Skip to content

lifecycle/aws: add /data volume (cherry-pick #19936 to version-2025.12)#19938

Merged
rissson merged 1 commit intoversion-2025.12from
cherry-pick/19936-to-version-2025.12
Feb 2, 2026
Merged

lifecycle/aws: add /data volume (cherry-pick #19936 to version-2025.12)#19938
rissson merged 1 commit intoversion-2025.12from
cherry-pick/19936-to-version-2025.12

Conversation

@authentik-automation
Copy link
Contributor

Cherry-pick of #19936 to version-2025.12 branch.

Original PR: #19936
Original Author: @rissson
Cherry-picked commit: a7fb30a

@netlify
Copy link

netlify bot commented Feb 2, 2026

Deploy Preview for authentik-integrations ready!

Name Link
🔨 Latest commit 5cbf565
🔍 Latest deploy log https://app.netlify.com/projects/authentik-integrations/deploys/6980b1a1865b4a0008d8b7dd
😎 Deploy Preview https://deploy-preview-19938--authentik-integrations.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@codecov
Copy link

codecov bot commented Feb 2, 2026

❌ 1 Tests Failed:

Tests completed Failed Passed Skipped
2884 1 2883 4
View the top 1 failed test(s) by shortest run time
authentik.enterprise.policies.unique_password.tests.test_policy.TestUniquePasswordPolicy::test_invalid
Stack Traces | 0.023s run time
self = <unittest.case._Outcome object at 0x7f4d1baf3f50>
test_case = <authentik.enterprise.policies.unique_password.tests.test_policy.TestUniquePasswordPolicy testMethod=test_invalid>
subTest = False

    @contextlib.contextmanager
    def testPartExecutor(self, test_case, subTest=False):
        old_success = self.success
        self.success = True
        try:
>           yield

.../hostedtoolcache/Python/3.13.11................../x64/lib/python3.13/unittest/case.py:58: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <authentik.enterprise.policies.unique_password.tests.test_policy.TestUniquePasswordPolicy testMethod=test_invalid>
result = <TestCaseFunction test_invalid>

    def run(self, result=None):
        if result is None:
            result = self.defaultTestResult()
            startTestRun = getattr(result, 'startTestRun', None)
            stopTestRun = getattr(result, 'stopTestRun', None)
            if startTestRun is not None:
                startTestRun()
        else:
            stopTestRun = None
    
        result.startTest(self)
        try:
            testMethod = getattr(self, self._testMethodName)
            if (getattr(self.__class__, "__unittest_skip__", False) or
                getattr(testMethod, "__unittest_skip__", False)):
                # If the class or method was skipped.
                skip_why = (getattr(self.__class__, '__unittest_skip_why__', '')
                            or getattr(testMethod, '__unittest_skip_why__', ''))
                _addSkip(result, self, skip_why)
                return result
    
            expecting_failure = (
                getattr(self, "__unittest_expecting_failure__", False) or
                getattr(testMethod, "__unittest_expecting_failure__", False)
            )
            outcome = _Outcome(result)
            start_time = time.perf_counter()
            try:
                self._outcome = outcome
    
                with outcome.testPartExecutor(self):
                    self._callSetUp()
                if outcome.success:
                    outcome.expecting_failure = expecting_failure
                    with outcome.testPartExecutor(self):
>                       self._callTestMethod(testMethod)

.../hostedtoolcache/Python/3.13.11................../x64/lib/python3.13/unittest/case.py:651: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <authentik.enterprise.policies.unique_password.tests.test_policy.TestUniquePasswordPolicy testMethod=test_invalid>
method = <bound method TestUniquePasswordPolicy.test_invalid of <authentik.enterprise.policies.unique_password.tests.test_policy.TestUniquePasswordPolicy testMethod=test_invalid>>

    def _callTestMethod(self, method):
>       if method() is not None:

.../hostedtoolcache/Python/3.13.11................../x64/lib/python3.13/unittest/case.py:606: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <authentik.enterprise.policies.unique_password.tests.test_policy.TestUniquePasswordPolicy testMethod=test_invalid>

    def test_invalid(self):
        """Test without password present in request"""
        request = PolicyRequest(get_anonymous_user())
        result: PolicyResult = self.policy.passes(request)
        self.assertFalse(result.passing)
>       self.assertEqual(result.messages[0], "Password not set in context")

.../unique_password/tests/test_policy.py:30: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <authentik.enterprise.policies.unique_password.tests.test_policy.TestUniquePasswordPolicy testMethod=test_invalid>
first = 'Mot de passe non défini dans le contexte'
second = 'Password not set in context', msg = None

    def assertEqual(self, first, second, msg=None):
        """Fail if the two objects are unequal as determined by the '=='
           operator.
        """
        assertion_func = self._getAssertEqualityFunc(first, second)
>       assertion_func(first, second, msg=msg)

.../hostedtoolcache/Python/3.13.11................../x64/lib/python3.13/unittest/case.py:907: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <authentik.enterprise.policies.unique_password.tests.test_policy.TestUniquePasswordPolicy testMethod=test_invalid>
first = 'Mot de passe non défini dans le contexte'
second = 'Password not set in context', msg = None

    def assertMultiLineEqual(self, first, second, msg=None):
        """Assert that two multi-line strings are equal."""
        self.assertIsInstance(first, str, "First argument is not a string")
        self.assertIsInstance(second, str, "Second argument is not a string")
    
        if first != second:
            # Don't use difflib if the strings are too long
            if (len(first) > self._diffThreshold or
                len(second) > self._diffThreshold):
                self._baseAssertEqual(first, second, msg)
    
            # Append \n to both strings if either is missing the \n.
            # This allows the final ndiff to show the \n difference. The
            # exception here is if the string is empty, in which case no
            # \n should be added
            first_presplit = first
            second_presplit = second
            if first and second:
                if first[-1] != '\n' or second[-1] != '\n':
                    first_presplit += '\n'
                    second_presplit += '\n'
            elif second and second[-1] != '\n':
                second_presplit += '\n'
            elif first and first[-1] != '\n':
                first_presplit += '\n'
    
            firstlines = first_presplit.splitlines(keepends=True)
            secondlines = second_presplit.splitlines(keepends=True)
    
            # Generate the message and diff, then raise the exception
            standardMsg = '%s != %s' % _common_shorten_repr(first, second)
            diff = '\n' + ''.join(difflib.ndiff(firstlines, secondlines))
            standardMsg = self._truncateMessage(standardMsg, diff)
>           self.fail(self._formatMessage(msg, standardMsg))

.../hostedtoolcache/Python/3.13.11................../x64/lib/python3.13/unittest/case.py:1273: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

self = <authentik.enterprise.policies.unique_password.tests.test_policy.TestUniquePasswordPolicy testMethod=test_invalid>
msg = "'Mot de passe non défini dans le contexte' != 'Password not set in context'\n- Mot de passe non défini dans le contexte\n+ Password not set in context\n"

    def fail(self, msg=None):
        """Fail immediately, with the given message."""
>       raise self.failureException(msg)
E       AssertionError: 'Mot de passe non défini dans le contexte' != 'Password not set in context'
E       - Mot de passe non défini dans le contexte
E       + Password not set in context

.../hostedtoolcache/Python/3.13.11................../x64/lib/python3.13/unittest/case.py:732: AssertionError

To view more test analytics, go to the Test Analytics Dashboard
📋 Got 3 mins? Take this short survey to help us improve Test Analytics.

