Compare commits
177 Commits
root/confi
...
version/20
Author | SHA1 | Date | |
---|---|---|---|
80de3ee853 | |||
c340830b37 | |||
472b9ea866 | |||
4c5b07a091 | |||
fbd00bf5f8 | |||
a598276aa0 | |||
deb91bd12b | |||
92b8cf1b64 | |||
58e001c3d5 | |||
54ac920f81 | |||
fc9ae9e938 | |||
81d70e5d41 | |||
6bb809fd82 | |||
1a55c3de2b | |||
16b59f3e65 | |||
de0e710378 | |||
4a6f3330ed | |||
d4d8ab2757 | |||
950a107a13 | |||
aadeba46f2 | |||
6f2f53994c | |||
faabc62e5c | |||
ec42b597ab | |||
925477b3a2 | |||
cefc1a57ee | |||
53b25d61f7 | |||
1240ed6c6d | |||
3740b45e1a | |||
eb8181daa0 | |||
6a25cf6c5d | |||
be42e5562d | |||
19d2fcb542 | |||
06bdfd7f04 | |||
3c6cb5a2d1 | |||
2467754d0b | |||
97d71758a4 | |||
d4dce5b250 | |||
cf36da2e5d | |||
8f70354e3c | |||
4f868c2ef2 | |||
b69e55eae9 | |||
21e29744c2 | |||
e490d25791 | |||
c5870fcab2 | |||
8850446bc2 | |||
10b9878f03 | |||
f28834ffad | |||
a2947975e4 | |||
0735e35a1d | |||
27638d6a92 | |||
8de92943ab | |||
99bb4c2cf8 | |||
b225f6f3ff | |||
ecd5fab082 | |||
b85b5d8c3b | |||
8068e27eaf | |||
af43330fd6 | |||
1f88330133 | |||
64aa385f90 | |||
cae04b8198 | |||
1be792fbd8 | |||
6a64d6b536 | |||
243be8f7bb | |||
a7cf454760 | |||
5aa43eeb04 | |||
9398fbcf9e | |||
d010ab7d43 | |||
0891d9df6a | |||
b976d3e874 | |||
b42f46bad4 | |||
8e17dfbaee | |||
ef2f7779df | |||
afacfe5734 | |||
91db046978 | |||
5acffc2bb6 | |||
c5a935474b | |||
89417ce455 | |||
ec9085ff06 | |||
c6e638ddc2 | |||
7a85038c11 | |||
3170b2f92c | |||
555b33c252 | |||
f5047e3ab0 | |||
f6070e33f5 | |||
3a53e60af7 | |||
602a9df97b | |||
425e68c874 | |||
0bbe74e2bf | |||
61b06eff06 | |||
1919a9dd77 | |||
b3323c5d00 | |||
fd9ce531c9 | |||
ed01a844ef | |||
c6843a1307 | |||
3d21ea1df4 | |||
00a16bee76 | |||
b9a2323c51 | |||
66aabcc371 | |||
de389e2385 | |||
52a0b19f7e | |||
33f547c870 | |||
0767107730 | |||
c960601a1e | |||
146d54813c | |||
388367785d | |||
a890b93869 | |||
8cf0a5dace | |||
547c01f481 | |||
fabb03ca69 | |||
352a2057dd | |||
698780dfda | |||
93a19cfda0 | |||
e3244c1d21 | |||
7488fca4b4 | |||
d1fd56b757 | |||
ada44d84f8 | |||
7d4ce41e12 | |||
798245b8db | |||
ccf956d5c6 | |||
f98b5b651b | |||
cadb710c38 | |||
095cb75d6c | |||
2113029a14 | |||
c590cb86cf | |||
0c7b0c7526 | |||
ef8bbb93ae | |||
068e70a0d7 | |||
3f108a0ed8 | |||
e9687b8cbe | |||
54a98379ba | |||
1de546eaec | |||
dbf2bd5aba | |||
f2386f126e | |||
ffc97905f3 | |||
dbd324f202 | |||
98b7597fde | |||
18cfe67719 | |||
456da49f36 | |||
6e499a2733 | |||
40463088d2 | |||
9394a76962 | |||
e5ba5d51fe | |||
55782d3929 | |||
47f4b4247c | |||
7551995c6e | |||
c6aa95f1c7 | |||
a9ee43791d | |||
27231fd5d7 | |||
eb60bba0d5 | |||
5044f8ce6d | |||
13cc7ca77b | |||
6d207b0b0a | |||
6345f99aa0 | |||
fcc47038e4 | |||
95551a753a | |||
19b3d648a4 | |||
1bbe402281 | |||
ac48c59b5a | |||
c05d6b96a2 | |||
b99929cf16 | |||
72168fae29 | |||
96eeb91493 | |||
c2b4d14af5 | |||
627e8a250e | |||
ecb1ce8135 | |||
6e5ad60cea | |||
3651fb5daf | |||
fa23d307aa | |||
dbf21796ff | |||
55a74bdd7d | |||
9cdb601b91 | |||
93e665949f | |||
5144a9af4c | |||
93772e492b | |||
f97b65d44b | |||
ee70ebfb10 | |||
5631a99f00 |
@ -1,5 +1,5 @@
|
|||||||
[bumpversion]
|
[bumpversion]
|
||||||
current_version = 2023.1.2
|
current_version = 2023.2.1
|
||||||
tag = True
|
tag = True
|
||||||
commit = True
|
commit = True
|
||||||
parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)
|
parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)
|
||||||
|
2
.github/actions/setup/action.yml
vendored
2
.github/actions/setup/action.yml
vendored
@ -18,7 +18,7 @@ runs:
|
|||||||
- name: Setup node
|
- name: Setup node
|
||||||
uses: actions/setup-node@v3.1.0
|
uses: actions/setup-node@v3.1.0
|
||||||
with:
|
with:
|
||||||
node-version: '16'
|
node-version: '18'
|
||||||
cache: 'npm'
|
cache: 'npm'
|
||||||
cache-dependency-path: web/package-lock.json
|
cache-dependency-path: web/package-lock.json
|
||||||
- name: Setup dependencies
|
- name: Setup dependencies
|
||||||
|
4
.github/workflows/ci-main.yml
vendored
4
.github/workflows/ci-main.yml
vendored
@ -188,7 +188,7 @@ jobs:
|
|||||||
username: ${{ github.repository_owner }}
|
username: ${{ github.repository_owner }}
|
||||||
password: ${{ secrets.GITHUB_TOKEN }}
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
- name: Build Docker Image
|
- name: Build Docker Image
|
||||||
uses: docker/build-push-action@v3
|
uses: docker/build-push-action@v4
|
||||||
with:
|
with:
|
||||||
secrets: |
|
secrets: |
|
||||||
GEOIPUPDATE_ACCOUNT_ID=${{ secrets.GEOIPUPDATE_ACCOUNT_ID }}
|
GEOIPUPDATE_ACCOUNT_ID=${{ secrets.GEOIPUPDATE_ACCOUNT_ID }}
|
||||||
@ -229,7 +229,7 @@ jobs:
|
|||||||
username: ${{ github.repository_owner }}
|
username: ${{ github.repository_owner }}
|
||||||
password: ${{ secrets.GITHUB_TOKEN }}
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
- name: Build Docker Image
|
- name: Build Docker Image
|
||||||
uses: docker/build-push-action@v3
|
uses: docker/build-push-action@v4
|
||||||
with:
|
with:
|
||||||
secrets: |
|
secrets: |
|
||||||
GEOIPUPDATE_ACCOUNT_ID=${{ secrets.GEOIPUPDATE_ACCOUNT_ID }}
|
GEOIPUPDATE_ACCOUNT_ID=${{ secrets.GEOIPUPDATE_ACCOUNT_ID }}
|
||||||
|
9
.github/workflows/ci-outpost.yml
vendored
9
.github/workflows/ci-outpost.yml
vendored
@ -49,7 +49,7 @@ jobs:
|
|||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- run: echo mark
|
- run: echo mark
|
||||||
build:
|
build-container:
|
||||||
timeout-minutes: 120
|
timeout-minutes: 120
|
||||||
needs:
|
needs:
|
||||||
- ci-outpost-mark
|
- ci-outpost-mark
|
||||||
@ -83,7 +83,7 @@ jobs:
|
|||||||
- name: Generate API
|
- name: Generate API
|
||||||
run: make gen-client-go
|
run: make gen-client-go
|
||||||
- name: Build Docker Image
|
- name: Build Docker Image
|
||||||
uses: docker/build-push-action@v3
|
uses: docker/build-push-action@v4
|
||||||
with:
|
with:
|
||||||
push: ${{ steps.ev.outputs.shouldBuild == 'true' }}
|
push: ${{ steps.ev.outputs.shouldBuild == 'true' }}
|
||||||
tags: |
|
tags: |
|
||||||
@ -94,7 +94,8 @@ jobs:
|
|||||||
GIT_BUILD_HASH=${{ steps.ev.outputs.sha }}
|
GIT_BUILD_HASH=${{ steps.ev.outputs.sha }}
|
||||||
VERSION_FAMILY=${{ steps.ev.outputs.versionFamily }}
|
VERSION_FAMILY=${{ steps.ev.outputs.versionFamily }}
|
||||||
platforms: ${{ matrix.arch }}
|
platforms: ${{ matrix.arch }}
|
||||||
build-outpost-binary:
|
context: .
|
||||||
|
build-binary:
|
||||||
timeout-minutes: 120
|
timeout-minutes: 120
|
||||||
needs:
|
needs:
|
||||||
- ci-outpost-mark
|
- ci-outpost-mark
|
||||||
@ -114,7 +115,7 @@ jobs:
|
|||||||
go-version: "^1.17"
|
go-version: "^1.17"
|
||||||
- uses: actions/setup-node@v3.6.0
|
- uses: actions/setup-node@v3.6.0
|
||||||
with:
|
with:
|
||||||
node-version: '16'
|
node-version: '18'
|
||||||
cache: 'npm'
|
cache: 'npm'
|
||||||
cache-dependency-path: web/package-lock.json
|
cache-dependency-path: web/package-lock.json
|
||||||
- name: Generate API
|
- name: Generate API
|
||||||
|
10
.github/workflows/ci-web.yml
vendored
10
.github/workflows/ci-web.yml
vendored
@ -17,7 +17,7 @@ jobs:
|
|||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- uses: actions/setup-node@v3.6.0
|
- uses: actions/setup-node@v3.6.0
|
||||||
with:
|
with:
|
||||||
node-version: '16'
|
node-version: '18'
|
||||||
cache: 'npm'
|
cache: 'npm'
|
||||||
cache-dependency-path: web/package-lock.json
|
cache-dependency-path: web/package-lock.json
|
||||||
- working-directory: web/
|
- working-directory: web/
|
||||||
@ -33,7 +33,7 @@ jobs:
|
|||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- uses: actions/setup-node@v3.6.0
|
- uses: actions/setup-node@v3.6.0
|
||||||
with:
|
with:
|
||||||
node-version: '16'
|
node-version: '18'
|
||||||
cache: 'npm'
|
cache: 'npm'
|
||||||
cache-dependency-path: web/package-lock.json
|
cache-dependency-path: web/package-lock.json
|
||||||
- working-directory: web/
|
- working-directory: web/
|
||||||
@ -49,7 +49,7 @@ jobs:
|
|||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- uses: actions/setup-node@v3.6.0
|
- uses: actions/setup-node@v3.6.0
|
||||||
with:
|
with:
|
||||||
node-version: '16'
|
node-version: '18'
|
||||||
cache: 'npm'
|
cache: 'npm'
|
||||||
cache-dependency-path: web/package-lock.json
|
cache-dependency-path: web/package-lock.json
|
||||||
- working-directory: web/
|
- working-directory: web/
|
||||||
@ -65,7 +65,7 @@ jobs:
|
|||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- uses: actions/setup-node@v3.6.0
|
- uses: actions/setup-node@v3.6.0
|
||||||
with:
|
with:
|
||||||
node-version: '16'
|
node-version: '18'
|
||||||
cache: 'npm'
|
cache: 'npm'
|
||||||
cache-dependency-path: web/package-lock.json
|
cache-dependency-path: web/package-lock.json
|
||||||
- working-directory: web/
|
- working-directory: web/
|
||||||
@ -97,7 +97,7 @@ jobs:
|
|||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- uses: actions/setup-node@v3.6.0
|
- uses: actions/setup-node@v3.6.0
|
||||||
with:
|
with:
|
||||||
node-version: '16'
|
node-version: '18'
|
||||||
cache: 'npm'
|
cache: 'npm'
|
||||||
cache-dependency-path: web/package-lock.json
|
cache-dependency-path: web/package-lock.json
|
||||||
- working-directory: web/
|
- working-directory: web/
|
||||||
|
17
.github/workflows/ci-website.yml
vendored
17
.github/workflows/ci-website.yml
vendored
@ -17,7 +17,7 @@ jobs:
|
|||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
- uses: actions/setup-node@v3.6.0
|
- uses: actions/setup-node@v3.6.0
|
||||||
with:
|
with:
|
||||||
node-version: '16'
|
node-version: '18'
|
||||||
cache: 'npm'
|
cache: 'npm'
|
||||||
cache-dependency-path: website/package-lock.json
|
cache-dependency-path: website/package-lock.json
|
||||||
- working-directory: website/
|
- working-directory: website/
|
||||||
@ -25,9 +25,24 @@ jobs:
|
|||||||
- name: prettier
|
- name: prettier
|
||||||
working-directory: website/
|
working-directory: website/
|
||||||
run: npm run prettier-check
|
run: npm run prettier-check
|
||||||
|
test:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v3
|
||||||
|
- uses: actions/setup-node@v3.6.0
|
||||||
|
with:
|
||||||
|
node-version: '18'
|
||||||
|
cache: 'npm'
|
||||||
|
cache-dependency-path: website/package-lock.json
|
||||||
|
- working-directory: website/
|
||||||
|
run: npm ci
|
||||||
|
- name: test
|
||||||
|
working-directory: website/
|
||||||
|
run: npm test
|
||||||
ci-website-mark:
|
ci-website-mark:
|
||||||
needs:
|
needs:
|
||||||
- lint-prettier
|
- lint-prettier
|
||||||
|
- test
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- run: echo mark
|
- run: echo mark
|
||||||
|
6
.github/workflows/release-publish.yml
vendored
6
.github/workflows/release-publish.yml
vendored
@ -28,7 +28,7 @@ jobs:
|
|||||||
username: ${{ github.repository_owner }}
|
username: ${{ github.repository_owner }}
|
||||||
password: ${{ secrets.GITHUB_TOKEN }}
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
- name: Build Docker Image
|
- name: Build Docker Image
|
||||||
uses: docker/build-push-action@v3
|
uses: docker/build-push-action@v4
|
||||||
with:
|
with:
|
||||||
push: ${{ github.event_name == 'release' }}
|
push: ${{ github.event_name == 'release' }}
|
||||||
secrets: |
|
secrets: |
|
||||||
@ -76,7 +76,7 @@ jobs:
|
|||||||
username: ${{ github.repository_owner }}
|
username: ${{ github.repository_owner }}
|
||||||
password: ${{ secrets.GITHUB_TOKEN }}
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
- name: Build Docker Image
|
- name: Build Docker Image
|
||||||
uses: docker/build-push-action@v3
|
uses: docker/build-push-action@v4
|
||||||
with:
|
with:
|
||||||
push: ${{ github.event_name == 'release' }}
|
push: ${{ github.event_name == 'release' }}
|
||||||
tags: |
|
tags: |
|
||||||
@ -108,7 +108,7 @@ jobs:
|
|||||||
go-version: "^1.17"
|
go-version: "^1.17"
|
||||||
- uses: actions/setup-node@v3.6.0
|
- uses: actions/setup-node@v3.6.0
|
||||||
with:
|
with:
|
||||||
node-version: '16'
|
node-version: '18'
|
||||||
cache: 'npm'
|
cache: 'npm'
|
||||||
cache-dependency-path: web/package-lock.json
|
cache-dependency-path: web/package-lock.json
|
||||||
- name: Build web
|
- name: Build web
|
||||||
|
2
.github/workflows/web-api-publish.yml
vendored
2
.github/workflows/web-api-publish.yml
vendored
@ -14,7 +14,7 @@ jobs:
|
|||||||
token: ${{ secrets.BOT_GITHUB_TOKEN }}
|
token: ${{ secrets.BOT_GITHUB_TOKEN }}
|
||||||
- uses: actions/setup-node@v3.6.0
|
- uses: actions/setup-node@v3.6.0
|
||||||
with:
|
with:
|
||||||
node-version: '16'
|
node-version: '18'
|
||||||
registry-url: 'https://registry.npmjs.org'
|
registry-url: 'https://registry.npmjs.org'
|
||||||
- name: Generate API Client
|
- name: Generate API Client
|
||||||
run: make gen-client-ts
|
run: make gen-client-ts
|
||||||
|
3
.vscode/settings.json
vendored
3
.vscode/settings.json
vendored
@ -46,5 +46,6 @@
|
|||||||
"url": "https://github.com/goauthentik/authentik/issues/<num>",
|
"url": "https://github.com/goauthentik/authentik/issues/<num>",
|
||||||
"ignoreCase": false
|
"ignoreCase": false
|
||||||
}
|
}
|
||||||
]
|
],
|
||||||
|
"go.testFlags": ["-count=1"]
|
||||||
}
|
}
|
||||||
|
@ -20,7 +20,7 @@ WORKDIR /work/web
|
|||||||
RUN npm ci && npm run build
|
RUN npm ci && npm run build
|
||||||
|
|
||||||
# Stage 3: Poetry to requirements.txt export
|
# Stage 3: Poetry to requirements.txt export
|
||||||
FROM docker.io/python:3.11.1-slim-bullseye AS poetry-locker
|
FROM docker.io/python:3.11.2-slim-bullseye AS poetry-locker
|
||||||
|
|
||||||
WORKDIR /work
|
WORKDIR /work
|
||||||
COPY ./pyproject.toml /work
|
COPY ./pyproject.toml /work
|
||||||
@ -31,7 +31,7 @@ RUN pip install --no-cache-dir poetry && \
|
|||||||
poetry export -f requirements.txt --dev --output requirements-dev.txt
|
poetry export -f requirements.txt --dev --output requirements-dev.txt
|
||||||
|
|
||||||
# Stage 4: Build go proxy
|
# Stage 4: Build go proxy
|
||||||
FROM docker.io/golang:1.19.5-bullseye AS go-builder
|
FROM docker.io/golang:1.20.0-bullseye AS go-builder
|
||||||
|
|
||||||
WORKDIR /work
|
WORKDIR /work
|
||||||
|
|
||||||
@ -62,7 +62,7 @@ RUN --mount=type=secret,id=GEOIPUPDATE_ACCOUNT_ID \
|
|||||||
"
|
"
|
||||||
|
|
||||||
# Stage 6: Run
|
# Stage 6: Run
|
||||||
FROM docker.io/python:3.11.1-slim-bullseye AS final-image
|
FROM docker.io/python:3.11.2-slim-bullseye AS final-image
|
||||||
|
|
||||||
LABEL org.opencontainers.image.url https://goauthentik.io
|
LABEL org.opencontainers.image.url https://goauthentik.io
|
||||||
LABEL org.opencontainers.image.description goauthentik.io Main server image, see https://goauthentik.io for more info.
|
LABEL org.opencontainers.image.description goauthentik.io Main server image, see https://goauthentik.io for more info.
|
||||||
|
12
README.md
12
README.md
@ -38,6 +38,10 @@ See [Development Documentation](https://goauthentik.io/developer-docs/?utm_sourc
|
|||||||
|
|
||||||
See [SECURITY.md](SECURITY.md)
|
See [SECURITY.md](SECURITY.md)
|
||||||
|
|
||||||
|
## Support
|
||||||
|
|
||||||
|
Your organization uses authentik? We'd love to add your logo to the readme and our website! Email us @ hello@goauthentik.io or open a GitHub Issue/PR!
|
||||||
|
|
||||||
## Sponsors
|
## Sponsors
|
||||||
|
|
||||||
This project is proudly sponsored by:
|
This project is proudly sponsored by:
|
||||||
@ -49,11 +53,3 @@ This project is proudly sponsored by:
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
DigitalOcean provides development and testing resources for authentik.
|
DigitalOcean provides development and testing resources for authentik.
|
||||||
|
|
||||||
<p>
|
|
||||||
<a href="https://www.netlify.com">
|
|
||||||
<img src="https://www.netlify.com/img/global/badges/netlify-color-accent.svg" alt="Deploys by Netlify" />
|
|
||||||
</a>
|
|
||||||
</p>
|
|
||||||
|
|
||||||
Netlify hosts the [goauthentik.io](https://goauthentik.io) site.
