "enabled", "authentication_flow", "enrollment_flow", "user_property_mappings", "group_property_mappings", "component", "verbose_name", "verbose_name_plural", "meta_model_name", "policy_engine_mode", "user_matching_mode", "managed", "user_path_template", "icon", "group_matching_mode", "pre_authentication_flow", "issuer", "sso_url", "slo_url", "allow_idp_initiated", "name_id_policy", "binding_type", "verification_kp", "signing_kp", "digest_algorithm", "signature_algorithm", "temporary_user_delete_after", "encryption_kp"]
70+
signed_assertion: Optional[StrictBool] = None
71+
signed_response: Optional[StrictBool] = None
72+
__properties: ClassVar[List[str]] = ["pk", "name", "slug", "enabled", "authentication_flow", "enrollment_flow", "user_property_mappings", "group_property_mappings", "component", "verbose_name", "verbose_name_plural", "meta_model_name", "policy_engine_mode", "user_matching_mode", "managed", "user_path_template", "icon", "group_matching_mode", "pre_authentication_flow", "issuer", "sso_url", "slo_url", "allow_idp_initiated", "name_id_policy", "binding_type", "verification_kp", "signing_kp", "digest_algorithm", "signature_algorithm", "temporary_user_delete_after", "encryption_kp", "signed_assertion", "signed_response"]
7173

7274
@field_validator('slug')
7375
def slug_validate_regular_expression(cls, value):
@@ -206,7 +208,9 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
206208
"digest_algorithm": obj.get("digest_algorithm"),
207209
"signature_algorithm": obj.get("signature_algorithm"),
208210
"temporary_user_delete_after": obj.get("temporary_user_delete_after"),
209-
"encryption_kp": obj.get("encryption_kp")
211+
"encryption_kp": obj.get("encryption_kp"),
212+
"signed_assertion": obj.get("signed_assertion"),
213+
"signed_response": obj.get("signed_response")
210214
})
211215
return _obj
212216

authentik_client/models/saml_source_request.py

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,9 @@ class SAMLSourceRequest(BaseModel):
6060
signature_algorithm: Optional[SignatureAlgorithmEnum] = None
6161
temporary_user_delete_after: Optional[Annotated[str, Field(min_length=1, strict=True)]] = Field(default=None, description="Time offset when temporary users should be deleted. This only applies if your IDP uses the NameID Format 'transient', and the user doesn't log out manually. (Format: hours=1;minutes=2;seconds=3).")
6262
encryption_kp: Optional[UUID] = Field(default=None, description="When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key.")
63-
__properties: ClassVar[List[str]] = ["name", "slug", "enabled", "authentication_flow", "enrollment_flow", "user_property_mappings", "group_property_mappings", "policy_engine_mode", "user_matching_mode", "user_path_template", "group_matching_mode", "pre_authentication_flow", "issuer", "sso_url", "slo_url", "allow_idp_initiated", "name_id_policy", "binding_type", "verification_kp", "signing_kp", "digest_algorithm", "signature_algorithm", "temporary_user_delete_after", "encryption_kp"]
63+
signed_assertion: Optional[StrictBool] = None
64+
signed_response: Optional[StrictBool] = None
65+
__properties: ClassVar[List[str]] = ["name", "slug", "enabled", "authentication_flow", "enrollment_flow", "user_property_mappings", "group_property_mappings", "policy_engine_mode", "user_matching_mode", "user_path_template", "group_matching_mode", "pre_authentication_flow", "issuer", "sso_url", "slo_url", "allow_idp_initiated", "name_id_policy", "binding_type", "verification_kp", "signing_kp", "digest_algorithm", "signature_algorithm", "temporary_user_delete_after", "encryption_kp", "signed_assertion", "signed_response"]
6466

6567
@field_validator('slug')
6668
def slug_validate_regular_expression(cls, value):
@@ -173,7 +175,9 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
173175
"digest_algorithm": obj.get("digest_algorithm"),
174176
"signature_algorithm": obj.get("signature_algorithm"),
175177
"temporary_user_delete_after": obj.get("temporary_user_delete_after"),
176-
"encryption_kp": obj.get("encryption_kp")
178+
"encryption_kp": obj.get("encryption_kp"),
179+
"signed_assertion": obj.get("signed_assertion"),
180+
"signed_response": obj.get("signed_response")
177181
})
178182
return _obj
179183

docs/PatchedSAMLSourceRequest.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ Name | Type | Description | Notes
3030
**signature_algorithm** | [**SignatureAlgorithmEnum**](SignatureAlgorithmEnum.md) | | [optional]
3131
**temporary_user_delete_after** | **str** | Time offset when temporary users should be deleted. This only applies if your IDP uses the NameID Format 'transient', and the user doesn't log out manually. (Format: hours=1;minutes=2;seconds=3). | [optional]
3232
**encryption_kp** | **str** | When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key. | [optional]
33+
**signed_assertion** | **bool** | | [optional]
34+
**signed_response** | **bool** | | [optional]
3335

3436
## Example
3537

docs/SAMLSource.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,8 @@ Name | Type | Description | Notes
3737
**signature_algorithm** | [**SignatureAlgorithmEnum**](SignatureAlgorithmEnum.md) | | [optional]
3838
**temporary_user_delete_after** | **str** | Time offset when temporary users should be deleted. This only applies if your IDP uses the NameID Format 'transient', and the user doesn't log out manually. (Format: hours=1;minutes=2;seconds=3). | [optional]
3939
**encryption_kp** | **str** | When selected, incoming assertions are encrypted by the IdP using the public key of the encryption keypair. The assertion is decrypted by the SP using the the private key. | [optional]
40+
**signed_assertion** | **bool** | | [optional]
41+
**signed_response** | **bool** | | [optional]
4042

4143
## Example
4244

0 commit comments

Comments
 (0)