@rissson rissson merged commit a5d1fce into version-2025.12 Feb 2, 2026
79 of 84 checks passed
@rissson rissson deleted the cherry-pick/19936-to-version-2025.12 branch February 2, 2026 14:36
enchantednatures pushed a commit to enchantednatures/HomeCluster that referenced this pull request Feb 9, 2026
This PR contains the following updates:

| Package | Type | Update | Change |
|---|---|---|---|
|
[authentik](https://registry.terraform.io/providers/goauthentik/authentik)
([source](https://redirect.github.com/goauthentik/terraform-provider-authentik))
| required_provider | patch | `2025.12.0` → `2025.12.1` |
| [authentik](https://goauthentik.io)
([source](https://redirect.github.com/goauthentik/helm)) | | patch |
`2025.12.2` → `2025.12.3` |

---

> [!WARNING]
> Some dependencies could not be looked up. Check the Dependency
Dashboard for more information.

---

### Release Notes

<details>
<summary>goauthentik/terraform-provider-authentik (authentik)</summary>

###
[`v2025.12.1`](https://redirect.github.com/goauthentik/terraform-provider-authentik/releases/tag/v2025.12.1)

[Compare
Source](https://redirect.github.com/goauthentik/terraform-provider-authentik/compare/v2025.12.0...v2025.12.1)

##### Changelog

-
[`a19acb4`](https://redirect.github.com/goauthentik/terraform-provider-authentik/commit/a19acb417fb54a542a6476bda37775684ae8574a):
fix int conversion for outpost provider attachment
([#&#8203;832](https://redirect.github.com/goauthentik/terraform-provider-authentik/issues/832))
([@&#8203;BeryJu](https://redirect.github.com/BeryJu))
-
[`a923cda`](https://redirect.github.com/goauthentik/terraform-provider-authentik/commit/a923cda4bf2f0ec295be296dcbbebe8f7ada11d1):
fix: Support path-based Authentik deployments in URL configuration
([#&#8203;829](https://redirect.github.com/goauthentik/terraform-provider-authentik/issues/829))
([@&#8203;StefanMarkmann](https://redirect.github.com/StefanMarkmann))
-
[`8edeec9`](https://redirect.github.com/goauthentik/terraform-provider-authentik/commit/8edeec9805f126d1deb1ad5aa1a50740c5aaadfd):
Bump github.com/getsentry/sentry-go from 0.40.0 to 0.41.0
([#&#8203;834](https://redirect.github.com/goauthentik/terraform-provider-authentik/issues/834))
([@&#8203;dependabot](https://redirect.github.com/dependabot)\[bot])
-
[`e10b039`](https://redirect.github.com/goauthentik/terraform-provider-authentik/commit/e10b039884fb2fbe8ff34a6557dc38d4e714ae96):
Bump actions/checkout from 6.0.1 to 6.0.2
([#&#8203;836](https://redirect.github.com/goauthentik/terraform-provider-authentik/issues/836))
([@&#8203;dependabot](https://redirect.github.com/dependabot)\[bot])
-
[`aa73b84`](https://redirect.github.com/goauthentik/terraform-provider-authentik/commit/aa73b84a5653eeb68633f9334cf7836d9112bbbc):
Bump github.com/getsentry/sentry-go from 0.41.0 to 0.42.0
([#&#8203;842](https://redirect.github.com/goauthentik/terraform-provider-authentik/issues/842))
([@&#8203;dependabot](https://redirect.github.com/dependabot)\[bot])
-
[`4553f1d`](https://redirect.github.com/goauthentik/terraform-provider-authentik/commit/4553f1dba852ed64819277f3426aaf1cf449c25e):
Bump github.com/hashicorp/terraform-plugin-sdk/v2 from 2.38.1 to 2.38.2
([#&#8203;844](https://redirect.github.com/goauthentik/terraform-provider-authentik/issues/844))
([@&#8203;dependabot](https://redirect.github.com/dependabot)\[bot])
-
[`749d807`](https://redirect.github.com/goauthentik/terraform-provider-authentik/commit/749d807758f8d4f5a0dd2f5b4a52ad54827ac28b):
fix: paginate RbacPermissionsList to find all role permissions
([#&#8203;841](https://redirect.github.com/goauthentik/terraform-provider-authentik/issues/841))
([@&#8203;dominic-r](https://redirect.github.com/dominic-r))

