core: remove filter_not_expired for QS#18274
Conversation
✅ Deploy Preview for authentik-docs canceled.
|
✅ Deploy Preview for authentik-integrations canceled.
|
✅ Deploy Preview for authentik-storybook ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #18274 +/- ##
==========================================
- Coverage 92.82% 92.81% -0.01%
==========================================
Files 1000 1000
Lines 56560 56588 +28
Branches 425 425
==========================================
+ Hits 52499 52523 +24
- Misses 4061 4065 +4
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
Signed-off-by: Jens Langhammer <jens@goauthentik.io> # Conflicts: # authentik/api/authentication.py # authentik/core/models.py
ff0359d to
6e3494a
Compare
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
315bba1 to
42b2701
Compare
Signed-off-by: Jens Langhammer <jens@goauthentik.io> # Conflicts: # authentik/core/models.py # authentik/core/tests/test_token_api.py # authentik/enterprise/endpoints/connectors/agent/auth.py # authentik/recovery/views.py
42b2701 to
d158a0e
Compare
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
|
authentik PR Installation instructions Instructions for docker-composeAdd the following block to your AUTHENTIK_IMAGE=ghcr.io/goauthentik/dev-server
AUTHENTIK_TAG=gh-9b52e1a1f40b44d647e540686c251a47af7264ce
AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE=ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)sAfterwards, run the upgrade commands from the latest release notes. Instructions for KubernetesAdd the following block to your authentik:
outposts:
container_image_base: ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s
global:
image:
repository: ghcr.io/goauthentik/dev-server
tag: gh-9b52e1a1f40b44d647e540686c251a47af7264ceAfterwards, run the upgrade commands from the latest release notes. |
Signed-off-by: Jens L. <jens@beryju.org>
* main: core: remove filter_not_expired for QS (#18274) tenants: fix default schema in initial migration (#21114) core: bump django-stubs[compatible-mypy] from 5.2.9 to 6.0.1 (#21099) core, web: update translations (#21097) lifecycle/aws: bump aws-cdk from 2.1112.0 to 2.1113.0 in /lifecycle/aws (#21098) core: bump types-requests from 2.32.4.20260107 to 2.32.4.20260324 (#21100) core: bump constructs from 10.5.1 to 10.6.0 (#21101) core: bump astral-sh/uv from 0.10.12 to 0.11.0 in /lifecycle/container (#21103) ci: bump taiki-e/install-action from 2.69.6 to 2.69.7 in /.github/actions/setup (#21104) web: bump flatted from 3.4.1 to 3.4.2 (#21076) core: bump goauthentik.io/api/v3 to 3.2026.5.0-rc1-1774286095 (#21089) core: bump cbor2 from 5.8.0 to 5.9.0 (#21094) ci: fix cherry-pick action generating empty title (#21091) web: bump the swc group across 1 directory with 11 updates (#21070) web: bump yaml from 2.8.2 to 2.8.3 in /web (#21071) core: add flag for future default behaviour of requiring a binding to access an application (#16247)
in wake of the recent CVE due to a missing
filter_not_expired, I think it's a better DX to filter out expired objects by default and make getting expired objects an opt-in. This PR does that..objects.including_expired(), this will return a queryset with all objects.objectswill exclude expired objects by defaultModels to check:
<class 'authentik.core.models.Token'><class 'authentik.core.models.Session'><class 'authentik.enterprise.models.LicenseUsage'><class 'authentik.events.models.Event'><class 'authentik.stages.invitation.models.Invitation'><class 'authentik.providers.oauth2.models.AuthorizationCode'><class 'authentik.providers.oauth2.models.AccessToken'><class 'authentik.providers.oauth2.models.RefreshToken'><class 'authentik.providers.oauth2.models.DeviceToken'><class 'authentik.enterprise.providers.ssf.models.StreamEvent'><class 'authentik.policies.reputation.models.Reputation'><class 'authentik.providers.proxy.models.ProxySession'><class 'authentik.providers.rac.models.ConnectionToken'><class 'authentik.providers.saml.models.SAMLSession'><class 'authentik.stages.consent.models.UserConsent'>