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
from os import environ
|
from os import environ
|
||||||
from typing import Optional
|
from typing import Optional
|
||||||
|
|
||||||
__version__ = "2023.1.2"
|
__version__ = "2023.2.1"
|
||||||
ENV_GIT_HASH_KEY = "GIT_BUILD_HASH"
|
ENV_GIT_HASH_KEY = "GIT_BUILD_HASH"
|
||||||
|
|
||||||
|
|
||||||
|
@ -97,8 +97,14 @@ class SystemView(APIView):
|
|||||||
permission_classes = [IsAdminUser]
|
permission_classes = [IsAdminUser]
|
||||||
pagination_class = None
|
pagination_class = None
|
||||||
filter_backends = []
|
filter_backends = []
|
||||||
|
serializer_class = SystemSerializer
|
||||||
|
|
||||||
@extend_schema(responses={200: SystemSerializer(many=False)})
|
@extend_schema(responses={200: SystemSerializer(many=False)})
|
||||||
def get(self, request: Request) -> Response:
|
def get(self, request: Request) -> Response:
|
||||||
"""Get system information."""
|
"""Get system information."""
|
||||||
return Response(SystemSerializer(request).data)
|
return Response(SystemSerializer(request).data)
|
||||||
|
|
||||||
|
@extend_schema(responses={200: SystemSerializer(many=False)})
|
||||||
|
def post(self, request: Request) -> Response:
|
||||||
|
"""Get system information."""
|
||||||
|
return Response(SystemSerializer(request).data)
|
||||||
|
@ -50,7 +50,8 @@ class TaskSerializer(PassiveSerializer):
|
|||||||
are pickled in cache. In that case, just delete the info"""
|
are pickled in cache. In that case, just delete the info"""
|
||||||
try:
|
try:
|
||||||
return super().to_representation(instance)
|
return super().to_representation(instance)
|
||||||
except AttributeError: # pragma: no cover
|
# pylint: disable=broad-except
|
||||||
|
except Exception: # pragma: no cover
|
||||||
if isinstance(self.instance, list):
|
if isinstance(self.instance, list):
|
||||||
for inst in self.instance:
|
for inst in self.instance:
|
||||||
inst.delete()
|
inst.delete()
|
||||||
|
@ -18,4 +18,4 @@ def monitoring_set_workers(sender, **kwargs):
|
|||||||
def monitoring_set_tasks(sender, **kwargs):
|
def monitoring_set_tasks(sender, **kwargs):
|
||||||
"""Set task gauges"""
|
"""Set task gauges"""
|
||||||
for task in TaskInfo.all().values():
|
for task in TaskInfo.all().values():
|
||||||
task.set_prom_metrics()
|
task.update_metrics()
|
||||||
|
@ -42,7 +42,7 @@ def bearer_auth(raw_header: bytes) -> Optional[User]:
|
|||||||
|
|
||||||
def auth_user_lookup(raw_header: bytes) -> Optional[User]:
|
def auth_user_lookup(raw_header: bytes) -> Optional[User]:
|
||||||
"""raw_header in the Format of `Bearer ....`"""
|
"""raw_header in the Format of `Bearer ....`"""
|
||||||
from authentik.providers.oauth2.models import RefreshToken
|
from authentik.providers.oauth2.models import AccessToken
|
||||||
|
|
||||||
auth_credentials = validate_auth(raw_header)
|
auth_credentials = validate_auth(raw_header)
|
||||||
if not auth_credentials:
|
if not auth_credentials:
|
||||||
@ -55,8 +55,8 @@ def auth_user_lookup(raw_header: bytes) -> Optional[User]:
|
|||||||
CTX_AUTH_VIA.set("api_token")
|
CTX_AUTH_VIA.set("api_token")
|
||||||
return key_token.user
|
return key_token.user
|
||||||
# then try to auth via JWT
|
# then try to auth via JWT
|
||||||
jwt_token = RefreshToken.filter_not_expired(
|
jwt_token = AccessToken.filter_not_expired(
|
||||||
refresh_token=auth_credentials, _scope__icontains=SCOPE_AUTHENTIK_API
|
token=auth_credentials, _scope__icontains=SCOPE_AUTHENTIK_API
|
||||||
).first()
|
).first()
|
||||||
if jwt_token:
|
if jwt_token:
|
||||||
# Double-check scopes, since they are saved in a single string
|
# Double-check scopes, since they are saved in a single string
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
"""Test API Authentication"""
|
"""Test API Authentication"""
|
||||||
|
import json
|
||||||
from base64 import b64encode
|
from base64 import b64encode
|
||||||
|
|
||||||
from django.conf import settings
|
from django.conf import settings
|
||||||
@ -11,7 +12,7 @@ from authentik.core.models import USER_ATTRIBUTE_SA, Token, TokenIntents
|
|||||||
from authentik.core.tests.utils import create_test_admin_user, create_test_flow
|
from authentik.core.tests.utils import create_test_admin_user, create_test_flow
|
||||||
from authentik.lib.generators import generate_id
|
from authentik.lib.generators import generate_id
|
||||||
from authentik.providers.oauth2.constants import SCOPE_AUTHENTIK_API
|
from authentik.providers.oauth2.constants import SCOPE_AUTHENTIK_API
|
||||||
from authentik.providers.oauth2.models import OAuth2Provider, RefreshToken
|
from authentik.providers.oauth2.models import AccessToken, OAuth2Provider
|
||||||
|
|
||||||
|
|
||||||
class TestAPIAuth(TestCase):
|
class TestAPIAuth(TestCase):
|
||||||
@ -63,24 +64,26 @@ class TestAPIAuth(TestCase):
|
|||||||
provider = OAuth2Provider.objects.create(
|
provider = OAuth2Provider.objects.create(
|
||||||
name=generate_id(), client_id=generate_id(), authorization_flow=create_test_flow()
|
name=generate_id(), client_id=generate_id(), authorization_flow=create_test_flow()
|
||||||
)
|
)
|
||||||
refresh = RefreshToken.objects.create(
|
refresh = AccessToken.objects.create(
|
||||||
user=create_test_admin_user(),
|
user=create_test_admin_user(),
|
||||||
provider=provider,
|
provider=provider,
|
||||||
refresh_token=generate_id(),
|
token=generate_id(),
|
||||||
_scope=SCOPE_AUTHENTIK_API,
|
_scope=SCOPE_AUTHENTIK_API,
|
||||||
|
_id_token=json.dumps({}),
|
||||||
)
|
)
|
||||||
self.assertEqual(bearer_auth(f"Bearer {refresh.refresh_token}".encode()), refresh.user)
|
self.assertEqual(bearer_auth(f"Bearer {refresh.token}".encode()), refresh.user)
|
||||||
|
|
||||||
def test_jwt_missing_scope(self):
|
def test_jwt_missing_scope(self):
|
||||||
"""Test valid JWT"""
|
"""Test valid JWT"""
|
||||||
provider = OAuth2Provider.objects.create(
|
provider = OAuth2Provider.objects.create(
|
||||||
name=generate_id(), client_id=generate_id(), authorization_flow=create_test_flow()
|
name=generate_id(), client_id=generate_id(), authorization_flow=create_test_flow()
|
||||||
)
|
)
|
||||||
refresh = RefreshToken.objects.create(
|
refresh = AccessToken.objects.create(
|
||||||
user=create_test_admin_user(),
|
user=create_test_admin_user(),
|
||||||
provider=provider,
|
provider=provider,
|
||||||
refresh_token=generate_id(),
|
token=generate_id(),
|
||||||
_scope="",
|
_scope="",
|
||||||
|
_id_token=json.dumps({}),
|
||||||
)
|
)
|
||||||
with self.assertRaises(AuthenticationFailed):
|
with self.assertRaises(AuthenticationFailed):
|
||||||
self.assertEqual(bearer_auth(f"Bearer {refresh.refresh_token}".encode()), refresh.user)
|
self.assertEqual(bearer_auth(f"Bearer {refresh.token}".encode()), refresh.user)
|
||||||
|
@ -50,7 +50,11 @@ from authentik.policies.reputation.api import ReputationPolicyViewSet, Reputatio
|
|||||||
from authentik.providers.ldap.api import LDAPOutpostConfigViewSet, LDAPProviderViewSet
|
from authentik.providers.ldap.api import LDAPOutpostConfigViewSet, LDAPProviderViewSet
|
||||||
from authentik.providers.oauth2.api.providers import OAuth2ProviderViewSet
|
from authentik.providers.oauth2.api.providers import OAuth2ProviderViewSet
|
||||||
from authentik.providers.oauth2.api.scopes import ScopeMappingViewSet
|
from authentik.providers.oauth2.api.scopes import ScopeMappingViewSet
|
||||||
from authentik.providers.oauth2.api.tokens import AuthorizationCodeViewSet, RefreshTokenViewSet
|
from authentik.providers.oauth2.api.tokens import (
|
||||||
|
AccessTokenViewSet,
|
||||||
|
AuthorizationCodeViewSet,
|
||||||
|
RefreshTokenViewSet,
|
||||||
|
)
|
||||||
from authentik.providers.proxy.api import ProxyOutpostConfigViewSet, ProxyProviderViewSet
|
from authentik.providers.proxy.api import ProxyOutpostConfigViewSet, ProxyProviderViewSet
|
||||||
from authentik.providers.saml.api.property_mapping import SAMLPropertyMappingViewSet
|
from authentik.providers.saml.api.property_mapping import SAMLPropertyMappingViewSet
|
||||||
from authentik.providers.saml.api.providers import SAMLProviderViewSet
|
from authentik.providers.saml.api.providers import SAMLProviderViewSet
|
||||||
@ -162,6 +166,7 @@ router.register("providers/saml", SAMLProviderViewSet)
|
|||||||
|
|
||||||
router.register("oauth2/authorization_codes", AuthorizationCodeViewSet)
|
router.register("oauth2/authorization_codes", AuthorizationCodeViewSet)
|
||||||
router.register("oauth2/refresh_tokens", RefreshTokenViewSet)
|
router.register("oauth2/refresh_tokens", RefreshTokenViewSet)
|
||||||
|
router.register("oauth2/access_tokens", AccessTokenViewSet)
|
||||||
|
|
||||||
router.register("propertymappings/all", PropertyMappingViewSet)
|
router.register("propertymappings/all", PropertyMappingViewSet)
|
||||||
router.register("propertymappings/ldap", LDAPPropertyMappingViewSet)
|
router.register("propertymappings/ldap", LDAPPropertyMappingViewSet)
|
||||||
|
@ -58,7 +58,6 @@ class BlueprintInstanceSerializer(ModelSerializer):
|
|||||||
return super().validate(attrs)
|
return super().validate(attrs)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = BlueprintInstance
|
model = BlueprintInstance
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -71,7 +71,6 @@ def migration_blueprint_import(apps: Apps, schema_editor: BaseDatabaseSchemaEdit
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
initial = True
|
initial = True
|
||||||
|
|
||||||
dependencies = [("authentik_flows", "0001_initial")]
|
dependencies = [("authentik_flows", "0001_initial")]
|
||||||
@ -86,7 +85,12 @@ class Migration(migrations.Migration):
|
|||||||
"managed",
|
"managed",
|
||||||
models.TextField(
|
models.TextField(
|
||||||
default=None,
|
default=None,
|
||||||
help_text="Objects which are managed by authentik. These objects are created and updated automatically. This is flag only indicates that an object can be overwritten by migrations. You can still modify the objects via the API, but expect changes to be overwritten in a later update.",
|
help_text=(
|
||||||
|
"Objects which are managed by authentik. These objects are created and"
|
||||||
|
" updated automatically. This is flag only indicates that an object can"
|
||||||
|
" be overwritten by migrations. You can still modify the objects via"
|
||||||
|
" the API, but expect changes to be overwritten in a later update."
|
||||||
|
),
|
||||||
null=True,
|
null=True,
|
||||||
unique=True,
|
unique=True,
|
||||||
verbose_name="Managed by authentik",
|
verbose_name="Managed by authentik",
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_blueprints", "0001_initial"),
|
("authentik_blueprints", "0001_initial"),
|
||||||
]
|
]
|
||||||
|
@ -29,18 +29,15 @@ class ManagedModel(models.Model):
|
|||||||
null=True,
|
null=True,
|
||||||
verbose_name=_("Managed by authentik"),
|
verbose_name=_("Managed by authentik"),
|
||||||
help_text=_(
|
help_text=_(
|
||||||
(
|
|
||||||
"Objects which are managed by authentik. These objects are created and updated "
|
"Objects which are managed by authentik. These objects are created and updated "
|
||||||
"automatically. This is flag only indicates that an object can be overwritten by "
|
"automatically. This is flag only indicates that an object can be overwritten by "
|
||||||
"migrations. You can still modify the objects via the API, but expect changes "
|
"migrations. You can still modify the objects via the API, but expect changes "
|
||||||
"to be overwritten in a later update."
|
"to be overwritten in a later update."
|
||||||
)
|
|
||||||
),
|
),
|
||||||
unique=True,
|
unique=True,
|
||||||
)
|
)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
abstract = True
|
abstract = True
|
||||||
|
|
||||||
|
|
||||||
@ -109,7 +106,6 @@ class BlueprintInstance(SerializerModel, ManagedModel, CreatedUpdatedModel):
|
|||||||
return f"Blueprint Instance {self.name}"
|
return f"Blueprint Instance {self.name}"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Blueprint Instance")
|
verbose_name = _("Blueprint Instance")
|
||||||
verbose_name_plural = _("Blueprint Instances")
|
verbose_name_plural = _("Blueprint Instances")
|
||||||
unique_together = (
|
unique_together = (
|
||||||
|
@ -24,19 +24,15 @@ class TestBlueprintsV1(TransactionTestCase):
|
|||||||
importer = Importer('{"version": 3}')
|
importer = Importer('{"version": 3}')
|
||||||
self.assertFalse(importer.validate()[0])
|
self.assertFalse(importer.validate()[0])
|
||||||
importer = Importer(
|
importer = Importer(
|
||||||
(
|
|
||||||
'{"version": 1,"entries":[{"identifiers":{},"attrs":{},'
|
'{"version": 1,"entries":[{"identifiers":{},"attrs":{},'
|
||||||
'"model": "authentik_core.User"}]}'
|
'"model": "authentik_core.User"}]}'
|
||||||
)
|
)
|
||||||
)
|
|
||||||
self.assertFalse(importer.validate()[0])
|
self.assertFalse(importer.validate()[0])
|
||||||
importer = Importer(
|
importer = Importer(
|
||||||
(
|
|
||||||
'{"version": 1, "entries": [{"attrs": {"name": "test"}, '
|
'{"version": 1, "entries": [{"attrs": {"name": "test"}, '
|
||||||
'"identifiers": {}, '
|
'"identifiers": {}, '
|
||||||
'"model": "authentik_core.Group"}]}'
|
'"model": "authentik_core.Group"}]}'
|
||||||
)
|
)
|
||||||
)
|
|
||||||
self.assertFalse(importer.validate()[0])
|
self.assertFalse(importer.validate()[0])
|
||||||
|
|
||||||
def test_validated_import_dict_identifiers(self):
|
def test_validated_import_dict_identifiers(self):
|
||||||
@ -59,12 +55,10 @@ class TestBlueprintsV1(TransactionTestCase):
|
|||||||
)
|
)
|
||||||
|
|
||||||
importer = Importer(
|
importer = Importer(
|
||||||
(
|
|
||||||
'{"version": 1, "entries": [{"attrs": {"name": "test999", "attributes": '
|
'{"version": 1, "entries": [{"attrs": {"name": "test999", "attributes": '
|
||||||
'{"key": ["updated_value"]}}, "identifiers": {"attributes": {"other_key": '
|
'{"key": ["updated_value"]}}, "identifiers": {"attributes": {"other_key": '
|
||||||
'["other_value"]}}, "model": "authentik_core.Group"}]}'
|
'["other_value"]}}, "model": "authentik_core.Group"}]}'
|
||||||
)
|
)
|
||||||
)
|
|
||||||
self.assertTrue(importer.validate()[0])
|
self.assertTrue(importer.validate()[0])
|
||||||
self.assertTrue(importer.apply())
|
self.assertTrue(importer.apply())
|
||||||
self.assertTrue(
|
self.assertTrue(
|
||||||
|
@ -7,6 +7,7 @@ from dacite.config import Config
|
|||||||
from dacite.core import from_dict
|
from dacite.core import from_dict
|
||||||
from dacite.exceptions import DaciteError
|
from dacite.exceptions import DaciteError
|
||||||
from deepmerge import always_merger
|
from deepmerge import always_merger
|
||||||
|
from django.core.exceptions import FieldError
|
||||||
from django.db import transaction
|
from django.db import transaction
|
||||||
from django.db.models import Model
|
from django.db.models import Model
|
||||||
from django.db.models.query_utils import Q
|
from django.db.models.query_utils import Q
|
||||||
@ -181,7 +182,10 @@ class Importer:
|
|||||||
if not query:
|
if not query:
|
||||||
raise EntryInvalidError("No or invalid identifiers")
|
raise EntryInvalidError("No or invalid identifiers")
|
||||||
|
|
||||||
|
try:
|
||||||
existing_models = model.objects.filter(query)
|
existing_models = model.objects.filter(query)
|
||||||
|
except FieldError as exc:
|
||||||
|
raise EntryInvalidError(f"Invalid identifier field: {exc}") from exc
|
||||||
|
|
||||||
serializer_kwargs = {}
|
serializer_kwargs = {}
|
||||||
model_instance = existing_models.first()
|
model_instance = existing_models.first()
|
||||||
@ -231,7 +235,6 @@ class Importer:
|
|||||||
raise IntegrityError
|
raise IntegrityError
|
||||||
except IntegrityError:
|
except IntegrityError:
|
||||||
return False
|
return False
|
||||||
else:
|
|
||||||
self.logger.debug("Committing changes")
|
self.logger.debug("Committing changes")
|
||||||
return True
|
return True
|
||||||
|
|
||||||
|
@ -56,5 +56,4 @@ class MetaApplyBlueprint(BaseMetaModel):
|
|||||||
return ApplyBlueprintMetaSerializer
|
return ApplyBlueprintMetaSerializer
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
abstract = True
|
abstract = True
|
||||||
|
@ -14,7 +14,6 @@ class BaseMetaModel(Model):
|
|||||||
raise NotImplementedError
|
raise NotImplementedError
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
abstract = True
|
abstract = True
|
||||||
|
|
||||||
|
|
||||||
|
@ -63,7 +63,6 @@ class ApplicationSerializer(ModelSerializer):
|
|||||||
return app.get_launch_url(user)
|
return app.get_launch_url(user)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Application
|
model = Application
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -74,7 +74,6 @@ class AuthenticatedSessionSerializer(ModelSerializer):
|
|||||||
return GEOIP_READER.city_dict(instance.last_ip)
|
return GEOIP_READER.city_dict(instance.last_ip)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = AuthenticatedSession
|
model = AuthenticatedSession
|
||||||
fields = [
|
fields = [
|
||||||
"uuid",
|
"uuid",
|
||||||
|
@ -29,7 +29,6 @@ class GroupMemberSerializer(ModelSerializer):
|
|||||||
uid = CharField(read_only=True)
|
uid = CharField(read_only=True)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = User
|
model = User
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
@ -56,7 +55,6 @@ class GroupSerializer(ModelSerializer):
|
|||||||
num_pk = IntegerField(read_only=True)
|
num_pk = IntegerField(read_only=True)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Group
|
model = Group
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
@ -114,7 +112,6 @@ class GroupFilter(FilterSet):
|
|||||||
return queryset
|
return queryset
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Group
|
model = Group
|
||||||
fields = ["name", "is_superuser", "members_by_pk", "attributes", "members_by_username"]
|
fields = ["name", "is_superuser", "members_by_pk", "attributes", "members_by_username"]
|
||||||
|
|
||||||
|
@ -49,7 +49,6 @@ class PropertyMappingSerializer(ManagedSerializer, ModelSerializer, MetaNameSeri
|
|||||||
return expression
|
return expression
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = PropertyMapping
|
model = PropertyMapping
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -31,7 +31,6 @@ class ProviderSerializer(ModelSerializer, MetaNameSerializer):
|
|||||||
return obj.component
|
return obj.component
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Provider
|
model = Provider
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -46,7 +46,6 @@ class SourceSerializer(ModelSerializer, MetaNameSerializer):
|
|||||||
return obj.component
|
return obj.component
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Source
|
model = Source
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -39,7 +39,6 @@ class TokenSerializer(ManagedSerializer, ModelSerializer):
|
|||||||
return attrs
|
return attrs
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Token
|
model = Token
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
@ -134,9 +133,10 @@ class TokenViewSet(UsedByMixin, ModelViewSet):
|
|||||||
)
|
)
|
||||||
@action(detail=True, pagination_class=None, filter_backends=[], methods=["POST"])
|
@action(detail=True, pagination_class=None, filter_backends=[], methods=["POST"])
|
||||||
def set_key(self, request: Request, identifier: str) -> Response:
|
def set_key(self, request: Request, identifier: str) -> Response:
|
||||||
"""Return token key and log access"""
|
"""Set token key. Action is logged as event. `authentik_core.set_token_key` permission
|
||||||
|
is required."""
|
||||||
token: Token = self.get_object()
|
token: Token = self.get_object()
|
||||||
key = request.POST.get("key")
|
key = request.data.get("key")
|
||||||
if not key:
|
if not key:
|
||||||
return Response(status=400)
|
return Response(status=400)
|
||||||
token.key = key
|
token.key = key
|
||||||
|
@ -43,6 +43,7 @@ from rest_framework.serializers import (
|
|||||||
PrimaryKeyRelatedField,
|
PrimaryKeyRelatedField,
|
||||||
ValidationError,
|
ValidationError,
|
||||||
)
|
)
|
||||||
|
from rest_framework.validators import UniqueValidator
|
||||||
from rest_framework.viewsets import ModelViewSet
|
from rest_framework.viewsets import ModelViewSet
|
||||||
from rest_framework_guardian.filters import ObjectPermissionsFilter
|
from rest_framework_guardian.filters import ObjectPermissionsFilter
|
||||||
from structlog.stdlib import get_logger
|
from structlog.stdlib import get_logger
|
||||||
@ -84,7 +85,6 @@ class UserGroupSerializer(ModelSerializer):
|
|||||||
parent_name = CharField(source="parent.name", read_only=True)
|
parent_name = CharField(source="parent.name", read_only=True)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Group
|
model = Group
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
@ -108,7 +108,7 @@ class UserSerializer(ModelSerializer):
|
|||||||
)
|
)
|
||||||
groups_obj = ListSerializer(child=UserGroupSerializer(), read_only=True, source="ak_groups")
|
groups_obj = ListSerializer(child=UserGroupSerializer(), read_only=True, source="ak_groups")
|
||||||
uid = CharField(read_only=True)
|
uid = CharField(read_only=True)
|
||||||
username = CharField(max_length=150)
|
username = CharField(max_length=150, validators=[UniqueValidator(queryset=User.objects.all())])
|
||||||
|
|
||||||
def validate_path(self, path: str) -> str:
|
def validate_path(self, path: str) -> str:
|
||||||
"""Validate path"""
|
"""Validate path"""
|
||||||
@ -120,7 +120,6 @@ class UserSerializer(ModelSerializer):
|
|||||||
return path
|
return path
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = User
|
model = User
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
@ -172,7 +171,6 @@ class UserSelfSerializer(ModelSerializer):
|
|||||||
return user.group_attributes(self._context["request"]).get("settings", {})
|
return user.group_attributes(self._context["request"]).get("settings", {})
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = User
|
model = User
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
@ -402,7 +400,7 @@ class UserViewSet(UsedByMixin, ModelViewSet):
|
|||||||
)
|
)
|
||||||
response["token"] = token.key
|
response["token"] = token.key
|
||||||
return Response(response)
|
return Response(response)
|
||||||
except (IntegrityError) as exc:
|
except IntegrityError as exc:
|
||||||
return Response(data={"non_field_errors": [str(exc)]}, status=400)
|
return Response(data={"non_field_errors": [str(exc)]}, status=400)
|
||||||
|
|
||||||
@extend_schema(responses={200: SessionUserSerializer(many=False)})
|
@extend_schema(responses={200: SessionUserSerializer(many=False)})
|
||||||
|
@ -14,7 +14,6 @@ import authentik.core.models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
initial = True
|
initial = True
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
@ -44,7 +43,10 @@ class Migration(migrations.Migration):
|
|||||||
"is_superuser",
|
"is_superuser",
|
||||||
models.BooleanField(
|
models.BooleanField(
|
||||||
default=False,
|
default=False,
|
||||||
help_text="Designates that this user has all permissions without explicitly assigning them.",
|
help_text=(
|
||||||
|
"Designates that this user has all permissions without explicitly"
|
||||||
|
" assigning them."
|
||||||
|
),
|
||||||
verbose_name="superuser status",
|
verbose_name="superuser status",
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
@ -52,7 +54,9 @@ class Migration(migrations.Migration):
|
|||||||
"username",
|
"username",
|
||||||
models.CharField(
|
models.CharField(
|
||||||
error_messages={"unique": "A user with that username already exists."},
|
error_messages={"unique": "A user with that username already exists."},
|
||||||
help_text="Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only.",
|
help_text=(
|
||||||
|
"Required. 150 characters or fewer. Letters, digits and @/./+/-/_ only."
|
||||||
|
),
|
||||||
max_length=150,
|
max_length=150,
|
||||||
unique=True,
|
unique=True,
|
||||||
validators=[django.contrib.auth.validators.UnicodeUsernameValidator()],
|
validators=[django.contrib.auth.validators.UnicodeUsernameValidator()],
|
||||||
@ -83,7 +87,10 @@ class Migration(migrations.Migration):
|
|||||||
"is_active",
|
"is_active",
|
||||||
models.BooleanField(
|
models.BooleanField(
|
||||||
default=True,
|
default=True,
|
||||||
help_text="Designates whether this user should be treated as active. Unselect this instead of deleting accounts.",
|
help_text=(
|
||||||
|
"Designates whether this user should be treated as active. Unselect"
|
||||||
|
" this instead of deleting accounts."
|
||||||
|
),
|
||||||
verbose_name="active",
|
verbose_name="active",
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
|
@ -51,7 +51,6 @@ def create_default_admin_group(apps: Apps, schema_editor: BaseDatabaseSchemaEdit
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
replaces = [
|
replaces = [
|
||||||
("authentik_core", "0002_auto_20200523_1133"),
|
("authentik_core", "0002_auto_20200523_1133"),
|
||||||
("authentik_core", "0003_default_user"),
|
("authentik_core", "0003_default_user"),
|
||||||
@ -172,7 +171,10 @@ class Migration(migrations.Migration):
|
|||||||
name="groups",
|
name="groups",
|
||||||
field=models.ManyToManyField(
|
field=models.ManyToManyField(
|
||||||
blank=True,
|
blank=True,
|
||||||
help_text="The groups this user belongs to. A user will get all permissions granted to each of their groups.",
|
help_text=(
|
||||||
|
"The groups this user belongs to. A user will get all permissions granted to"
|
||||||
|
" each of their groups."
|
||||||
|
),
|
||||||
related_name="user_set",
|
related_name="user_set",
|
||||||
related_query_name="user",
|
related_query_name="user",
|
||||||
to="auth.Group",
|
to="auth.Group",
|
||||||
|
@ -17,7 +17,6 @@ def set_default_token_key(apps: Apps, schema_editor: BaseDatabaseSchemaEditor):
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
replaces = [
|
replaces = [
|
||||||
("authentik_core", "0012_auto_20201003_1737"),
|
("authentik_core", "0012_auto_20201003_1737"),
|
||||||
("authentik_core", "0013_auto_20201003_2132"),
|
("authentik_core", "0013_auto_20201003_2132"),
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_core", "0016_auto_20201202_2234"),
|
("authentik_core", "0016_auto_20201202_2234"),
|
||||||
]
|
]
|
||||||
@ -15,7 +14,12 @@ class Migration(migrations.Migration):
|
|||||||
name="managed",
|
name="managed",
|
||||||
field=models.TextField(
|
field=models.TextField(
|
||||||
default=None,
|
default=None,
|
||||||
help_text="Objects which are managed by authentik. These objects are created and updated automatically. This is flag only indicates that an object can be overwritten by migrations. You can still modify the objects via the API, but expect changes to be overwritten in a later update.",
|
help_text=(
|
||||||
|
"Objects which are managed by authentik. These objects are created and updated"
|
||||||
|
" automatically. This is flag only indicates that an object can be overwritten"
|
||||||
|
" by migrations. You can still modify the objects via the API, but expect"
|
||||||
|
" changes to be overwritten in a later update."
|
||||||
|
),
|
||||||
null=True,
|
null=True,
|
||||||
verbose_name="Managed by authentik",
|
verbose_name="Managed by authentik",
|
||||||
unique=True,
|
unique=True,
|
||||||
@ -26,7 +30,12 @@ class Migration(migrations.Migration):
|
|||||||
name="managed",
|
name="managed",
|
||||||
field=models.TextField(
|
field=models.TextField(
|
||||||
default=None,
|
default=None,
|
||||||
help_text="Objects which are managed by authentik. These objects are created and updated automatically. This is flag only indicates that an object can be overwritten by migrations. You can still modify the objects via the API, but expect changes to be overwritten in a later update.",
|
help_text=(
|
||||||
|
"Objects which are managed by authentik. These objects are created and updated"
|
||||||
|
" automatically. This is flag only indicates that an object can be overwritten"
|
||||||
|
" by migrations. You can still modify the objects via the API, but expect"
|
||||||
|
" changes to be overwritten in a later update."
|
||||||
|
),
|
||||||
null=True,
|
null=True,
|
||||||
verbose_name="Managed by authentik",
|
verbose_name="Managed by authentik",
|
||||||
unique=True,
|
unique=True,
|
||||||
|
@ -63,7 +63,6 @@ def create_default_user_token(apps: Apps, schema_editor: BaseDatabaseSchemaEdito
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
replaces = [
|
replaces = [
|
||||||
("authentik_core", "0018_auto_20210330_1345"),
|
("authentik_core", "0018_auto_20210330_1345"),
|
||||||
("authentik_core", "0019_source_managed"),
|
("authentik_core", "0019_source_managed"),
|
||||||
@ -96,7 +95,12 @@ class Migration(migrations.Migration):
|
|||||||
name="managed",
|
name="managed",
|
||||||
field=models.TextField(
|
field=models.TextField(
|
||||||
default=None,
|
default=None,
|
||||||
help_text="Objects which are managed by authentik. These objects are created and updated automatically. This is flag only indicates that an object can be overwritten by migrations. You can still modify the objects via the API, but expect changes to be overwritten in a later update.",
|
help_text=(
|
||||||
|
"Objects which are managed by authentik. These objects are created and updated"
|
||||||
|
" automatically. This is flag only indicates that an object can be overwritten"
|
||||||
|
" by migrations. You can still modify the objects via the API, but expect"
|
||||||
|
" changes to be overwritten in a later update."
|
||||||
|
),
|
||||||
null=True,
|
null=True,
|
||||||
unique=True,
|
unique=True,
|
||||||
verbose_name="Managed by authentik",
|
verbose_name="Managed by authentik",
|
||||||
@ -110,23 +114,38 @@ class Migration(migrations.Migration):
|
|||||||
("identifier", "Use the source-specific identifier"),
|
("identifier", "Use the source-specific identifier"),
|
||||||
(
|
(
|
||||||
"email_link",
|
"email_link",
|
||||||
"Link to a user with identical email address. Can have security implications when a source doesn't validate email addresses.",
|
(
|
||||||
|
"Link to a user with identical email address. Can have security"
|
||||||
|
" implications when a source doesn't validate email addresses."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
(
|
(
|
||||||
"email_deny",
|
"email_deny",
|
||||||
"Use the user's email address, but deny enrollment when the email address already exists.",
|
(
|
||||||
|
"Use the user's email address, but deny enrollment when the email"
|
||||||
|
" address already exists."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
(
|
(
|
||||||
"username_link",
|
"username_link",
|
||||||
"Link to a user with identical username. Can have security implications when a username is used with another source.",
|
(
|
||||||
|
"Link to a user with identical username. Can have security implications"
|
||||||
|
" when a username is used with another source."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
(
|
(
|
||||||
"username_deny",
|
"username_deny",
|
||||||
"Use the user's username, but deny enrollment when the username already exists.",
|
(
|
||||||
|
"Use the user's username, but deny enrollment when the username already"
|
||||||
|
" exists."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
],
|
],
|
||||||
default="identifier",
|
default="identifier",
|
||||||
help_text="How the source determines if an existing user should be authenticated or a new user enrolled.",
|
help_text=(
|
||||||
|
"How the source determines if an existing user should be authenticated or a new"
|
||||||
|
" user enrolled."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
migrations.AlterField(
|
migrations.AlterField(
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_core", "0018_auto_20210330_1345_squashed_0028_alter_token_intent"),
|
("authentik_core", "0018_auto_20210330_1345_squashed_0028_alter_token_intent"),
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_core", "0019_application_group"),
|
("authentik_core", "0019_application_group"),
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_core", "0020_application_open_in_new_tab"),
|
("authentik_core", "0020_application_open_in_new_tab"),
|
||||||
]
|
]
|
||||||
|
@ -5,7 +5,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_core", "0021_source_user_path_user_path"),
|
("authentik_core", "0021_source_user_path_user_path"),
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_core", "0022_alter_group_parent"),
|
("authentik_core", "0022_alter_group_parent"),
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_core", "0023_source_authentik_c_slug_ccb2e5_idx_and_more"),
|
("authentik_core", "0023_source_authentik_c_slug_ccb2e5_idx_and_more"),
|
||||||
]
|
]
|
||||||
|
@ -1,8 +1,7 @@
|
|||||||
"""authentik core models"""
|
"""authentik core models"""
|
||||||
from datetime import timedelta
|
from datetime import timedelta
|
||||||
from hashlib import md5, sha256
|
from hashlib import sha256
|
||||||
from typing import Any, Optional
|
from typing import Any, Optional
|
||||||
from urllib.parse import urlencode
|
|
||||||
from uuid import uuid4
|
from uuid import uuid4
|
||||||
|
|
||||||
from deepmerge import always_merger
|
from deepmerge import always_merger
|
||||||
@ -13,9 +12,7 @@ from django.contrib.auth.models import UserManager as DjangoUserManager
|
|||||||
from django.db import models
|
from django.db import models
|
||||||
from django.db.models import Q, QuerySet, options
|
from django.db.models import Q, QuerySet, options
|
||||||
from django.http import HttpRequest
|
from django.http import HttpRequest
|
||||||
from django.templatetags.static import static
|
|
||||||
from django.utils.functional import SimpleLazyObject, cached_property
|
from django.utils.functional import SimpleLazyObject, cached_property
|
||||||
from django.utils.html import escape
|
|
||||||
from django.utils.timezone import now
|
from django.utils.timezone import now
|
||||||
from django.utils.translation import gettext_lazy as _
|
from django.utils.translation import gettext_lazy as _
|
||||||
from guardian.mixins import GuardianUserMixin
|
from guardian.mixins import GuardianUserMixin
|
||||||
@ -27,7 +24,8 @@ from authentik.blueprints.models import ManagedModel
|
|||||||
from authentik.core.exceptions import PropertyMappingExpressionException
|
from authentik.core.exceptions import PropertyMappingExpressionException
|
||||||
from authentik.core.signals import password_changed
|
from authentik.core.signals import password_changed
|
||||||
from authentik.core.types import UILoginButton, UserSettingSerializer
|
from authentik.core.types import UILoginButton, UserSettingSerializer
|
||||||
from authentik.lib.config import CONFIG, get_path_from_dict
|
from authentik.lib.avatars import get_avatar
|
||||||
|
from authentik.lib.config import CONFIG
|
||||||
from authentik.lib.generators import generate_id
|
from authentik.lib.generators import generate_id
|
||||||
from authentik.lib.models import CreatedUpdatedModel, DomainlessURLValidator, SerializerModel
|
from authentik.lib.models import CreatedUpdatedModel, DomainlessURLValidator, SerializerModel
|
||||||
from authentik.lib.utils.http import get_client_ip
|
from authentik.lib.utils.http import get_client_ip
|
||||||
@ -49,9 +47,6 @@ USER_ATTRIBUTE_CAN_OVERRIDE_IP = "goauthentik.io/user/override-ips"
|
|||||||
USER_PATH_SYSTEM_PREFIX = "goauthentik.io"
|
USER_PATH_SYSTEM_PREFIX = "goauthentik.io"
|
||||||
USER_PATH_SERVICE_ACCOUNT = USER_PATH_SYSTEM_PREFIX + "/service-accounts"
|
USER_PATH_SERVICE_ACCOUNT = USER_PATH_SYSTEM_PREFIX + "/service-accounts"
|
||||||
|
|
||||||
GRAVATAR_URL = "https://secure.gravatar.com"
|
|
||||||
DEFAULT_AVATAR = static("dist/assets/images/user_default.png")
|
|
||||||
|
|
||||||
|
|
||||||
options.DEFAULT_NAMES = options.DEFAULT_NAMES + ("authentik_used_by_shadows",)
|
options.DEFAULT_NAMES = options.DEFAULT_NAMES + ("authentik_used_by_shadows",)
|
||||||
|
|
||||||
@ -129,7 +124,6 @@ class Group(SerializerModel):
|
|||||||
return f"Group {self.name}"
|
return f"Group {self.name}"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
unique_together = (
|
unique_together = (
|
||||||
(
|
(
|
||||||
"name",
|
"name",
|
||||||
@ -234,28 +228,9 @@ class User(SerializerModel, GuardianUserMixin, AbstractUser):
|
|||||||
@property
|
@property
|
||||||
def avatar(self) -> str:
|
def avatar(self) -> str:
|
||||||
"""Get avatar, depending on authentik.avatar setting"""
|
"""Get avatar, depending on authentik.avatar setting"""
|
||||||
mode: str = CONFIG.y("avatars", "none")
|
return get_avatar(self)
|
||||||
if mode == "none":
|
|
||||||
return DEFAULT_AVATAR
|
|
||||||
if mode.startswith("attributes."):
|
|
||||||
return get_path_from_dict(self.attributes, mode[11:], default=DEFAULT_AVATAR)
|
|
||||||
# gravatar uses md5 for their URLs, so md5 can't be avoided
|
|
||||||
mail_hash = md5(self.email.lower().encode("utf-8")).hexdigest() # nosec
|
|
||||||
if mode == "gravatar":
|
|
||||||
parameters = [
|
|
||||||
("s", "158"),
|
|
||||||
("r", "g"),
|
|
||||||
]
|
|
||||||
gravatar_url = f"{GRAVATAR_URL}/avatar/{mail_hash}?{urlencode(parameters, doseq=True)}"
|
|
||||||
return escape(gravatar_url)
|
|
||||||
return mode % {
|
|
||||||
"username": self.username,
|
|
||||||
"mail_hash": mail_hash,
|
|
||||||
"upn": self.attributes.get("upn", ""),
|
|
||||||
}
|
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
permissions = (
|
permissions = (
|
||||||
("reset_user_password", "Reset Password"),
|
("reset_user_password", "Reset Password"),
|
||||||
("impersonate", "Can impersonate other users"),
|
("impersonate", "Can impersonate other users"),
|
||||||
@ -382,7 +357,6 @@ class Application(SerializerModel, PolicyBindingModel):
|
|||||||
return str(self.name)
|
return str(self.name)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Application")
|
verbose_name = _("Application")
|
||||||
verbose_name_plural = _("Applications")
|
verbose_name_plural = _("Applications")
|
||||||
|
|
||||||
@ -392,20 +366,16 @@ class SourceUserMatchingModes(models.TextChoices):
|
|||||||
|
|
||||||
IDENTIFIER = "identifier", _("Use the source-specific identifier")
|
IDENTIFIER = "identifier", _("Use the source-specific identifier")
|
||||||
EMAIL_LINK = "email_link", _(
|
EMAIL_LINK = "email_link", _(
|
||||||
(
|
|
||||||
"Link to a user with identical email address. Can have security implications "
|
"Link to a user with identical email address. Can have security implications "
|
||||||
"when a source doesn't validate email addresses."
|
"when a source doesn't validate email addresses."
|
||||||
)
|
)
|
||||||
)
|
|
||||||
EMAIL_DENY = "email_deny", _(
|
EMAIL_DENY = "email_deny", _(
|
||||||
"Use the user's email address, but deny enrollment when the email address already exists."
|
"Use the user's email address, but deny enrollment when the email address already exists."
|
||||||
)
|
)
|
||||||
USERNAME_LINK = "username_link", _(
|
USERNAME_LINK = "username_link", _(
|
||||||
(
|
|
||||||
"Link to a user with identical username. Can have security implications "
|
"Link to a user with identical username. Can have security implications "
|
||||||
"when a username is used with another source."
|
"when a username is used with another source."
|
||||||
)
|
)
|
||||||
)
|
|
||||||
USERNAME_DENY = "username_deny", _(
|
USERNAME_DENY = "username_deny", _(
|
||||||
"Use the user's username, but deny enrollment when the username already exists."
|
"Use the user's username, but deny enrollment when the username already exists."
|
||||||
)
|
)
|
||||||
@ -451,10 +421,8 @@ class Source(ManagedModel, SerializerModel, PolicyBindingModel):
|
|||||||
choices=SourceUserMatchingModes.choices,
|
choices=SourceUserMatchingModes.choices,
|
||||||
default=SourceUserMatchingModes.IDENTIFIER,
|
default=SourceUserMatchingModes.IDENTIFIER,
|
||||||
help_text=_(
|
help_text=_(
|
||||||
(
|
|
||||||
"How the source determines if an existing user should be authenticated or "
|
"How the source determines if an existing user should be authenticated or "
|
||||||
"a new user enrolled."
|
"a new user enrolled."
|
||||||
)
|
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -500,7 +468,6 @@ class Source(ManagedModel, SerializerModel, PolicyBindingModel):
|
|||||||
return str(self.name)
|
return str(self.name)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
indexes = [
|
indexes = [
|
||||||
models.Index(
|
models.Index(
|
||||||
fields=[
|
fields=[
|
||||||
@ -529,7 +496,6 @@ class UserSourceConnection(SerializerModel, CreatedUpdatedModel):
|
|||||||
raise NotImplementedError
|
raise NotImplementedError
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
unique_together = (("user", "source"),)
|
unique_together = (("user", "source"),)
|
||||||
|
|
||||||
|
|
||||||
@ -562,7 +528,6 @@ class ExpiringModel(models.Model):
|
|||||||
return now() > self.expires
|
return now() > self.expires
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
abstract = True
|
abstract = True
|
||||||
|
|
||||||
|
|
||||||
@ -628,7 +593,6 @@ class Token(SerializerModel, ManagedModel, ExpiringModel):
|
|||||||
return description
|
return description
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Token")
|
verbose_name = _("Token")
|
||||||
verbose_name_plural = _("Tokens")
|
verbose_name_plural = _("Tokens")
|
||||||
indexes = [
|
indexes = [
|
||||||
@ -671,7 +635,6 @@ class PropertyMapping(SerializerModel, ManagedModel):
|
|||||||
return f"Property Mapping {self.name}"
|
return f"Property Mapping {self.name}"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Property Mapping")
|
verbose_name = _("Property Mapping")
|
||||||
verbose_name_plural = _("Property Mappings")
|
verbose_name_plural = _("Property Mappings")
|
||||||
|
|
||||||
@ -708,6 +671,5 @@ class AuthenticatedSession(ExpiringModel):
|
|||||||
)
|
)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Authenticated Session")
|
verbose_name = _("Authenticated Session")
|
||||||
verbose_name_plural = _("Authenticated Sessions")
|
verbose_name_plural = _("Authenticated Sessions")
|
||||||
|
@ -190,11 +190,8 @@ class SourceFlowManager:
|
|||||||
# Default case, assume deny
|
# Default case, assume deny
|
||||||
error = Exception(
|
error = Exception(
|
||||||
_(
|
_(
|
||||||
(
|
|
||||||
"Request to authenticate with %(source)s has been denied. Please authenticate "
|
"Request to authenticate with %(source)s has been denied. Please authenticate "
|
||||||
"with the source you've previously signed up with."
|
"with the source you've previously signed up with." % {"source": self.source.name}
|
||||||
)
|
|
||||||
% {"source": self.source.name}
|
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
return self.error_handler(error)
|
return self.error_handler(error)
|
||||||
|
@ -43,7 +43,12 @@ def clean_expired_models(self: MonitoredTask):
|
|||||||
amount = 0
|
amount = 0
|
||||||
for session in AuthenticatedSession.objects.all():
|
for session in AuthenticatedSession.objects.all():
|
||||||
cache_key = f"{KEY_PREFIX}{session.session_key}"
|
cache_key = f"{KEY_PREFIX}{session.session_key}"
|
||||||
|
value = None
|
||||||
|
try:
|
||||||
value = cache.get(cache_key)
|
value = cache.get(cache_key)
|
||||||
|
# pylint: disable=broad-except
|
||||||
|
except Exception as exc:
|
||||||
|
LOGGER.debug("Failed to get session from cache", exc=exc)
|
||||||
if not value:
|
if not value:
|
||||||
session.delete()
|
session.delete()
|
||||||
amount += 1
|
amount += 1
|
||||||
|
@ -13,7 +13,6 @@
|
|||||||
<link rel="stylesheet" type="text/css" href="{% static 'dist/page.css' %}">
|
<link rel="stylesheet" type="text/css" href="{% static 'dist/page.css' %}">
|
||||||
<link rel="stylesheet" type="text/css" href="{% static 'dist/empty-state.css' %}">
|
<link rel="stylesheet" type="text/css" href="{% static 'dist/empty-state.css' %}">
|
||||||
<link rel="stylesheet" type="text/css" href="{% static 'dist/spinner.css' %}">
|
<link rel="stylesheet" type="text/css" href="{% static 'dist/spinner.css' %}">
|
||||||
<link rel="stylesheet" type="text/css" href="{% static 'dist/dropdown.css' %}">
|
|
||||||
{% block head_before %}
|
{% block head_before %}
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
<link rel="stylesheet" type="text/css" href="{% static 'dist/authentik.css' %}">
|
<link rel="stylesheet" type="text/css" href="{% static 'dist/authentik.css' %}">
|
||||||
|
@ -21,9 +21,15 @@ You've logged out of {{ application }}.
|
|||||||
{% endblocktrans %}
|
{% endblocktrans %}
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<a id="ak-back-home" href="{% url 'authentik_core:root-redirect' %}" class="pf-c-button pf-m-primary">{% trans 'Go back to overview' %}</a>
|
<a id="ak-back-home" href="{% url 'authentik_core:root-redirect' %}" class="pf-c-button pf-m-primary">
|
||||||
|
{% trans 'Go back to overview' %}
|
||||||
|
</a>
|
||||||
|
|
||||||
<a id="logout" href="{% url 'authentik_flows:default-invalidation' %}" class="pf-c-button pf-m-secondary">{% trans 'Log out of authentik' %}</a>
|
<a id="logout" href="{% url 'authentik_flows:default-invalidation' %}" class="pf-c-button pf-m-secondary">
|
||||||
|
{% blocktrans with branding_title=tenant.branding_title %}
|
||||||
|
Log out of {{ branding_title }}
|
||||||
|
{% endblocktrans %}
|
||||||
|
</a>
|
||||||
|
|
||||||
{% if application.get_launch_url %}
|
{% if application.get_launch_url %}
|
||||||
<a href="{{ application.get_launch_url }}" class="pf-c-button pf-m-secondary">
|
<a href="{{ application.get_launch_url }}" class="pf-c-button pf-m-secondary">
|
||||||
|
@ -7,6 +7,7 @@ from rest_framework.test import APITestCase
|
|||||||
|
|
||||||
from authentik.core.models import USER_ATTRIBUTE_TOKEN_EXPIRING, Token, TokenIntents, User
|
from authentik.core.models import USER_ATTRIBUTE_TOKEN_EXPIRING, Token, TokenIntents, User
|
||||||
from authentik.core.tests.utils import create_test_admin_user
|
from authentik.core.tests.utils import create_test_admin_user
|
||||||
|
from authentik.lib.generators import generate_id
|
||||||
|
|
||||||
|
|
||||||
class TestTokenAPI(APITestCase):
|
class TestTokenAPI(APITestCase):
|
||||||
@ -30,6 +31,28 @@ class TestTokenAPI(APITestCase):
|
|||||||
self.assertEqual(token.expiring, True)
|
self.assertEqual(token.expiring, True)
|
||||||
self.assertTrue(self.user.has_perm("authentik_core.view_token_key", token))
|
self.assertTrue(self.user.has_perm("authentik_core.view_token_key", token))
|
||||||
|
|
||||||
|
def test_token_set_key(self):
|
||||||
|
"""Test token creation endpoint"""
|
||||||
|
response = self.client.post(
|
||||||
|
reverse("authentik_api:token-list"), {"identifier": "test-token"}
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 201)
|
||||||
|
token = Token.objects.get(identifier="test-token")
|
||||||
|
self.assertEqual(token.user, self.user)
|
||||||
|
self.assertEqual(token.intent, TokenIntents.INTENT_API)
|
||||||
|
self.assertEqual(token.expiring, True)
|
||||||
|
self.assertTrue(self.user.has_perm("authentik_core.view_token_key", token))
|
||||||
|
|
||||||
|
self.client.force_login(self.admin)
|
||||||
|
new_key = generate_id()
|
||||||
|
response = self.client.post(
|
||||||
|
reverse("authentik_api:token-set-key", kwargs={"identifier": token.identifier}),
|
||||||
|
{"key": new_key},
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 204)
|
||||||
|
token.refresh_from_db()
|
||||||
|
self.assertEqual(token.key, new_key)
|
||||||
|
|
||||||
def test_token_create_invalid(self):
|
def test_token_create_invalid(self):
|
||||||
"""Test token creation endpoint (invalid data)"""
|
"""Test token creation endpoint (invalid data)"""
|
||||||
response = self.client.post(
|
response = self.client.post(
|
||||||
@ -57,7 +80,7 @@ class TestTokenAPI(APITestCase):
|
|||||||
identifier="test", expiring=False, user=self.user
|
identifier="test", expiring=False, user=self.user
|
||||||
)
|
)
|
||||||
Token.objects.create(identifier="test-2", expiring=False, user=get_anonymous_user())
|
Token.objects.create(identifier="test-2", expiring=False, user=get_anonymous_user())
|
||||||
response = self.client.get(reverse(("authentik_api:token-list")))
|
response = self.client.get(reverse("authentik_api:token-list"))
|
||||||
body = loads(response.content)
|
body = loads(response.content)
|
||||||
self.assertEqual(len(body["results"]), 1)
|
self.assertEqual(len(body["results"]), 1)
|
||||||
self.assertEqual(body["results"][0]["identifier"], token_should.identifier)
|
self.assertEqual(body["results"][0]["identifier"], token_should.identifier)
|
||||||
@ -71,7 +94,7 @@ class TestTokenAPI(APITestCase):
|
|||||||
token_should_not: Token = Token.objects.create(
|
token_should_not: Token = Token.objects.create(
|
||||||
identifier="test-2", expiring=False, user=get_anonymous_user()
|
identifier="test-2", expiring=False, user=get_anonymous_user()
|
||||||
)
|
)
|
||||||
response = self.client.get(reverse(("authentik_api:token-list")))
|
response = self.client.get(reverse("authentik_api:token-list"))
|
||||||
body = loads(response.content)
|
body = loads(response.content)
|
||||||
self.assertEqual(len(body["results"]), 2)
|
self.assertEqual(len(body["results"]), 2)
|
||||||
self.assertEqual(body["results"][0]["identifier"], token_should.identifier)
|
self.assertEqual(body["results"][0]["identifier"], token_should.identifier)
|
||||||
|
@ -1,5 +1,4 @@
|
|||||||
"""Test Users API"""
|
"""Test Users API"""
|
||||||
from json import loads
|
|
||||||
|
|
||||||
from django.contrib.sessions.backends.cache import KEY_PREFIX
|
from django.contrib.sessions.backends.cache import KEY_PREFIX
|
||||||
from django.core.cache import cache
|
from django.core.cache import cache
|
||||||
@ -9,7 +8,6 @@ from rest_framework.test import APITestCase
|
|||||||
from authentik.core.models import AuthenticatedSession, User
|
from authentik.core.models import AuthenticatedSession, User
|
||||||
from authentik.core.tests.utils import create_test_admin_user, create_test_flow, create_test_tenant
|
from authentik.core.tests.utils import create_test_admin_user, create_test_flow, create_test_tenant
|
||||||
from authentik.flows.models import FlowDesignation
|
from authentik.flows.models import FlowDesignation
|
||||||
from authentik.lib.config import CONFIG
|
|
||||||
from authentik.lib.generators import generate_id, generate_key
|
from authentik.lib.generators import generate_id, generate_key
|
||||||
from authentik.stages.email.models import EmailStage
|
from authentik.stages.email.models import EmailStage
|
||||||
from authentik.tenants.models import Tenant
|
from authentik.tenants.models import Tenant
|
||||||
@ -222,44 +220,6 @@ class TestUsersAPI(APITestCase):
|
|||||||
response = self.client.get(reverse("authentik_api:user-me"))
|
response = self.client.get(reverse("authentik_api:user-me"))
|
||||||
self.assertEqual(response.status_code, 200)
|
self.assertEqual(response.status_code, 200)
|
||||||
|
|
||||||
@CONFIG.patch("avatars", "none")
|
|
||||||
def test_avatars_none(self):
|
|
||||||
"""Test avatars none"""
|
|
||||||
self.client.force_login(self.admin)
|
|
||||||
response = self.client.get(reverse("authentik_api:user-me"))
|
|
||||||
self.assertEqual(response.status_code, 200)
|
|
||||||
body = loads(response.content.decode())
|
|
||||||
self.assertEqual(body["user"]["avatar"], "/static/dist/assets/images/user_default.png")
|
|
||||||
|
|
||||||
@CONFIG.patch("avatars", "gravatar")
|
|
||||||
def test_avatars_gravatar(self):
|
|
||||||
"""Test avatars gravatar"""
|
|
||||||
self.client.force_login(self.admin)
|
|
||||||
response = self.client.get(reverse("authentik_api:user-me"))
|
|
||||||
self.assertEqual(response.status_code, 200)
|
|
||||||
body = loads(response.content.decode())
|
|
||||||
self.assertIn("gravatar", body["user"]["avatar"])
|
|
||||||
|
|
||||||
@CONFIG.patch("avatars", "foo-%(username)s")
|
|
||||||
def test_avatars_custom(self):
|
|
||||||
"""Test avatars custom"""
|
|
||||||
self.client.force_login(self.admin)
|
|
||||||
response = self.client.get(reverse("authentik_api:user-me"))
|
|
||||||
self.assertEqual(response.status_code, 200)
|
|
||||||
body = loads(response.content.decode())
|
|
||||||
self.assertEqual(body["user"]["avatar"], f"foo-{self.admin.username}")
|
|
||||||
|
|
||||||
@CONFIG.patch("avatars", "attributes.foo.avatar")
|
|
||||||
def test_avatars_attributes(self):
|
|
||||||
"""Test avatars attributes"""
|
|
||||||
self.admin.attributes = {"foo": {"avatar": "bar"}}
|
|
||||||
self.admin.save()
|
|
||||||
self.client.force_login(self.admin)
|
|
||||||
response = self.client.get(reverse("authentik_api:user-me"))
|
|
||||||
self.assertEqual(response.status_code, 200)
|
|
||||||
body = loads(response.content.decode())
|
|
||||||
self.assertEqual(body["user"]["avatar"], "bar")
|
|
||||||
|
|
||||||
def test_session_delete(self):
|
def test_session_delete(self):
|
||||||
"""Ensure sessions are deleted when a user is deactivated"""
|
"""Ensure sessions are deleted when a user is deactivated"""
|
||||||
user = create_test_admin_user()
|
user = create_test_admin_user()
|
||||||
|
84
authentik/core/tests/test_users_avatars.py
Normal file
84
authentik/core/tests/test_users_avatars.py
Normal file
@ -0,0 +1,84 @@
|
|||||||
|
"""Test Users Avatars"""
|
||||||
|
from json import loads
|
||||||
|
|
||||||
|
from django.urls.base import reverse
|
||||||
|
from requests_mock import Mocker
|
||||||
|
from rest_framework.test import APITestCase
|
||||||
|
|
||||||
|
from authentik.core.models import User
|
||||||
|
from authentik.core.tests.utils import create_test_admin_user
|
||||||
|
from authentik.lib.config import CONFIG
|
||||||
|
|
||||||
|
|
||||||
|
class TestUsersAvatars(APITestCase):
|
||||||
|
"""Test Users avatars"""
|
||||||
|
|
||||||
|
def setUp(self) -> None:
|
||||||
|
self.admin = create_test_admin_user()
|
||||||
|
self.user = User.objects.create(username="test-user")
|
||||||
|
|
||||||
|
@CONFIG.patch("avatars", "none")
|
||||||
|
def test_avatars_none(self):
|
||||||
|
"""Test avatars none"""
|
||||||
|
self.client.force_login(self.admin)
|
||||||
|
response = self.client.get(reverse("authentik_api:user-me"))
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertEqual(body["user"]["avatar"], "/static/dist/assets/images/user_default.png")
|
||||||
|
|
||||||
|
@CONFIG.patch("avatars", "gravatar")
|
||||||
|
def test_avatars_gravatar(self):
|
||||||
|
"""Test avatars gravatar"""
|
||||||
|
self.admin.email = "static@t.goauthentik.io"
|
||||||
|
self.admin.save()
|
||||||
|
self.client.force_login(self.admin)
|
||||||
|
with Mocker() as mocker:
|
||||||
|
mocker.head(
|
||||||
|
(
|
||||||
|
"https://secure.gravatar.com/avatar/84730f9c1851d1ea03f1a"
|
||||||
|
"a9ed85bd1ea?size=158&rating=g&default=404"
|
||||||
|
),
|
||||||
|
text="foo",
|
||||||
|
)
|
||||||
|
response = self.client.get(reverse("authentik_api:user-me"))
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertIn("gravatar", body["user"]["avatar"])
|
||||||
|
|
||||||
|
@CONFIG.patch("avatars", "initials")
|
||||||
|
def test_avatars_initials(self):
|
||||||
|
"""Test avatars initials"""
|
||||||
|
self.client.force_login(self.admin)
|
||||||
|
response = self.client.get(reverse("authentik_api:user-me"))
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertIn("data:image/svg+xml;base64,", body["user"]["avatar"])
|
||||||
|
|
||||||
|
@CONFIG.patch("avatars", "foo://%(username)s")
|
||||||
|
def test_avatars_custom(self):
|
||||||
|
"""Test avatars custom"""
|
||||||
|
self.client.force_login(self.admin)
|
||||||
|
response = self.client.get(reverse("authentik_api:user-me"))
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertEqual(body["user"]["avatar"], f"foo://{self.admin.username}")
|
||||||
|
|
||||||
|
@CONFIG.patch("avatars", "attributes.foo.avatar")
|
||||||
|
def test_avatars_attributes(self):
|
||||||
|
"""Test avatars attributes"""
|
||||||
|
self.admin.attributes = {"foo": {"avatar": "bar"}}
|
||||||
|
self.admin.save()
|
||||||
|
self.client.force_login(self.admin)
|
||||||
|
response = self.client.get(reverse("authentik_api:user-me"))
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertEqual(body["user"]["avatar"], "bar")
|
||||||
|
|
||||||
|
@CONFIG.patch("avatars", "attributes.foo.avatar,initials")
|
||||||
|
def test_avatars_fallback(self):
|
||||||
|
"""Test fallback"""
|
||||||
|
self.client.force_login(self.admin)
|
||||||
|
response = self.client.get(reverse("authentik_api:user-me"))
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertIn("data:image/svg+xml;base64,", body["user"]["avatar"])
|
@ -143,7 +143,6 @@ class CertificateKeyPairSerializer(ModelSerializer):
|
|||||||
return value
|
return value
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = CertificateKeyPair
|
model = CertificateKeyPair
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -6,7 +6,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
initial = True
|
initial = True
|
||||||
|
|
||||||
dependencies = []
|
dependencies = []
|
||||||
@ -36,7 +35,10 @@ class Migration(migrations.Migration):
|
|||||||
models.TextField(
|
models.TextField(
|
||||||
blank=True,
|
blank=True,
|
||||||
default="",
|
default="",
|
||||||
help_text="Optional Private Key. If this is set, you can use this keypair for encryption.",
|
help_text=(
|
||||||
|
"Optional Private Key. If this is set, you can use this keypair for"
|
||||||
|
" encryption."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
],
|
],
|
||||||
|
@ -6,7 +6,6 @@ from authentik.lib.generators import generate_id
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_crypto", "0001_initial"),
|
("authentik_crypto", "0001_initial"),
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_crypto", "0002_create_self_signed_kp"),
|
("authentik_crypto", "0002_create_self_signed_kp"),
|
||||||
]
|
]
|
||||||
@ -15,7 +14,12 @@ class Migration(migrations.Migration):
|
|||||||
name="managed",
|
name="managed",
|
||||||
field=models.TextField(
|
field=models.TextField(
|
||||||
default=None,
|
default=None,
|
||||||
help_text="Objects which are managed by authentik. These objects are created and updated automatically. This is flag only indicates that an object can be overwritten by migrations. You can still modify the objects via the API, but expect changes to be overwritten in a later update.",
|
help_text=(
|
||||||
|
"Objects which are managed by authentik. These objects are created and updated"
|
||||||
|
" automatically. This is flag only indicates that an object can be overwritten"
|
||||||
|
" by migrations. You can still modify the objects via the API, but expect"
|
||||||
|
" changes to be overwritten in a later update."
|
||||||
|
),
|
||||||
null=True,
|
null=True,
|
||||||
unique=True,
|
unique=True,
|
||||||
verbose_name="Managed by authentik",
|
verbose_name="Managed by authentik",
|
||||||
|
@ -98,6 +98,5 @@ class CertificateKeyPair(SerializerModel, ManagedModel, CreatedUpdatedModel):
|
|||||||
return f"Certificate-Key Pair {self.name}"
|
return f"Certificate-Key Pair {self.name}"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Certificate-Key Pair")
|
verbose_name = _("Certificate-Key Pair")
|
||||||
verbose_name_plural = _("Certificate-Key Pairs")
|
verbose_name_plural = _("Certificate-Key Pairs")
|
||||||
|
@ -25,7 +25,6 @@ class EventSerializer(ModelSerializer):
|
|||||||
"""Event Serializer"""
|
"""Event Serializer"""
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Event
|
model = Event
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -10,7 +10,6 @@ class NotificationWebhookMappingSerializer(ModelSerializer):
|
|||||||
"""NotificationWebhookMapping Serializer"""
|
"""NotificationWebhookMapping Serializer"""
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = NotificationWebhookMapping
|
model = NotificationWebhookMapping
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -13,7 +13,6 @@ class NotificationRuleSerializer(ModelSerializer):
|
|||||||
group_obj = GroupSerializer(read_only=True, source="group")
|
group_obj = GroupSerializer(read_only=True, source="group")
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = NotificationRule
|
model = NotificationRule
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -43,7 +43,6 @@ class NotificationTransportSerializer(ModelSerializer):
|
|||||||
return attrs
|
return attrs
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = NotificationTransport
|
model = NotificationTransport
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -25,7 +25,6 @@ class NotificationSerializer(ModelSerializer):
|
|||||||
event = EventSerializer(required=False)
|
event = EventSerializer(required=False)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Notification
|
model = Notification
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -27,6 +27,7 @@ from authentik.lib.sentry import before_send
|
|||||||
from authentik.lib.utils.errors import exception_to_string
|
from authentik.lib.utils.errors import exception_to_string
|
||||||
from authentik.outposts.models import OutpostServiceConnection
|
from authentik.outposts.models import OutpostServiceConnection
|
||||||
from authentik.policies.models import Policy, PolicyBindingModel
|
from authentik.policies.models import Policy, PolicyBindingModel
|
||||||
|
from authentik.providers.oauth2.models import AccessToken, AuthorizationCode, RefreshToken
|
||||||
|
|
||||||
IGNORED_MODELS = (
|
IGNORED_MODELS = (
|
||||||
Event,
|
Event,
|
||||||
@ -44,6 +45,9 @@ IGNORED_MODELS = (
|
|||||||
OutpostServiceConnection,
|
OutpostServiceConnection,
|
||||||
Policy,
|
Policy,
|
||||||
PolicyBindingModel,
|
PolicyBindingModel,
|
||||||
|
AuthorizationCode,
|
||||||
|
AccessToken,
|
||||||
|
RefreshToken,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@ -100,7 +100,6 @@ def update_expires(apps: Apps, schema_editor: BaseDatabaseSchemaEditor):
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
replaces = [
|
replaces = [
|
||||||
("authentik_events", "0001_initial"),
|
("authentik_events", "0001_initial"),
|
||||||
("authentik_events", "0002_auto_20200918_2116"),
|
("authentik_events", "0002_auto_20200918_2116"),
|
||||||
@ -245,14 +244,19 @@ class Migration(migrations.Migration):
|
|||||||
models.TextField(
|
models.TextField(
|
||||||
choices=[("notice", "Notice"), ("warning", "Warning"), ("alert", "Alert")],
|
choices=[("notice", "Notice"), ("warning", "Warning"), ("alert", "Alert")],
|
||||||
default="notice",
|
default="notice",
|
||||||
help_text="Controls which severity level the created notifications will have.",
|
help_text=(
|
||||||
|
"Controls which severity level the created notifications will have."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
(
|
(
|
||||||
"group",
|
"group",
|
||||||
models.ForeignKey(
|
models.ForeignKey(
|
||||||
blank=True,
|
blank=True,
|
||||||
help_text="Define which group of users this notification should be sent and shown to. If left empty, Notification won't ben sent.",
|
help_text=(
|
||||||
|
"Define which group of users this notification should be sent and shown"
|
||||||
|
" to. If left empty, Notification won't ben sent."
|
||||||
|
),
|
||||||
null=True,
|
null=True,
|
||||||
on_delete=django.db.models.deletion.SET_NULL,
|
on_delete=django.db.models.deletion.SET_NULL,
|
||||||
to="authentik_core.group",
|
to="authentik_core.group",
|
||||||
@ -261,7 +265,10 @@ class Migration(migrations.Migration):
|
|||||||
(
|
(
|
||||||
"transports",
|
"transports",
|
||||||
models.ManyToManyField(
|
models.ManyToManyField(
|
||||||
help_text="Select which transports should be used to notify the user. If none are selected, the notification will only be shown in the authentik UI.",
|
help_text=(
|
||||||
|
"Select which transports should be used to notify the user. If none are"
|
||||||
|
" selected, the notification will only be shown in the authentik UI."
|
||||||
|
),
|
||||||
to="authentik_events.NotificationTransport",
|
to="authentik_events.NotificationTransport",
|
||||||
blank=True,
|
blank=True,
|
||||||
),
|
),
|
||||||
@ -317,7 +324,10 @@ class Migration(migrations.Migration):
|
|||||||
name="send_once",
|
name="send_once",
|
||||||
field=models.BooleanField(
|
field=models.BooleanField(
|
||||||
default=False,
|
default=False,
|
||||||
help_text="Only send notification once, for example when sending a webhook into a chat channel.",
|
help_text=(
|
||||||
|
"Only send notification once, for example when sending a webhook into a chat"
|
||||||
|
" channel."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
migrations.RunPython(
|
migrations.RunPython(
|
||||||
|
@ -3,7 +3,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_events", "0001_squashed_0019_alter_notificationtransport_webhook_url"),
|
("authentik_events", "0001_squashed_0019_alter_notificationtransport_webhook_url"),
|
||||||
]
|
]
|
||||||
|
@ -283,7 +283,6 @@ class Event(SerializerModel, ExpiringModel):
|
|||||||
return f"Event action={self.action} user={self.user} context={self.context}"
|
return f"Event action={self.action} user={self.user} context={self.context}"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Event")
|
verbose_name = _("Event")
|
||||||
verbose_name_plural = _("Events")
|
verbose_name_plural = _("Events")
|
||||||
|
|
||||||
@ -362,7 +361,9 @@ class NotificationTransport(SerializerModel):
|
|||||||
)
|
)
|
||||||
response.raise_for_status()
|
response.raise_for_status()
|
||||||
except RequestException as exc:
|
except RequestException as exc:
|
||||||
raise NotificationTransportError(exc.response.text) from exc
|
raise NotificationTransportError(
|
||||||
|
exc.response.text if exc.response else str(exc)
|
||||||
|
) from exc
|
||||||
return [
|
return [
|
||||||
response.status_code,
|
response.status_code,
|
||||||
response.text,
|
response.text,
|
||||||
@ -460,7 +461,6 @@ class NotificationTransport(SerializerModel):
|
|||||||
return f"Notification Transport {self.name}"
|
return f"Notification Transport {self.name}"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Notification Transport")
|
verbose_name = _("Notification Transport")
|
||||||
verbose_name_plural = _("Notification Transports")
|
verbose_name_plural = _("Notification Transports")
|
||||||
|
|
||||||
@ -495,7 +495,6 @@ class Notification(SerializerModel):
|
|||||||
return f"Notification for user {self.user}: {body_trunc}"
|
return f"Notification for user {self.user}: {body_trunc}"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Notification")
|
verbose_name = _("Notification")
|
||||||
verbose_name_plural = _("Notifications")
|
verbose_name_plural = _("Notifications")
|
||||||
|
|
||||||
@ -507,10 +506,8 @@ class NotificationRule(SerializerModel, PolicyBindingModel):
|
|||||||
transports = models.ManyToManyField(
|
transports = models.ManyToManyField(
|
||||||
NotificationTransport,
|
NotificationTransport,
|
||||||
help_text=_(
|
help_text=_(
|
||||||
(
|
|
||||||
"Select which transports should be used to notify the user. If none are "
|
"Select which transports should be used to notify the user. If none are "
|
||||||
"selected, the notification will only be shown in the authentik UI."
|
"selected, the notification will only be shown in the authentik UI."
|
||||||
)
|
|
||||||
),
|
),
|
||||||
blank=True,
|
blank=True,
|
||||||
)
|
)
|
||||||
@ -522,10 +519,8 @@ class NotificationRule(SerializerModel, PolicyBindingModel):
|
|||||||
group = models.ForeignKey(
|
group = models.ForeignKey(
|
||||||
Group,
|
Group,
|
||||||
help_text=_(
|
help_text=_(
|
||||||
(
|
|
||||||
"Define which group of users this notification should be sent and shown to. "
|
"Define which group of users this notification should be sent and shown to. "
|
||||||
"If left empty, Notification won't ben sent."
|
"If left empty, Notification won't ben sent."
|
||||||
)
|
|
||||||
),
|
),
|
||||||
null=True,
|
null=True,
|
||||||
blank=True,
|
blank=True,
|
||||||
@ -542,7 +537,6 @@ class NotificationRule(SerializerModel, PolicyBindingModel):
|
|||||||
return f"Notification Rule {self.name}"
|
return f"Notification Rule {self.name}"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Notification Rule")
|
verbose_name = _("Notification Rule")
|
||||||
verbose_name_plural = _("Notification Rules")
|
verbose_name_plural = _("Notification Rules")
|
||||||
|
|
||||||
@ -564,6 +558,5 @@ class NotificationWebhookMapping(PropertyMapping):
|
|||||||
return f"Webhook Mapping {self.name}"
|
return f"Webhook Mapping {self.name}"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Webhook Mapping")
|
verbose_name = _("Webhook Mapping")
|
||||||
verbose_name_plural = _("Webhook Mappings")
|
verbose_name_plural = _("Webhook Mappings")
|
||||||
|
@ -63,11 +63,6 @@ class TaskInfo:
|
|||||||
|
|
||||||
task_description: Optional[str] = field(default=None)
|
task_description: Optional[str] = field(default=None)
|
||||||
|
|
||||||
@property
|
|
||||||
def html_name(self) -> list[str]:
|
|
||||||
"""Get task_name, but split on underscores, so we can join in the html template."""
|
|
||||||
return self.task_name.split("_")
|
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def all() -> dict[str, "TaskInfo"]:
|
def all() -> dict[str, "TaskInfo"]:
|
||||||
"""Get all TaskInfo objects"""
|
"""Get all TaskInfo objects"""
|
||||||
@ -82,7 +77,7 @@ class TaskInfo:
|
|||||||
"""Delete task info from cache"""
|
"""Delete task info from cache"""
|
||||||
return cache.delete(CACHE_KEY_PREFIX + self.task_name)
|
return cache.delete(CACHE_KEY_PREFIX + self.task_name)
|
||||||
|
|
||||||
def set_prom_metrics(self):
|
def update_metrics(self):
|
||||||
"""Update prometheus metrics"""
|
"""Update prometheus metrics"""
|
||||||
start = default_timer()
|
start = default_timer()
|
||||||
if hasattr(self, "start_timestamp"):
|
if hasattr(self, "start_timestamp"):
|
||||||
@ -101,9 +96,9 @@ class TaskInfo:
|
|||||||
"""Save task into cache"""
|
"""Save task into cache"""
|
||||||
key = CACHE_KEY_PREFIX + self.task_name
|
key = CACHE_KEY_PREFIX + self.task_name
|
||||||
if self.result.uid:
|
if self.result.uid:
|
||||||
key += f"/{self.result.uid}"
|
key += f":{self.result.uid}"
|
||||||
self.task_name += f"/{self.result.uid}"
|
self.task_name += f":{self.result.uid}"
|
||||||
self.set_prom_metrics()
|
self.update_metrics()
|
||||||
cache.set(key, self, timeout=timeout_hours * 60 * 60)
|
cache.set(key, self, timeout=timeout_hours * 60 * 60)
|
||||||
|
|
||||||
|
|
||||||
@ -178,7 +173,7 @@ class MonitoredTask(Task):
|
|||||||
).save(self.result_timeout_hours)
|
).save(self.result_timeout_hours)
|
||||||
Event.new(
|
Event.new(
|
||||||
EventAction.SYSTEM_TASK_EXCEPTION,
|
EventAction.SYSTEM_TASK_EXCEPTION,
|
||||||
message=(f"Task {self.__name__} encountered an error: {exception_to_string(exc)}"),
|
message=f"Task {self.__name__} encountered an error: {exception_to_string(exc)}",
|
||||||
).save()
|
).save()
|
||||||
|
|
||||||
def run(self, *args, **kwargs):
|
def run(self, *args, **kwargs):
|
||||||
|
@ -37,11 +37,10 @@ def event_notification_handler(event_uuid: str):
|
|||||||
@CELERY_APP.task()
|
@CELERY_APP.task()
|
||||||
def event_trigger_handler(event_uuid: str, trigger_name: str):
|
def event_trigger_handler(event_uuid: str, trigger_name: str):
|
||||||
"""Check if policies attached to NotificationRule match event"""
|
"""Check if policies attached to NotificationRule match event"""
|
||||||
events = Event.objects.filter(event_uuid=event_uuid)
|
event: Event = Event.objects.filter(event_uuid=event_uuid).first()
|
||||||
if not events.exists():
|
if not event:
|
||||||
LOGGER.warning("event doesn't exist yet or anymore", event_uuid=event_uuid)
|
LOGGER.warning("event doesn't exist yet or anymore", event_uuid=event_uuid)
|
||||||
return
|
return
|
||||||
event: Event = events.first()
|
|
||||||
trigger: Optional[NotificationRule] = NotificationRule.objects.filter(name=trigger_name).first()
|
trigger: Optional[NotificationRule] = NotificationRule.objects.filter(name=trigger_name).first()
|
||||||
if not trigger:
|
if not trigger:
|
||||||
return
|
return
|
||||||
|
@ -30,7 +30,7 @@ def cleanse_item(key: str, value: Any) -> Any:
|
|||||||
"""Cleanse a single item"""
|
"""Cleanse a single item"""
|
||||||
if isinstance(value, dict):
|
if isinstance(value, dict):
|
||||||
return cleanse_dict(value)
|
return cleanse_dict(value)
|
||||||
if isinstance(value, list):
|
if isinstance(value, (list, tuple, set)):
|
||||||
for idx, item in enumerate(value):
|
for idx, item in enumerate(value):
|
||||||
value[idx] = cleanse_item(key, item)
|
value[idx] = cleanse_item(key, item)
|
||||||
return value
|
return value
|
||||||
@ -103,7 +103,7 @@ def sanitize_item(value: Any) -> Any:
|
|||||||
return sanitize_dict(value)
|
return sanitize_dict(value)
|
||||||
if isinstance(value, GeneratorType):
|
if isinstance(value, GeneratorType):
|
||||||
return sanitize_item(list(value))
|
return sanitize_item(list(value))
|
||||||
if isinstance(value, list):
|
if isinstance(value, (list, tuple, set)):
|
||||||
new_values = []
|
new_values = []
|
||||||
for item in value:
|
for item in value:
|
||||||
new_value = sanitize_item(item)
|
new_value = sanitize_item(item)
|
||||||
|
@ -13,7 +13,6 @@ class FlowStageBindingSerializer(ModelSerializer):
|
|||||||
stage_obj = StageSerializer(read_only=True, source="stage")
|
stage_obj = StageSerializer(read_only=True, source="stage")
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = FlowStageBinding
|
model = FlowStageBinding
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -53,7 +53,6 @@ class FlowSerializer(ModelSerializer):
|
|||||||
return reverse("authentik_api:flow-export", kwargs={"slug": flow.slug})
|
return reverse("authentik_api:flow-export", kwargs={"slug": flow.slug})
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Flow
|
model = Flow
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
@ -82,7 +81,6 @@ class FlowSetSerializer(FlowSerializer):
|
|||||||
"""Stripped down flow serializer"""
|
"""Stripped down flow serializer"""
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Flow
|
model = Flow
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -33,7 +33,6 @@ class StageSerializer(ModelSerializer, MetaNameSerializer):
|
|||||||
return obj.component
|
return obj.component
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Stage
|
model = Stage
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
|
@ -7,7 +7,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
replaces = [
|
replaces = [
|
||||||
("authentik_flows", "0001_initial"),
|
("authentik_flows", "0001_initial"),
|
||||||
("authentik_flows", "0003_auto_20200523_1133"),
|
("authentik_flows", "0003_auto_20200523_1133"),
|
||||||
@ -98,7 +97,10 @@ class Migration(migrations.Migration):
|
|||||||
"re_evaluate_policies",
|
"re_evaluate_policies",
|
||||||
models.BooleanField(
|
models.BooleanField(
|
||||||
default=False,
|
default=False,
|
||||||
help_text="When this option is enabled, the planner will re-evaluate policies bound to this.",
|
help_text=(
|
||||||
|
"When this option is enabled, the planner will re-evaluate policies"
|
||||||
|
" bound to this."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
("order", models.IntegerField()),
|
("order", models.IntegerField()),
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_flows", "0007_auto_20200703_2059"),
|
("authentik_flows", "0007_auto_20200703_2059"),
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_flows", "0008_default_flows"),
|
("authentik_flows", "0008_default_flows"),
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_flows", "0009_source_flows"),
|
("authentik_flows", "0009_source_flows"),
|
||||||
]
|
]
|
||||||
|
@ -3,7 +3,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_flows", "0010_provider_flows"),
|
("authentik_flows", "0010_provider_flows"),
|
||||||
]
|
]
|
||||||
|
@ -20,7 +20,6 @@ def update_flow_designation(apps: Apps, schema_editor: BaseDatabaseSchemaEditor)
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
replaces = [
|
replaces = [
|
||||||
("authentik_flows", "0012_auto_20200908_1542"),
|
("authentik_flows", "0012_auto_20200908_1542"),
|
||||||
("authentik_flows", "0013_auto_20200924_1605"),
|
("authentik_flows", "0013_auto_20200924_1605"),
|
||||||
@ -79,7 +78,10 @@ class Migration(migrations.Migration):
|
|||||||
name="re_evaluate_policies",
|
name="re_evaluate_policies",
|
||||||
field=models.BooleanField(
|
field=models.BooleanField(
|
||||||
default=False,
|
default=False,
|
||||||
help_text="When this option is enabled, the planner will re-evaluate policies bound to this binding.",
|
help_text=(
|
||||||
|
"When this option is enabled, the planner will re-evaluate policies bound to"
|
||||||
|
" this binding."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
migrations.AlterField(
|
migrations.AlterField(
|
||||||
@ -94,7 +96,10 @@ class Migration(migrations.Migration):
|
|||||||
name="evaluate_on_plan",
|
name="evaluate_on_plan",
|
||||||
field=models.BooleanField(
|
field=models.BooleanField(
|
||||||
default=True,
|
default=True,
|
||||||
help_text="Evaluate policies during the Flow planning process. Disable this for input-based policies.",
|
help_text=(
|
||||||
|
"Evaluate policies during the Flow planning process. Disable this for"
|
||||||
|
" input-based policies."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
migrations.AddField(
|
migrations.AddField(
|
||||||
@ -120,7 +125,10 @@ class Migration(migrations.Migration):
|
|||||||
("recovery", "Recovery"),
|
("recovery", "Recovery"),
|
||||||
("stage_configuration", "Stage Configuration"),
|
("stage_configuration", "Stage Configuration"),
|
||||||
],
|
],
|
||||||
help_text="Decides what this Flow is used for. For example, the Authentication flow is redirect to when an un-authenticated user visits authentik.",
|
help_text=(
|
||||||
|
"Decides what this Flow is used for. For example, the Authentication flow is"
|
||||||
|
" redirect to when an un-authenticated user visits authentik."
|
||||||
|
),
|
||||||
max_length=100,
|
max_length=100,
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_flows", "0017_auto_20210329_1334"),
|
("authentik_flows", "0017_auto_20210329_1334"),
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
replaces = [
|
replaces = [
|
||||||
("authentik_flows", "0019_alter_flow_background"),
|
("authentik_flows", "0019_alter_flow_background"),
|
||||||
("authentik_flows", "0020_flow_compatibility_mode"),
|
("authentik_flows", "0020_flow_compatibility_mode"),
|
||||||
@ -39,7 +38,12 @@ class Migration(migrations.Migration):
|
|||||||
("restart_with_context", "Restart With Context"),
|
("restart_with_context", "Restart With Context"),
|
||||||
],
|
],
|
||||||
default="retry",
|
default="retry",
|
||||||
help_text="Configure how the flow executor should handle an invalid response to a challenge. RETRY returns the error message and a similar challenge to the executor. RESTART restarts the flow from the beginning, and RESTART_WITH_CONTEXT restarts the flow while keeping the current context.",
|
help_text=(
|
||||||
|
"Configure how the flow executor should handle an invalid response to a"
|
||||||
|
" challenge. RETRY returns the error message and a similar challenge to the"
|
||||||
|
" executor. RESTART restarts the flow from the beginning, and"
|
||||||
|
" RESTART_WITH_CONTEXT restarts the flow while keeping the current context."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
migrations.AlterField(
|
migrations.AlterField(
|
||||||
@ -58,7 +62,10 @@ class Migration(migrations.Migration):
|
|||||||
name="compatibility_mode",
|
name="compatibility_mode",
|
||||||
field=models.BooleanField(
|
field=models.BooleanField(
|
||||||
default=False,
|
default=False,
|
||||||
help_text="Enable compatibility mode, increases compatibility with password managers on mobile devices.",
|
help_text=(
|
||||||
|
"Enable compatibility mode, increases compatibility with password managers on"
|
||||||
|
" mobile devices."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
]
|
]
|
||||||
|
@ -5,7 +5,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_core", "0018_auto_20210330_1345_squashed_0028_alter_token_intent"),
|
("authentik_core", "0018_auto_20210330_1345_squashed_0028_alter_token_intent"),
|
||||||
(
|
(
|
||||||
|
@ -3,7 +3,6 @@ from django.db import migrations
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_flows", "0020_flowtoken"),
|
("authentik_flows", "0020_flowtoken"),
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_flows", "0021_auto_20211227_2103"),
|
("authentik_flows", "0021_auto_20211227_2103"),
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_flows", "0022_flow_layout"),
|
("authentik_flows", "0022_flow_layout"),
|
||||||
]
|
]
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_flows", "0023_flow_denied_action"),
|
("authentik_flows", "0023_flow_denied_action"),
|
||||||
]
|
]
|
||||||
|
@ -135,10 +135,8 @@ class Flow(SerializerModel, PolicyBindingModel):
|
|||||||
max_length=100,
|
max_length=100,
|
||||||
choices=FlowDesignation.choices,
|
choices=FlowDesignation.choices,
|
||||||
help_text=_(
|
help_text=_(
|
||||||
(
|
|
||||||
"Decides what this Flow is used for. For example, the Authentication flow "
|
"Decides what this Flow is used for. For example, the Authentication flow "
|
||||||
"is redirect to when an un-authenticated user visits authentik."
|
"is redirect to when an un-authenticated user visits authentik."
|
||||||
)
|
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -192,7 +190,6 @@ class Flow(SerializerModel, PolicyBindingModel):
|
|||||||
return f"Flow {self.name} ({self.slug})"
|
return f"Flow {self.name} ({self.slug})"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Flow")
|
verbose_name = _("Flow")
|
||||||
verbose_name_plural = _("Flows")
|
verbose_name_plural = _("Flows")
|
||||||
|
|
||||||
@ -216,10 +213,8 @@ class FlowStageBinding(SerializerModel, PolicyBindingModel):
|
|||||||
evaluate_on_plan = models.BooleanField(
|
evaluate_on_plan = models.BooleanField(
|
||||||
default=True,
|
default=True,
|
||||||
help_text=_(
|
help_text=_(
|
||||||
(
|
|
||||||
"Evaluate policies during the Flow planning process. "
|
"Evaluate policies during the Flow planning process. "
|
||||||
"Disable this for input-based policies."
|
"Disable this for input-based policies."
|
||||||
)
|
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
re_evaluate_policies = models.BooleanField(
|
re_evaluate_policies = models.BooleanField(
|
||||||
@ -252,7 +247,6 @@ class FlowStageBinding(SerializerModel, PolicyBindingModel):
|
|||||||
return f"Flow-stage binding #{self.order} to {self.target_id}"
|
return f"Flow-stage binding #{self.order} to {self.target_id}"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
ordering = ["target", "order"]
|
ordering = ["target", "order"]
|
||||||
|
|
||||||
verbose_name = _("Flow Stage Binding")
|
verbose_name = _("Flow Stage Binding")
|
||||||
@ -271,15 +265,12 @@ class ConfigurableStage(models.Model):
|
|||||||
null=True,
|
null=True,
|
||||||
blank=True,
|
blank=True,
|
||||||
help_text=_(
|
help_text=_(
|
||||||
(
|
|
||||||
"Flow used by an authenticated user to configure this Stage. "
|
"Flow used by an authenticated user to configure this Stage. "
|
||||||
"If empty, user will not be able to configure this stage."
|
"If empty, user will not be able to configure this stage."
|
||||||
)
|
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
abstract = True
|
abstract = True
|
||||||
|
|
||||||
|
|
||||||
@ -305,6 +296,5 @@ class FlowToken(Token):
|
|||||||
return f"Flow Token {super().__str__()}"
|
return f"Flow Token {super().__str__()}"
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
verbose_name = _("Flow Token")
|
verbose_name = _("Flow Token")
|
||||||
verbose_name_plural = _("Flow Tokens")
|
verbose_name_plural = _("Flow Tokens")
|
||||||
|
@ -207,10 +207,13 @@ class FlowPlanner:
|
|||||||
) -> FlowPlan:
|
) -> FlowPlan:
|
||||||
"""Build flow plan by checking each stage in their respective
|
"""Build flow plan by checking each stage in their respective
|
||||||
order and checking the applied policies"""
|
order and checking the applied policies"""
|
||||||
with Hub.current.start_span(
|
with (
|
||||||
|
Hub.current.start_span(
|
||||||
op="authentik.flow.planner.build_plan",
|
op="authentik.flow.planner.build_plan",
|
||||||
description=self.flow.slug,
|
description=self.flow.slug,
|
||||||
) as span, HIST_FLOWS_PLAN_TIME.labels(flow_slug=self.flow.slug).time():
|
) as span,
|
||||||
|
HIST_FLOWS_PLAN_TIME.labels(flow_slug=self.flow.slug).time(),
|
||||||
|
):
|
||||||
span: Span
|
span: Span
|
||||||
span.set_data("flow", self.flow)
|
span.set_data("flow", self.flow)
|
||||||
span.set_data("user", user)
|
span.set_data("user", user)
|
||||||
|
@ -11,7 +11,7 @@ from rest_framework.request import Request
|
|||||||
from sentry_sdk.hub import Hub
|
from sentry_sdk.hub import Hub
|
||||||
from structlog.stdlib import BoundLogger, get_logger
|
from structlog.stdlib import BoundLogger, get_logger
|
||||||
|
|
||||||
from authentik.core.models import DEFAULT_AVATAR, User
|
from authentik.core.models import User
|
||||||
from authentik.flows.challenge import (
|
from authentik.flows.challenge import (
|
||||||
AccessDeniedChallenge,
|
AccessDeniedChallenge,
|
||||||
Challenge,
|
Challenge,
|
||||||
@ -24,6 +24,7 @@ from authentik.flows.challenge import (
|
|||||||
)
|
)
|
||||||
from authentik.flows.models import InvalidResponseAction
|
from authentik.flows.models import InvalidResponseAction
|
||||||
from authentik.flows.planner import PLAN_CONTEXT_APPLICATION, PLAN_CONTEXT_PENDING_USER
|
from authentik.flows.planner import PLAN_CONTEXT_APPLICATION, PLAN_CONTEXT_PENDING_USER
|
||||||
|
from authentik.lib.avatars import DEFAULT_AVATAR
|
||||||
from authentik.lib.utils.reflection import class_to_path
|
from authentik.lib.utils.reflection import class_to_path
|
||||||
|
|
||||||
if TYPE_CHECKING:
|
if TYPE_CHECKING:
|
||||||
|
@ -209,7 +209,6 @@ class TestFlowExecutor(FlowTestCase):
|
|||||||
|
|
||||||
# Here we patch the dummy policy to evaluate to true so the stage is included
|
# Here we patch the dummy policy to evaluate to true so the stage is included
|
||||||
with patch("authentik.policies.dummy.models.DummyPolicy.passes", POLICY_RETURN_TRUE):
|
with patch("authentik.policies.dummy.models.DummyPolicy.passes", POLICY_RETURN_TRUE):
|
||||||
|
|
||||||
exec_url = reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug})
|
exec_url = reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug})
|
||||||
# First request, run the planner
|
# First request, run the planner
|
||||||
response = self.client.get(exec_url)
|
response = self.client.get(exec_url)
|
||||||
@ -259,7 +258,6 @@ class TestFlowExecutor(FlowTestCase):
|
|||||||
|
|
||||||
# Here we patch the dummy policy to evaluate to true so the stage is included
|
# Here we patch the dummy policy to evaluate to true so the stage is included
|
||||||
with patch("authentik.policies.dummy.models.DummyPolicy.passes", POLICY_RETURN_TRUE):
|
with patch("authentik.policies.dummy.models.DummyPolicy.passes", POLICY_RETURN_TRUE):
|
||||||
|
|
||||||
exec_url = reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug})
|
exec_url = reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug})
|
||||||
# First request, run the planner
|
# First request, run the planner
|
||||||
response = self.client.get(exec_url)
|
response = self.client.get(exec_url)
|
||||||
@ -319,7 +317,6 @@ class TestFlowExecutor(FlowTestCase):
|
|||||||
|
|
||||||
# Here we patch the dummy policy to evaluate to true so the stage is included
|
# Here we patch the dummy policy to evaluate to true so the stage is included
|
||||||
with patch("authentik.policies.dummy.models.DummyPolicy.passes", POLICY_RETURN_TRUE):
|
with patch("authentik.policies.dummy.models.DummyPolicy.passes", POLICY_RETURN_TRUE):
|
||||||
|
|
||||||
exec_url = reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug})
|
exec_url = reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug})
|
||||||
# First request, run the planner
|
# First request, run the planner
|
||||||
response = self.client.get(exec_url)
|
response = self.client.get(exec_url)
|
||||||
@ -396,7 +393,6 @@ class TestFlowExecutor(FlowTestCase):
|
|||||||
|
|
||||||
# Here we patch the dummy policy to evaluate to true so the stage is included
|
# Here we patch the dummy policy to evaluate to true so the stage is included
|
||||||
with patch("authentik.policies.dummy.models.DummyPolicy.passes", POLICY_RETURN_TRUE):
|
with patch("authentik.policies.dummy.models.DummyPolicy.passes", POLICY_RETURN_TRUE):
|
||||||
|
|
||||||
exec_url = reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug})
|
exec_url = reverse("authentik_api:flow-executor", kwargs={"flow_slug": flow.slug})
|
||||||
# First request, run the planner
|
# First request, run the planner
|
||||||
response = self.client.get(exec_url)
|
response = self.client.get(exec_url)
|
||||||
|
187
authentik/lib/avatars.py
Normal file
187
authentik/lib/avatars.py
Normal file
@ -0,0 +1,187 @@
|
|||||||
|
"""Avatar utils"""
|
||||||
|
from base64 import b64encode
|
||||||
|
from functools import cache
|
||||||
|
from hashlib import md5
|
||||||
|
from typing import TYPE_CHECKING, Optional
|
||||||
|
from urllib.parse import urlencode
|
||||||
|
|
||||||
|
from django.templatetags.static import static
|
||||||
|
from lxml import etree # nosec
|
||||||
|
from lxml.etree import Element, SubElement # nosec
|
||||||
|
from requests.exceptions import RequestException
|
||||||
|
|
||||||
|
from authentik.lib.config import CONFIG, get_path_from_dict
|
||||||
|
from authentik.lib.utils.http import get_http_session
|
||||||
|
|
||||||
|
GRAVATAR_URL = "https://secure.gravatar.com"
|
||||||
|
DEFAULT_AVATAR = static("dist/assets/images/user_default.png")
|
||||||
|
|
||||||
|
if TYPE_CHECKING:
|
||||||
|
from authentik.core.models import User
|
||||||
|
|
||||||
|
SVG_XML_NS = "http://www.w3.org/2000/svg"
|
||||||
|
SVG_NS_MAP = {None: SVG_XML_NS}
|
||||||
|
# Match fonts used in web UI
|
||||||
|
SVG_FONTS = [
|
||||||
|
"'RedHatText'",
|
||||||
|
"'Overpass'",
|
||||||
|
"overpass",
|
||||||
|
"helvetica",
|
||||||
|
"arial",
|
||||||
|
"sans-serif",
|
||||||
|
]
|
||||||
|
|
||||||
|
|
||||||
|
def avatar_mode_none(user: "User", mode: str) -> Optional[str]:
|
||||||
|
"""No avatar"""
|
||||||
|
return DEFAULT_AVATAR
|
||||||
|
|
||||||
|
|
||||||
|
def avatar_mode_attribute(user: "User", mode: str) -> Optional[str]:
|
||||||
|
"""Avatars based on a user attribute"""
|
||||||
|
avatar = get_path_from_dict(user.attributes, mode[11:], default=None)
|
||||||
|
return avatar
|
||||||
|
|
||||||
|
|
||||||
|
def avatar_mode_gravatar(user: "User", mode: str) -> Optional[str]:
|
||||||
|
"""Gravatar avatars"""
|
||||||
|
# gravatar uses md5 for their URLs, so md5 can't be avoided
|
||||||
|
mail_hash = md5(user.email.lower().encode("utf-8")).hexdigest() # nosec
|
||||||
|
parameters = [("size", "158"), ("rating", "g"), ("default", "404")]
|
||||||
|
gravatar_url = f"{GRAVATAR_URL}/avatar/{mail_hash}?{urlencode(parameters, doseq=True)}"
|
||||||
|
|
||||||
|
@cache
|
||||||
|
def check_non_default(url: str):
|
||||||
|
"""Cache HEAD check, based on URL"""
|
||||||
|
try:
|
||||||
|
# Since we specify a default of 404, do a HEAD request
|
||||||
|
# (HEAD since we don't need the body)
|
||||||
|
# so if that returns a 404, move onto the next mode
|
||||||
|
res = get_http_session().head(url, timeout=5)
|
||||||
|
if res.status_code == 404:
|
||||||
|
return None
|
||||||
|
res.raise_for_status()
|
||||||
|
except RequestException:
|
||||||
|
return url
|
||||||
|
return url
|
||||||
|
|
||||||
|
return check_non_default(gravatar_url)
|
||||||
|
|
||||||
|
|
||||||
|
def generate_colors(text: str) -> tuple[str, str]:
|
||||||
|
"""Generate colours based on `text`"""
|
||||||
|
color = int(md5(text.lower().encode("utf-8")).hexdigest(), 16) % 0xFFFFFF # nosec
|
||||||
|
|
||||||
|
# Get a (somewhat arbitrarily) reduced scope of colors
|
||||||
|
# to avoid too dark or light backgrounds
|
||||||
|
blue = min(max((color) & 0xFF, 55), 200)
|
||||||
|
green = min(max((color >> 8) & 0xFF, 55), 200)
|
||||||
|
red = min(max((color >> 16) & 0xFF, 55), 200)
|
||||||
|
bg_hex = f"{red:02x}{green:02x}{blue:02x}"
|
||||||
|
# Contrasting text color (https://stackoverflow.com/a/3943023)
|
||||||
|
text_hex = "000" if (red * 0.299 + green * 0.587 + blue * 0.114) > 186 else "fff"
|
||||||
|
return bg_hex, text_hex
|
||||||
|
|
||||||
|
|
||||||
|
@cache
|
||||||
|
# pylint: disable=too-many-arguments,too-many-locals
|
||||||
|
def generate_avatar_from_name(
|
||||||
|
user: "User",
|
||||||
|
length: int = 2,
|
||||||
|
size: int = 64,
|
||||||
|
rounded: bool = False,
|
||||||
|
font_size: float = 0.4375,
|
||||||
|
bold: bool = False,
|
||||||
|
uppercase: bool = True,
|
||||||
|
) -> str:
|
||||||
|
""" "Generate an avatar with initials in SVG format.
|
||||||
|
|
||||||
|
Inspired from: https://github.com/LasseRafn/ui-avatars
|
||||||
|
"""
|
||||||
|
name = user.name if user.name != "" else "a k"
|
||||||
|
|
||||||
|
name_parts = name.split()
|
||||||
|
# Only abbreviate first and last name
|
||||||
|
if len(name_parts) > 2:
|
||||||
|
name_parts = [name_parts[0], name_parts[-1]]
|
||||||
|
|
||||||
|
if len(name_parts) == 1:
|
||||||
|
initials = name_parts[0][:length]
|
||||||
|
else:
|
||||||
|
initials = "".join([part[0] for part in name_parts[:-1]])
|
||||||
|
initials += name_parts[-1]
|
||||||
|
initials = initials[:length]
|
||||||
|
|
||||||
|
bg_hex, text_hex = generate_colors(name)
|
||||||
|
|
||||||
|
half_size = size // 2
|
||||||
|
shape = "circle" if rounded else "rect"
|
||||||
|
font_weight = "600" if bold else "400"
|
||||||
|
|
||||||
|
root_element: Element = Element(f"{{{SVG_XML_NS}}}svg", nsmap=SVG_NS_MAP)
|
||||||
|
root_element.attrib["width"] = f"{size}px"
|
||||||
|
root_element.attrib["height"] = f"{size}px"
|
||||||
|
root_element.attrib["viewBox"] = f"0 0 {size} {size}"
|
||||||
|
root_element.attrib["version"] = "1.1"
|
||||||
|
|
||||||
|
shape = SubElement(root_element, f"{{{SVG_XML_NS}}}{shape}", nsmap=SVG_NS_MAP)
|
||||||
|
shape.attrib["fill"] = f"#{bg_hex}"
|
||||||
|
shape.attrib["cx"] = f"{half_size}"
|
||||||
|
shape.attrib["cy"] = f"{half_size}"
|
||||||
|
shape.attrib["width"] = f"{size}"
|
||||||
|
shape.attrib["height"] = f"{size}"
|
||||||
|
shape.attrib["r"] = f"{half_size}"
|
||||||
|
|
||||||
|
text = SubElement(root_element, f"{{{SVG_XML_NS}}}text", nsmap=SVG_NS_MAP)
|
||||||
|
text.attrib["x"] = "50%"
|
||||||
|
text.attrib["y"] = "50%"
|
||||||
|
text.attrib["style"] = (
|
||||||
|
f"color: #{text_hex}; " "line-height: 1; " f"font-family: {','.join(SVG_FONTS)}; "
|
||||||
|
)
|
||||||
|
text.attrib["fill"] = f"#{text_hex}"
|
||||||
|
text.attrib["alignment-baseline"] = "middle"
|
||||||
|
text.attrib["dominant-baseline"] = "middle"
|
||||||
|
text.attrib["text-anchor"] = "middle"
|
||||||
|
text.attrib["font-size"] = f"{round(size * font_size)}"
|
||||||
|
text.attrib["font-weight"] = f"{font_weight}"
|
||||||
|
text.attrib["dy"] = ".1em"
|
||||||
|
text.text = initials if not uppercase else initials.upper()
|
||||||
|
|
||||||
|
return etree.tostring(root_element).decode()
|
||||||
|
|
||||||
|
|
||||||
|
def avatar_mode_generated(user: "User", mode: str) -> Optional[str]:
|
||||||
|
"""Wrapper that converts generated avatar to base64 svg"""
|
||||||
|
svg = generate_avatar_from_name(user)
|
||||||
|
return f"data:image/svg+xml;base64,{b64encode(svg.encode('utf-8')).decode('utf-8')}"
|
||||||
|
|
||||||
|
|
||||||
|
def avatar_mode_url(user: "User", mode: str) -> Optional[str]:
|
||||||
|
"""Format url"""
|
||||||
|
mail_hash = md5(user.email.lower().encode("utf-8")).hexdigest() # nosec
|
||||||
|
return mode % {
|
||||||
|
"username": user.username,
|
||||||
|
"mail_hash": mail_hash,
|
||||||
|
"upn": user.attributes.get("upn", ""),
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
def get_avatar(user: "User") -> str:
|
||||||
|
"""Get avatar with configured mode"""
|
||||||
|
mode_map = {
|
||||||
|
"none": avatar_mode_none,
|
||||||
|
"initials": avatar_mode_generated,
|
||||||
|
"gravatar": avatar_mode_gravatar,
|
||||||
|
}
|
||||||
|
modes: str = CONFIG.y("avatars", "none")
|
||||||
|
for mode in modes.split(","):
|
||||||
|
avatar = None
|
||||||
|
if mode in mode_map:
|
||||||
|
avatar = mode_map[mode](user, mode)
|
||||||
|
elif mode.startswith("attributes."):
|
||||||
|
avatar = avatar_mode_attribute(user, mode)
|
||||||
|
elif "://" in mode:
|
||||||
|
avatar = avatar_mode_url(user, mode)
|
||||||
|
if avatar:
|
||||||
|
return avatar
|
||||||
|
return avatar_mode_none(user, modes)
|
@ -5,20 +5,13 @@ from contextlib import contextmanager
|
|||||||
from glob import glob
|
from glob import glob
|
||||||
from json import dumps, loads
|
from json import dumps, loads
|
||||||
from json.decoder import JSONDecodeError
|
from json.decoder import JSONDecodeError
|
||||||
from pathlib import Path
|
|
||||||
from sys import argv, stderr
|
from sys import argv, stderr
|
||||||
from time import time
|
from time import time
|
||||||
from typing import Any, Optional
|
from typing import Any
|
||||||
from urllib.parse import urlparse
|
from urllib.parse import urlparse
|
||||||
|
|
||||||
import yaml
|
import yaml
|
||||||
from django.conf import ImproperlyConfigured
|
from django.conf import ImproperlyConfigured
|
||||||
from watchdog.events import (
|
|
||||||
FileModifiedEvent,
|
|
||||||
FileSystemEvent,
|
|
||||||
FileSystemEventHandler,
|
|
||||||
)
|
|
||||||
from watchdog.observers import Observer
|
|
||||||
|
|
||||||
SEARCH_PATHS = ["authentik/lib/default.yml", "/etc/authentik/config.yml", ""] + glob(
|
SEARCH_PATHS = ["authentik/lib/default.yml", "/etc/authentik/config.yml", ""] + glob(
|
||||||
"/etc/authentik/config.d/*.yml", recursive=True
|
"/etc/authentik/config.d/*.yml", recursive=True
|
||||||
@ -45,47 +38,9 @@ class ConfigLoader:
|
|||||||
A variable like AUTHENTIK_POSTGRESQL__HOST would translate to postgresql.host"""
|
A variable like AUTHENTIK_POSTGRESQL__HOST would translate to postgresql.host"""
|
||||||
|
|
||||||
loaded_file = []
|
loaded_file = []
|
||||||
observer: Observer
|
|
||||||
|
|
||||||
class FSObserver(FileSystemEventHandler):
|
|
||||||
"""File system observer"""
|
|
||||||
|
|
||||||
loader: "ConfigLoader"
|
|
||||||
path: str
|
|
||||||
container: Optional[dict] = None
|
|
||||||
key: Optional[str] = None
|
|
||||||
|
|
||||||
def __init__(
|
|
||||||
self,
|
|
||||||
loader: "ConfigLoader",
|
|
||||||
path: str,
|
|
||||||
container: Optional[dict] = None,
|
|
||||||
key: Optional[str] = None,
|
|
||||||
) -> None:
|
|
||||||
super().__init__()
|
|
||||||
self.loader = loader
|
|
||||||
self.path = path
|
|
||||||
self.container = container
|
|
||||||
self.key = key
|
|
||||||
|
|
||||||
def on_any_event(self, event: FileSystemEvent):
|
|
||||||
if not isinstance(event, FileModifiedEvent):
|
|
||||||
return
|
|
||||||
if event.is_directory:
|
|
||||||
return
|
|
||||||
if event.src_path != self.path:
|
|
||||||
return
|
|
||||||
if self.container and self.key:
|
|
||||||
with open(self.path, "r", encoding="utf8") as _file:
|
|
||||||
self.container[self.key] = _file.read()
|
|
||||||
else:
|
|
||||||
self.loader.log("info", "Updating from changed file", file=self.path)
|
|
||||||
self.loader.update_from_file(self.path, watch=False)
|
|
||||||
|
|
||||||
def __init__(self):
|
def __init__(self):
|
||||||
super().__init__()
|
super().__init__()
|
||||||
self.observer = Observer()
|
|
||||||
self.observer.start()
|
|
||||||
self.__config = {}
|
self.__config = {}
|
||||||
base_dir = os.path.realpath(os.path.join(os.path.dirname(__file__), "../.."))
|
base_dir = os.path.realpath(os.path.join(os.path.dirname(__file__), "../.."))
|
||||||
for path in SEARCH_PATHS:
|
for path in SEARCH_PATHS:
|
||||||
@ -126,11 +81,11 @@ class ConfigLoader:
|
|||||||
root[key] = self.update(root.get(key, {}), value)
|
root[key] = self.update(root.get(key, {}), value)
|
||||||
else:
|
else:
|
||||||
if isinstance(value, str):
|
if isinstance(value, str):
|
||||||
value = self.parse_uri(value, root, key)
|
value = self.parse_uri(value)
|
||||||
root[key] = value
|
root[key] = value
|
||||||
return root
|
return root
|
||||||
|
|
||||||
def parse_uri(self, value: str, container: dict[str, Any], key: Optional[str] = None, ) -> str:
|
def parse_uri(self, value: str) -> str:
|
||||||
"""Parse string values which start with a URI"""
|
"""Parse string values which start with a URI"""
|
||||||
url = urlparse(value)
|
url = urlparse(value)
|
||||||
if url.scheme == "env":
|
if url.scheme == "env":
|
||||||
@ -138,23 +93,13 @@ class ConfigLoader:
|
|||||||
if url.scheme == "file":
|
if url.scheme == "file":
|
||||||
try:
|
try:
|
||||||
with open(url.path, "r", encoding="utf8") as _file:
|
with open(url.path, "r", encoding="utf8") as _file:
|
||||||
value = _file.read()
|
value = _file.read().strip()
|
||||||
if key:
|
|
||||||
self.observer.schedule(
|
|
||||||
ConfigLoader.FSObserver(
|
|
||||||
self,
|
|
||||||
url.path,
|
|
||||||
container,
|
|
||||||
key,
|
|
||||||
),
|
|
||||||
Path(url.path).parent,
|
|
||||||
)
|
|
||||||
except OSError as exc:
|
except OSError as exc:
|
||||||
self.log("error", f"Failed to read config value from {url.path}: {exc}")
|
self.log("error", f"Failed to read config value from {url.path}: {exc}")
|
||||||
value = url.query
|
value = url.query
|
||||||
return value
|
return value
|
||||||
|
|
||||||
def update_from_file(self, path: str, watch=True):
|
def update_from_file(self, path: str):
|
||||||
"""Update config from file contents"""
|
"""Update config from file contents"""
|
||||||
try:
|
try:
|
||||||
with open(path, encoding="utf8") as file:
|
with open(path, encoding="utf8") as file:
|
||||||
@ -162,8 +107,6 @@ class ConfigLoader:
|
|||||||
self.update(self.__config, yaml.safe_load(file))
|
self.update(self.__config, yaml.safe_load(file))
|
||||||
self.log("debug", "Loaded config", file=path)
|
self.log("debug", "Loaded config", file=path)
|
||||||
self.loaded_file.append(path)
|
self.loaded_file.append(path)
|
||||||
if watch:
|
|
||||||
self.observer.schedule(ConfigLoader.FSObserver(self, path), Path(path).parent)
|
|
||||||
except yaml.YAMLError as exc:
|
except yaml.YAMLError as exc:
|
||||||
raise ImproperlyConfigured from exc
|
raise ImproperlyConfigured from exc
|
||||||
except PermissionError as exc:
|
except PermissionError as exc:
|
||||||
@ -238,12 +181,13 @@ class ConfigLoader:
|
|||||||
if comp not in root:
|
if comp not in root:
|
||||||
root[comp] = {}
|
root[comp] = {}
|
||||||
root = root.get(comp, {})
|
root = root.get(comp, {})
|
||||||
self.parse_uri(value, root, path_parts[-1])
|
root[path_parts[-1]] = value
|
||||||
|
|
||||||
def y_bool(self, path: str, default=False) -> bool:
|
def y_bool(self, path: str, default=False) -> bool:
|
||||||
"""Wrapper for y that converts value into boolean"""
|
"""Wrapper for y that converts value into boolean"""
|
||||||
return str(self.y(path, default)).lower() == "true"
|
return str(self.y(path, default)).lower() == "true"
|
||||||
|
|
||||||
|
|
||||||
CONFIG = ConfigLoader()
|
CONFIG = ConfigLoader()
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
|
@ -71,7 +71,7 @@ ldap:
|
|||||||
cookie_domain: null
|
cookie_domain: null
|
||||||
disable_update_check: false
|
disable_update_check: false
|
||||||
disable_startup_analytics: false
|
disable_startup_analytics: false
|
||||||
avatars: env://AUTHENTIK_AUTHENTIK__AVATARS?gravatar
|
avatars: env://AUTHENTIK_AUTHENTIK__AVATARS?gravatar,initials
|
||||||
geoip: "/geoip/GeoLite2-City.mmdb"
|
geoip: "/geoip/GeoLite2-City.mmdb"
|
||||||
|
|
||||||
footer_links: []
|
footer_links: []
|
||||||
|
@ -5,7 +5,7 @@ from tempfile import mkstemp
|
|||||||
from django.conf import ImproperlyConfigured
|
from django.conf import ImproperlyConfigured
|
||||||
from django.test import TestCase
|
from django.test import TestCase
|
||||||
|
|
||||||
from authentik.lib.config import CONFIG, ENV_PREFIX, ConfigLoader
|
from authentik.lib.config import ENV_PREFIX, ConfigLoader
|
||||||
|
|
||||||
|
|
||||||
class TestConfig(TestCase):
|
class TestConfig(TestCase):
|
||||||
@ -31,8 +31,8 @@ class TestConfig(TestCase):
|
|||||||
"""Test URI parsing (environment)"""
|
"""Test URI parsing (environment)"""
|
||||||
config = ConfigLoader()
|
config = ConfigLoader()
|
||||||
environ["foo"] = "bar"
|
environ["foo"] = "bar"
|
||||||
self.assertEqual(config.parse_uri("env://foo", {}), "bar")
|
self.assertEqual(config.parse_uri("env://foo"), "bar")
|
||||||
self.assertEqual(config.parse_uri("env://foo?bar", {}), "bar")
|
self.assertEqual(config.parse_uri("env://foo?bar"), "bar")
|
||||||
|
|
||||||
def test_uri_file(self):
|
def test_uri_file(self):
|
||||||
"""Test URI parsing (file load)"""
|
"""Test URI parsing (file load)"""
|
||||||
@ -41,8 +41,8 @@ class TestConfig(TestCase):
|
|||||||
write(file, "foo".encode())
|
write(file, "foo".encode())
|
||||||
_, file2_name = mkstemp()
|
_, file2_name = mkstemp()
|
||||||
chmod(file2_name, 0o000) # Remove all permissions so we can't read the file
|
chmod(file2_name, 0o000) # Remove all permissions so we can't read the file
|
||||||
self.assertEqual(config.parse_uri(f"file://{file_name}", {}), "foo")
|
self.assertEqual(config.parse_uri(f"file://{file_name}"), "foo")
|
||||||
self.assertEqual(config.parse_uri(f"file://{file2_name}?def", {}), "def")
|
self.assertEqual(config.parse_uri(f"file://{file2_name}?def"), "def")
|
||||||
unlink(file_name)
|
unlink(file_name)
|
||||||
unlink(file2_name)
|
unlink(file2_name)
|
||||||
|
|
||||||
@ -59,13 +59,3 @@ class TestConfig(TestCase):
|
|||||||
config.update_from_file(file2_name)
|
config.update_from_file(file2_name)
|
||||||
unlink(file_name)
|
unlink(file_name)
|
||||||
unlink(file2_name)
|
unlink(file2_name)
|
||||||
|
|
||||||
def test_update(self):
|
|
||||||
"""Test change to file"""
|
|
||||||
file, file_name = mkstemp()
|
|
||||||
write(file, b"test")
|
|
||||||
CONFIG.y_set("test.file", f"file://{file_name}")
|
|
||||||
self.assertEqual(CONFIG.y("test.file"), "test")
|
|
||||||
write(file, "test2")
|
|
||||||
self.assertEqual(CONFIG.y("test.file"), "test2")
|
|
||||||
unlink(file_name)
|
|
||||||
|
@ -27,7 +27,6 @@ def redirect_with_qs(
|
|||||||
return redirect(view)
|
return redirect(view)
|
||||||
LOGGER.warning("redirect target is not a valid view", view=view)
|
LOGGER.warning("redirect target is not a valid view", view=view)
|
||||||
raise
|
raise
|
||||||
else:
|
|
||||||
if get_query_set:
|
if get_query_set:
|
||||||
target += "?" + urlencode(get_query_set.items())
|
target += "?" + urlencode(get_query_set.items())
|
||||||
return redirect(target)
|
return redirect(target)
|
||||||
|
@ -56,11 +56,9 @@ class OutpostSerializer(ModelSerializer):
|
|||||||
for provider in providers:
|
for provider in providers:
|
||||||
if not isinstance(provider, type_map[self.initial_data.get("type")]):
|
if not isinstance(provider, type_map[self.initial_data.get("type")]):
|
||||||
raise ValidationError(
|
raise ValidationError(
|
||||||
(
|
|
||||||
f"Outpost type {self.initial_data['type']} can't be used with "
|
f"Outpost type {self.initial_data['type']} can't be used with "
|
||||||
f"{provider.__class__.__name__} providers."
|
f"{provider.__class__.__name__} providers."
|
||||||
)
|
)
|
||||||
)
|
|
||||||
if self.instance and self.instance.managed == MANAGED_OUTPOST:
|
if self.instance and self.instance.managed == MANAGED_OUTPOST:
|
||||||
return providers
|
return providers
|
||||||
if len(providers) < 1:
|
if len(providers) < 1:
|
||||||
@ -76,7 +74,6 @@ class OutpostSerializer(ModelSerializer):
|
|||||||
return config
|
return config
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Outpost
|
model = Outpost
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
@ -124,7 +121,6 @@ class OutpostFilter(FilterSet):
|
|||||||
)
|
)
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = Outpost
|
model = Outpost
|
||||||
fields = {
|
fields = {
|
||||||
"providers": ["isnull"],
|
"providers": ["isnull"],
|
||||||
|
@ -37,7 +37,6 @@ class ServiceConnectionSerializer(ModelSerializer, MetaNameSerializer):
|
|||||||
return obj.component
|
return obj.component
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = OutpostServiceConnection
|
model = OutpostServiceConnection
|
||||||
fields = [
|
fields = [
|
||||||
"pk",
|
"pk",
|
||||||
@ -101,7 +100,6 @@ class DockerServiceConnectionSerializer(ServiceConnectionSerializer):
|
|||||||
"""DockerServiceConnection Serializer"""
|
"""DockerServiceConnection Serializer"""
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = DockerServiceConnection
|
model = DockerServiceConnection
|
||||||
fields = ServiceConnectionSerializer.Meta.fields + [
|
fields = ServiceConnectionSerializer.Meta.fields + [
|
||||||
"url",
|
"url",
|
||||||
@ -140,7 +138,6 @@ class KubernetesServiceConnectionSerializer(ServiceConnectionSerializer):
|
|||||||
return kubeconfig
|
return kubeconfig
|
||||||
|
|
||||||
class Meta:
|
class Meta:
|
||||||
|
|
||||||
model = KubernetesServiceConnection
|
model = KubernetesServiceConnection
|
||||||
fields = ServiceConnectionSerializer.Meta.fields + ["kubeconfig", "verify_ssl"]
|
fields = ServiceConnectionSerializer.Meta.fields + ["kubeconfig", "verify_ssl"]
|
||||||
|
|
||||||
|
@ -73,7 +73,6 @@ class KubernetesObjectReconciler(Generic[T]):
|
|||||||
raise NeedsRecreate from exc
|
raise NeedsRecreate from exc
|
||||||
self.logger.debug("Other unhandled error", exc=exc)
|
self.logger.debug("Other unhandled error", exc=exc)
|
||||||
raise exc
|
raise exc
|
||||||
else:
|
|
||||||
self.reconcile(current, reference)
|
self.reconcile(current, reference)
|
||||||
except NeedsUpdate:
|
except NeedsUpdate:
|
||||||
try:
|
try:
|
||||||
|
@ -80,7 +80,6 @@ def update_config_prefix(apps: Apps, schema_editor: BaseDatabaseSchemaEditor):
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
replaces = [
|
replaces = [
|
||||||
("authentik_outposts", "0001_initial"),
|
("authentik_outposts", "0001_initial"),
|
||||||
("authentik_outposts", "0002_auto_20200826_1306"),
|
("authentik_outposts", "0002_auto_20200826_1306"),
|
||||||
@ -136,7 +135,10 @@ class Migration(migrations.Migration):
|
|||||||
("custom", "Custom"),
|
("custom", "Custom"),
|
||||||
],
|
],
|
||||||
default="custom",
|
default="custom",
|
||||||
help_text="Select between authentik-managed deployment types or a custom deployment.",
|
help_text=(
|
||||||
|
"Select between authentik-managed deployment types or a custom"
|
||||||
|
" deployment."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
],
|
],
|
||||||
@ -158,7 +160,10 @@ class Migration(migrations.Migration):
|
|||||||
"local",
|
"local",
|
||||||
models.BooleanField(
|
models.BooleanField(
|
||||||
default=False,
|
default=False,
|
||||||
help_text="If enabled, use the local connection. Required Docker socket/Kubernetes Integration",
|
help_text=(
|
||||||
|
"If enabled, use the local connection. Required Docker"
|
||||||
|
" socket/Kubernetes Integration"
|
||||||
|
),
|
||||||
unique=True,
|
unique=True,
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
@ -207,7 +212,10 @@ class Migration(migrations.Migration):
|
|||||||
field=models.ForeignKey(
|
field=models.ForeignKey(
|
||||||
blank=True,
|
blank=True,
|
||||||
default=None,
|
default=None,
|
||||||
help_text="Select Service-Connection authentik should use to manage this outpost. Leave empty if authentik should not handle the deployment.",
|
help_text=(
|
||||||
|
"Select Service-Connection authentik should use to manage this outpost. Leave"
|
||||||
|
" empty if authentik should not handle the deployment."
|
||||||
|
),
|
||||||
null=True,
|
null=True,
|
||||||
on_delete=django.db.models.deletion.SET_DEFAULT,
|
on_delete=django.db.models.deletion.SET_DEFAULT,
|
||||||
to="authentik_outposts.outpostserviceconnection",
|
to="authentik_outposts.outpostserviceconnection",
|
||||||
@ -240,7 +248,10 @@ class Migration(migrations.Migration):
|
|||||||
field=authentik.lib.models.InheritanceForeignKey(
|
field=authentik.lib.models.InheritanceForeignKey(
|
||||||
blank=True,
|
blank=True,
|
||||||
default=None,
|
default=None,
|
||||||
help_text="Select Service-Connection authentik should use to manage this outpost. Leave empty if authentik should not handle the deployment.",
|
help_text=(
|
||||||
|
"Select Service-Connection authentik should use to manage this outpost. Leave"
|
||||||
|
" empty if authentik should not handle the deployment."
|
||||||
|
),
|
||||||
null=True,
|
null=True,
|
||||||
on_delete=django.db.models.deletion.SET_DEFAULT,
|
on_delete=django.db.models.deletion.SET_DEFAULT,
|
||||||
to="authentik_outposts.outpostserviceconnection",
|
to="authentik_outposts.outpostserviceconnection",
|
||||||
@ -258,7 +269,10 @@ class Migration(migrations.Migration):
|
|||||||
name="kubeconfig",
|
name="kubeconfig",
|
||||||
field=models.JSONField(
|
field=models.JSONField(
|
||||||
default=None,
|
default=None,
|
||||||
help_text="Paste your kubeconfig here. authentik will automatically use the currently selected context.",
|
help_text=(
|
||||||
|
"Paste your kubeconfig here. authentik will automatically use the currently"
|
||||||
|
" selected context."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
preserve_default=False,
|
preserve_default=False,
|
||||||
),
|
),
|
||||||
@ -272,7 +286,10 @@ class Migration(migrations.Migration):
|
|||||||
field=models.ForeignKey(
|
field=models.ForeignKey(
|
||||||
blank=True,
|
blank=True,
|
||||||
default=None,
|
default=None,
|
||||||
help_text="Certificate/Key used for authentication. Can be left empty for no authentication.",
|
help_text=(
|
||||||
|
"Certificate/Key used for authentication. Can be left empty for no"
|
||||||
|
" authentication."
|
||||||
|
),
|
||||||
null=True,
|
null=True,
|
||||||
on_delete=django.db.models.deletion.SET_DEFAULT,
|
on_delete=django.db.models.deletion.SET_DEFAULT,
|
||||||
related_name="+",
|
related_name="+",
|
||||||
@ -285,7 +302,10 @@ class Migration(migrations.Migration):
|
|||||||
field=models.ForeignKey(
|
field=models.ForeignKey(
|
||||||
blank=True,
|
blank=True,
|
||||||
default=None,
|
default=None,
|
||||||
help_text="CA which the endpoint's Certificate is verified against. Can be left empty for no validation.",
|
help_text=(
|
||||||
|
"CA which the endpoint's Certificate is verified against. Can be left empty for"
|
||||||
|
" no validation."
|
||||||
|
),
|
||||||
null=True,
|
null=True,
|
||||||
on_delete=django.db.models.deletion.SET_DEFAULT,
|
on_delete=django.db.models.deletion.SET_DEFAULT,
|
||||||
related_name="+",
|
related_name="+",
|
||||||
@ -297,7 +317,10 @@ class Migration(migrations.Migration):
|
|||||||
name="local",
|
name="local",
|
||||||
field=models.BooleanField(
|
field=models.BooleanField(
|
||||||
default=False,
|
default=False,
|
||||||
help_text="If enabled, use the local connection. Required Docker socket/Kubernetes Integration",
|
help_text=(
|
||||||
|
"If enabled, use the local connection. Required Docker socket/Kubernetes"
|
||||||
|
" Integration"
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
migrations.RunPython(
|
migrations.RunPython(
|
||||||
@ -310,7 +333,10 @@ class Migration(migrations.Migration):
|
|||||||
model_name="dockerserviceconnection",
|
model_name="dockerserviceconnection",
|
||||||
name="url",
|
name="url",
|
||||||
field=models.TextField(
|
field=models.TextField(
|
||||||
help_text="Can be in the format of 'unix://<path>' when connecting to a local docker daemon, or 'https://<hostname>:2376' when connecting to a remote system."
|
help_text=(
|
||||||
|
"Can be in the format of 'unix://<path>' when connecting to a local docker"
|
||||||
|
" daemon, or 'https://<hostname>:2376' when connecting to a remote system."
|
||||||
|
)
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
migrations.AlterField(
|
migrations.AlterField(
|
||||||
@ -318,7 +344,10 @@ class Migration(migrations.Migration):
|
|||||||
name="kubeconfig",
|
name="kubeconfig",
|
||||||
field=models.JSONField(
|
field=models.JSONField(
|
||||||
blank=True,
|
blank=True,
|
||||||
help_text="Paste your kubeconfig here. authentik will automatically use the currently selected context.",
|
help_text=(
|
||||||
|
"Paste your kubeconfig here. authentik will automatically use the currently"
|
||||||
|
" selected context."
|
||||||
|
),
|
||||||
),
|
),
|
||||||
),
|
),
|
||||||
migrations.AlterField(
|
migrations.AlterField(
|
||||||
@ -331,7 +360,12 @@ class Migration(migrations.Migration):
|
|||||||
name="managed",
|
name="managed",
|
||||||
field=models.TextField(
|
field=models.TextField(
|
||||||
default=None,
|
default=None,
|
||||||
help_text="Objects which are managed by authentik. These objects are created and updated automatically. This is flag only indicates that an object can be overwritten by migrations. You can still modify the objects via the API, but expect changes to be overwritten in a later update.",
|
help_text=(
|
||||||
|
"Objects which are managed by authentik. These objects are created and updated"
|
||||||
|
" automatically. This is flag only indicates that an object can be overwritten"
|
||||||
|
" by migrations. You can still modify the objects via the API, but expect"
|
||||||
|
" changes to be overwritten in a later update."
|
||||||
|
),
|
||||||
null=True,
|
null=True,
|
||||||
unique=True,
|
unique=True,
|
||||||
verbose_name="Managed by authentik",
|
verbose_name="Managed by authentik",
|
||||||
|
@ -4,7 +4,6 @@ from django.db import migrations, models
|
|||||||
|
|
||||||
|
|
||||||
class Migration(migrations.Migration):
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
dependencies = [
|
dependencies = [
|
||||||
("authentik_outposts", "0001_squashed_0017_outpost_managed"),
|
("authentik_outposts", "0001_squashed_0017_outpost_managed"),
|
||||||
]
|
]
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user