</details>

<details>
<summary>goauthentik/helm (authentik)</summary>

###
[`v2025.12.3`](https://redirect.github.com/goauthentik/helm/releases/tag/authentik-2025.12.3)

[Compare
Source](https://redirect.github.com/goauthentik/helm/compare/authentik-2025.12.2...authentik-2025.12.3)

authentik is an open-source Identity Provider focused on flexibility and
versatility

#### What's Changed

- charts/authentik: bump to 2025.12.3 by
[@&#8203;authentik-automation](https://redirect.github.com/authentik-automation)\[bot]
in [#&#8203;444](https://redirect.github.com/goauthentik/helm/pull/444)
- 2025.12: Revert bulk revoke added by accident in release branch by
[@&#8203;dominic-r](https://redirect.github.com/dominic-r) in
[goauthentik/authentik#19870](https://redirect.github.com/goauthentik/authentik/pull/19870)
- web/admin: fix toggle-group for bindings now showing up (cherry-pick
[#&#8203;19820](https://redirect.github.com/goauthentik/helm/issues/19820)
to version-2025.12) by
[@&#8203;authentik-automation](https://redirect.github.com/authentik-automation)\[bot]
in
[goauthentik/authentik#19895](https://redirect.github.com/goauthentik/authentik/pull/19895)
- web: fix Brand CSS not applied to nested Shadow DOM components
(cherry-pick
[#&#8203;19892](https://redirect.github.com/goauthentik/helm/issues/19892)
to version-2025.12) by
[@&#8203;authentik-automation](https://redirect.github.com/authentik-automation)\[bot]
in
[goauthentik/authentik#19900](https://redirect.github.com/goauthentik/authentik/pull/19900)
- ci: always generate API clients
([#&#8203;19906](https://redirect.github.com/goauthentik/helm/issues/19906))
by [@&#8203;BeryJu](https://redirect.github.com/BeryJu) in
[goauthentik/authentik#19932](https://redirect.github.com/goauthentik/authentik/pull/19932)
- lifecycle/ak: make sure /data has the correct permissions (cherry-pick
[#&#8203;19935](https://redirect.github.com/goauthentik/helm/issues/19935)
to version-2025.12) by
[@&#8203;authentik-automation](https://redirect.github.com/authentik-automation)\[bot]
in
[goauthentik/authentik#19940](https://redirect.github.com/goauthentik/authentik/pull/19940)
- lifecycle/aws: add /data volume (cherry-pick
[#&#8203;19936](https://redirect.github.com/goauthentik/helm/issues/19936)
to version-2025.12) by
[@&#8203;authentik-automation](https://redirect.github.com/authentik-automation)\[bot]
in
[goauthentik/authentik#19938](https://redirect.github.com/goauthentik/authentik/pull/19938)
- core: fix non-expiring service accounts and app passwords (cherry-pick
[#&#8203;19913](https://redirect.github.com/goauthentik/helm/issues/19913)
to version-2025.12) by
[@&#8203;authentik-automation](https://redirect.github.com/authentik-automation)\[bot]
in
[goauthentik/authentik#19941](https://redirect.github.com/goauthentik/authentik/pull/19941)

**Full Changelog**:
<goauthentik/authentik@version/2025.12.2...version/2025.12.3>

</details>

---

### Configuration

📅 **Schedule**: Branch creation - "every weekend" in timezone
America/New_York, Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you
are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the
rebase/retry checkbox.

👻 **Immortal**: This PR will be recreated if closed unmerged. Get
[config
help](https://redirect.github.com/renovatebot/renovate/discussions) if
that's undesired.

---

- [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check
this box

---

This PR was generated by [Mend Renovate](https://mend.io/renovate/).
View the [repository job
log](https://developer.mend.io/github/enchantednatures/HomeCluster).

<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0Mi45NS4yIiwidXBkYXRlZEluVmVyIjoiNDIuOTUuMiIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsicmVub3ZhdGUvaGVsbSIsInR5cGUvcGF0Y2giXX0=-->

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant