website: Bump prettier from 3.3.3 to 3.4.1 in /website (#12205)
* website: Bump prettier from 3.3.3 to 3.4.1 in /website Bumps [prettier](https://github.com/prettier/prettier) from 3.3.3 to 3.4.1. - [Release notes](https://github.com/prettier/prettier/releases) - [Changelog](https://github.com/prettier/prettier/blob/main/CHANGELOG.md) - [Commits](https://github.com/prettier/prettier/compare/3.3.3...3.4.1) --- updated-dependencies: - dependency-name: prettier dependency-type: direct:development update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com> * update formatting Signed-off-by: Jens Langhammer <jens@goauthentik.io> * sigh Signed-off-by: Jens Langhammer <jens@goauthentik.io> * disable flaky test Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: dependabot[bot] <support@github.com> Signed-off-by: Jens Langhammer <jens@goauthentik.io> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Jens Langhammer <jens@goauthentik.io>
This commit is contained in:
		| @ -8,37 +8,37 @@ This integration has the advantage over manual deployments of automatic updates | ||||
|  | ||||
| The following outpost settings are used: | ||||
|  | ||||
| -   `object_naming_template`: Configures how the container is called | ||||
| -   `container_image`: Optionally overwrites the standard container image (see [Configuration](../../../install-config/configuration/configuration.mdx#authentik_outposts) to configure the global default) | ||||
| -   `docker_network`: The Docker network the container should be added to. This needs to be modified if you plan to connect to authentik using the internal hostname. | ||||
| -   `docker_map_ports`: Enable/disable the mapping of ports. When using a proxy outpost with Traefik for example, you might not want to bind ports as they are routed through Traefik. | ||||
| -   `docker_labels`: Optional additional labels that can be applied to the container. | ||||
| - `object_naming_template`: Configures how the container is called | ||||
| - `container_image`: Optionally overwrites the standard container image (see [Configuration](../../../install-config/configuration/configuration.mdx#authentik_outposts) to configure the global default) | ||||
| - `docker_network`: The Docker network the container should be added to. This needs to be modified if you plan to connect to authentik using the internal hostname. | ||||
| - `docker_map_ports`: Enable/disable the mapping of ports. When using a proxy outpost with Traefik for example, you might not want to bind ports as they are routed through Traefik. | ||||
| - `docker_labels`: Optional additional labels that can be applied to the container. | ||||
|  | ||||
| The container is created with the following hardcoded properties: | ||||
|  | ||||
| -   Labels | ||||
| - Labels | ||||
|  | ||||
|     -   `io.goauthentik.outpost-uuid`: Used by authentik to identify the container, and to allow for name changes. | ||||
|     - `io.goauthentik.outpost-uuid`: Used by authentik to identify the container, and to allow for name changes. | ||||
|  | ||||
|     Additionally, the proxy outposts have the following extra labels to add themselves into Traefik automatically. | ||||
|  | ||||
|     -   `traefik.enable`: "true" | ||||
|     -   `traefik.http.routers.ak-outpost-<outpost-name>-router.rule`: `Host(...)` | ||||
|     -   `traefik.http.routers.ak-outpost-<outpost-name>-router.service`: `ak-outpost-<outpost-name>-service` | ||||
|     -   `traefik.http.routers.ak-outpost-<outpost-name>-router.tls`: "true" | ||||
|     -   `traefik.http.services.ak-outpost-<outpost-name>-service.loadbalancer.healthcheck.path`: "/outpost.goauthentik.io/ping" | ||||
|     -   `traefik.http.services.ak-outpost-<outpost-name>-service.loadbalancer.healthcheck.port`: "9300" | ||||
|     -   `traefik.http.services.ak-outpost-<outpost-name>-service.loadbalancer.server.port`: "9000" | ||||
|     - `traefik.enable`: "true" | ||||
|     - `traefik.http.routers.ak-outpost-<outpost-name>-router.rule`: `Host(...)` | ||||
|     - `traefik.http.routers.ak-outpost-<outpost-name>-router.service`: `ak-outpost-<outpost-name>-service` | ||||
|     - `traefik.http.routers.ak-outpost-<outpost-name>-router.tls`: "true" | ||||
|     - `traefik.http.services.ak-outpost-<outpost-name>-service.loadbalancer.healthcheck.path`: "/outpost.goauthentik.io/ping" | ||||
|     - `traefik.http.services.ak-outpost-<outpost-name>-service.loadbalancer.healthcheck.port`: "9300" | ||||
|     - `traefik.http.services.ak-outpost-<outpost-name>-service.loadbalancer.server.port`: "9000" | ||||
|  | ||||
| ## Permissions | ||||
|  | ||||
| To minimise the potential risks of mapping the Docker socket into a container/giving an application access to the Docker API, many people use Projects like [docker-socket-proxy](https://github.com/Tecnativa/docker-socket-proxy). authentik requires these permissions from the Docker API: | ||||
|  | ||||
| -   Images/Pull: authentik tries to pre-pull the custom image if one is configured, otherwise falling back to the default image. | ||||
| -   Containers/Read: Gather infos about currently running container | ||||
| -   Containers/Create: Create new containers | ||||
| -   Containers/Kill: Cleanup during upgrades | ||||
| -   Containers/Remove: Removal of outposts | ||||
| - Images/Pull: authentik tries to pre-pull the custom image if one is configured, otherwise falling back to the default image. | ||||
| - Containers/Read: Gather infos about currently running container | ||||
| - Containers/Create: Create new containers | ||||
| - Containers/Kill: Cleanup during upgrades | ||||
| - Containers/Remove: Removal of outposts | ||||
|  | ||||
| ## Remote hosts (TLS) | ||||
|  | ||||
| @ -46,8 +46,8 @@ To connect remote hosts, follow this guide from Docker [Use TLS (HTTPS) to prote | ||||
|  | ||||
| Afterwards, create two certificate-keypairs in authentik: | ||||
|  | ||||
| -   `Docker CA`, with the contents of `~/.docker/ca.pem` as Certificate | ||||
| -   `Docker Cert`, with the contents of `~/.docker/cert.pem` as the certificate and `~/.docker/key.pem` as the private key. | ||||
| - `Docker CA`, with the contents of `~/.docker/ca.pem` as Certificate | ||||
| - `Docker Cert`, with the contents of `~/.docker/cert.pem` as the certificate and `~/.docker/key.pem` as the private key. | ||||
|  | ||||
| Create an integration with `Docker CA` as _TLS Verification Certificate_ and `Docker Cert` as _TLS Authentication Certificate_. | ||||
|  | ||||
| @ -65,9 +65,9 @@ openssl req -x509 -sha256 -nodes -days 365 -out certificate.pem -key authentik | ||||
|  | ||||
| You'll end up with three files: | ||||
|  | ||||
| -   `authentik.pub` is the public key, this should be added to the `~/.ssh/authorized_keys` file on the target host and user. | ||||
| -   `authentik` is the private key, which should be imported into a Keypair in authentik. | ||||
| -   `certificate.pem` is the matching certificate for the keypair above. | ||||
| - `authentik.pub` is the public key, this should be added to the `~/.ssh/authorized_keys` file on the target host and user. | ||||
| - `authentik` is the private key, which should be imported into a Keypair in authentik. | ||||
| - `certificate.pem` is the matching certificate for the keypair above. | ||||
|  | ||||
| Modify/create a new Docker integration, and set your _Docker URL_ to `ssh://hostname`, and select the keypair you created above as _TLS Authentication Certificate/SSH Keypair_. | ||||
|  | ||||
|  | ||||
| @ -8,32 +8,32 @@ This integration has the advantage over manual deployments of automatic updates | ||||
|  | ||||
| This integration creates the following objects: | ||||
|  | ||||
| -   Deployment for the outpost container | ||||
| -   Service | ||||
| -   Secret to store the token | ||||
| -   Prometheus ServiceMonitor (if the Prometheus Operator is installed in the target cluster) | ||||
| -   Ingress (only Proxy outposts) | ||||
| -   Traefik Middleware (only Proxy outposts with forward auth enabled) | ||||
| - Deployment for the outpost container | ||||
| - Service | ||||
| - Secret to store the token | ||||
| - Prometheus ServiceMonitor (if the Prometheus Operator is installed in the target cluster) | ||||
| - Ingress (only Proxy outposts) | ||||
| - Traefik Middleware (only Proxy outposts with forward auth enabled) | ||||
|  | ||||
| The following outpost settings are used: | ||||
|  | ||||
| -   `object_naming_template`: Configures how the container is called | ||||
| -   `container_image`: Optionally overwrites the standard container image (see [Configuration](../../../install-config/configuration/configuration.mdx) to configure the global default) | ||||
| -   `kubernetes_replicas`: Replica count for the deployment of the outpost | ||||
| -   `kubernetes_namespace`: Namespace to deploy in, defaults to the same namespace authentik is deployed in (if available) | ||||
| -   `kubernetes_ingress_annotations`: Any additional annotations to add to the ingress object, for example cert-manager | ||||
| -   `kubernetes_ingress_secret_name`: Name of the secret that is used for TLS connections, can be empty to disable TLS config | ||||
| -   `kubernetes_ingress_class_name`: Optionally set the ingress class used for the generated ingress, requires authentik 2022.11.0 | ||||
| -   `kubernetes_service_type`: Service kind created, can be set to LoadBalancer for LDAP outposts for example | ||||
| -   `kubernetes_disabled_components`: Disable any components of the kubernetes integration, can be any of | ||||
|     -   'secret' | ||||
|     -   'deployment' | ||||
|     -   'service' | ||||
|     -   'prometheus servicemonitor' | ||||
|     -   'ingress' | ||||
|     -   'traefik middleware' | ||||
| -   `kubernetes_image_pull_secrets`: If the above docker image is in a private repository, use these secrets to pull. (NOTE: The secret must be created manually in the namespace first.) | ||||
| -   `kubernetes_json_patches`: Applies an RFC 6902 compliant JSON patch to the Kubernetes objects. | ||||
| - `object_naming_template`: Configures how the container is called | ||||
| - `container_image`: Optionally overwrites the standard container image (see [Configuration](../../../install-config/configuration/configuration.mdx) to configure the global default) | ||||
| - `kubernetes_replicas`: Replica count for the deployment of the outpost | ||||
| - `kubernetes_namespace`: Namespace to deploy in, defaults to the same namespace authentik is deployed in (if available) | ||||
| - `kubernetes_ingress_annotations`: Any additional annotations to add to the ingress object, for example cert-manager | ||||
| - `kubernetes_ingress_secret_name`: Name of the secret that is used for TLS connections, can be empty to disable TLS config | ||||
| - `kubernetes_ingress_class_name`: Optionally set the ingress class used for the generated ingress, requires authentik 2022.11.0 | ||||
| - `kubernetes_service_type`: Service kind created, can be set to LoadBalancer for LDAP outposts for example | ||||
| - `kubernetes_disabled_components`: Disable any components of the kubernetes integration, can be any of | ||||
|     - 'secret' | ||||
|     - 'deployment' | ||||
|     - 'service' | ||||
|     - 'prometheus servicemonitor' | ||||
|     - 'ingress' | ||||
|     - 'traefik middleware' | ||||
| - `kubernetes_image_pull_secrets`: If the above docker image is in a private repository, use these secrets to pull. (NOTE: The secret must be created manually in the namespace first.) | ||||
| - `kubernetes_json_patches`: Applies an RFC 6902 compliant JSON patch to the Kubernetes objects. | ||||
|  | ||||
| ## Permissions | ||||
|  | ||||
|  | ||||
		Reference in New Issue
	
	Block a user
	![49699333+dependabot[bot]@users.noreply.github.com](/assets/img/avatar_default.png) dependabot[bot]
					dependabot[bot]