Compare commits
75 Commits
web/flow/t
...
docs-read-
Author | SHA1 | Date | |
---|---|---|---|
7850bd325c | |||
2173c8bfd6 | |||
fc9afacad6 | |||
b33126b132 | |||
d30bf8b012 | |||
a640b450e3 | |||
ea2dfd0ea6 | |||
cadc3d9ca3 | |||
1623885dc6 | |||
0670bc8253 | |||
2074944b6a | |||
19488b7b9e | |||
4aeb7c8a84 | |||
5e0802e7b8 | |||
e077a5c18f | |||
7e960352ea | |||
248fcdd1bf | |||
b148f4b740 | |||
a65fb19489 | |||
dcbee92cd2 | |||
dd0dc75951 | |||
02672e008c | |||
708105474c | |||
2d2fb635dd | |||
dc3174529b | |||
8a5adb78fb | |||
2f9ad00122 | |||
8534005936 | |||
4bb6b23b9a | |||
3ef1ac2980 | |||
fda6054285 | |||
13b2543221 | |||
87259c3c10 | |||
cd3a058a97 | |||
f9e8138be3 | |||
c05124c9dd | |||
90997efe29 | |||
d69322ac68 | |||
3996bdac33 | |||
6d2072a730 | |||
479242440e | |||
7bba94a374 | |||
7d47628d76 | |||
23a6fb959a | |||
affcef3ee8 | |||
27df0be5fa | |||
694a65b4aa | |||
1daa5315d7 | |||
709e413e46 | |||
5e72ec9c0c | |||
ee15dbf671 | |||
4444779fcb | |||
48ddbc4283 | |||
bd92f9ab50 | |||
6c1ad982a1 | |||
630e0e6bf2 | |||
bebd4cd03f | |||
71b9b29a7d | |||
cc65fcd806 | |||
9f82c87d2a | |||
0f76445ed7 | |||
ab1e9a0cec | |||
30fa8ee75f | |||
ea9a596780 | |||
ca34d39c16 | |||
3d5a189fa7 | |||
785403de18 | |||
1c4165a373 | |||
bbd03b2b05 | |||
dd79aec5a6 | |||
3634ae3db9 | |||
12e1ee93ed | |||
62aa3659b8 | |||
23ec05a86c | |||
520148bba4 |
@ -1,5 +1,5 @@
|
|||||||
[bumpversion]
|
[bumpversion]
|
||||||
current_version = 2024.10.2
|
current_version = 2024.10.4
|
||||||
tag = True
|
tag = True
|
||||||
commit = True
|
commit = True
|
||||||
parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)(?:-(?P<rc_t>[a-zA-Z-]+)(?P<rc_n>[1-9]\\d*))?
|
parse = (?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)(?:-(?P<rc_t>[a-zA-Z-]+)(?P<rc_n>[1-9]\\d*))?
|
||||||
@ -30,3 +30,5 @@ optional_value = final
|
|||||||
[bumpversion:file:internal/constants/constants.go]
|
[bumpversion:file:internal/constants/constants.go]
|
||||||
|
|
||||||
[bumpversion:file:web/src/common/constants.ts]
|
[bumpversion:file:web/src/common/constants.ts]
|
||||||
|
|
||||||
|
[bumpversion:file:website/docs/install-config/install/aws/template.yaml]
|
||||||
|
@ -11,9 +11,9 @@ inputs:
|
|||||||
description: "Docker image arch"
|
description: "Docker image arch"
|
||||||
|
|
||||||
outputs:
|
outputs:
|
||||||
shouldBuild:
|
shouldPush:
|
||||||
description: "Whether to build image or not"
|
description: "Whether to push the image or not"
|
||||||
value: ${{ steps.ev.outputs.shouldBuild }}
|
value: ${{ steps.ev.outputs.shouldPush }}
|
||||||
|
|
||||||
sha:
|
sha:
|
||||||
description: "sha"
|
description: "sha"
|
||||||
|
@ -7,7 +7,14 @@ from time import time
|
|||||||
parser = configparser.ConfigParser()
|
parser = configparser.ConfigParser()
|
||||||
parser.read(".bumpversion.cfg")
|
parser.read(".bumpversion.cfg")
|
||||||
|
|
||||||
should_build = str(len(os.environ.get("DOCKER_USERNAME", "")) > 0).lower()
|
# Decide if we should push the image or not
|
||||||
|
should_push = True
|
||||||
|
if len(os.environ.get("DOCKER_USERNAME", "")) < 1:
|
||||||
|
# Don't push if we don't have DOCKER_USERNAME, i.e. no secrets are available
|
||||||
|
should_push = False
|
||||||
|
if os.environ.get("GITHUB_REPOSITORY").lower() == "goauthentik/authentik-internal":
|
||||||
|
# Don't push on the internal repo
|
||||||
|
should_push = False
|
||||||
|
|
||||||
branch_name = os.environ["GITHUB_REF"]
|
branch_name = os.environ["GITHUB_REF"]
|
||||||
if os.environ.get("GITHUB_HEAD_REF", "") != "":
|
if os.environ.get("GITHUB_HEAD_REF", "") != "":
|
||||||
@ -64,7 +71,7 @@ def get_attest_image_names(image_with_tags: list[str]):
|
|||||||
|
|
||||||
|
|
||||||
with open(os.environ["GITHUB_OUTPUT"], "a+", encoding="utf-8") as _output:
|
with open(os.environ["GITHUB_OUTPUT"], "a+", encoding="utf-8") as _output:
|
||||||
print(f"shouldBuild={should_build}", file=_output)
|
print(f"shouldPush={str(should_push).lower()}", file=_output)
|
||||||
print(f"sha={sha}", file=_output)
|
print(f"sha={sha}", file=_output)
|
||||||
print(f"version={version}", file=_output)
|
print(f"version={version}", file=_output)
|
||||||
print(f"prerelease={prerelease}", file=_output)
|
print(f"prerelease={prerelease}", file=_output)
|
||||||
|
1
.github/workflows/api-py-publish.yml
vendored
1
.github/workflows/api-py-publish.yml
vendored
@ -7,6 +7,7 @@ on:
|
|||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
jobs:
|
jobs:
|
||||||
build:
|
build:
|
||||||
|
if: ${{ github.repository != 'goauthentik/authentik-internal' }}
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
permissions:
|
permissions:
|
||||||
id-token: write
|
id-token: write
|
||||||
|
1
.github/workflows/api-ts-publish.yml
vendored
1
.github/workflows/api-ts-publish.yml
vendored
@ -7,6 +7,7 @@ on:
|
|||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
jobs:
|
jobs:
|
||||||
build:
|
build:
|
||||||
|
if: ${{ github.repository != 'goauthentik/authentik-internal' }}
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- id: generate_token
|
- id: generate_token
|
||||||
|
43
.github/workflows/ci-aws-cfn.yml
vendored
Normal file
43
.github/workflows/ci-aws-cfn.yml
vendored
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
name: authentik-ci-aws-cfn
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
- next
|
||||||
|
- version-*
|
||||||
|
pull_request:
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
- version-*
|
||||||
|
|
||||||
|
env:
|
||||||
|
POSTGRES_DB: authentik
|
||||||
|
POSTGRES_USER: authentik
|
||||||
|
POSTGRES_PASSWORD: "EK-5jnKfjrGRm<77"
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
check-changes-applied:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
- name: Setup authentik env
|
||||||
|
uses: ./.github/actions/setup
|
||||||
|
- uses: actions/setup-node@v4
|
||||||
|
with:
|
||||||
|
node-version-file: website/package.json
|
||||||
|
cache: "npm"
|
||||||
|
cache-dependency-path: website/package-lock.json
|
||||||
|
- working-directory: website/
|
||||||
|
run: |
|
||||||
|
npm ci
|
||||||
|
- name: Check changes have been applied
|
||||||
|
run: |
|
||||||
|
poetry run make aws-cfn
|
||||||
|
git diff --exit-code
|
||||||
|
ci-aws-cfn-mark:
|
||||||
|
needs:
|
||||||
|
- check-changes-applied
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- run: echo mark
|
10
.github/workflows/ci-main.yml
vendored
10
.github/workflows/ci-main.yml
vendored
@ -252,7 +252,7 @@ jobs:
|
|||||||
image-name: ghcr.io/goauthentik/dev-server
|
image-name: ghcr.io/goauthentik/dev-server
|
||||||
image-arch: ${{ matrix.arch }}
|
image-arch: ${{ matrix.arch }}
|
||||||
- name: Login to Container Registry
|
- name: Login to Container Registry
|
||||||
if: ${{ steps.ev.outputs.shouldBuild == 'true' }}
|
if: ${{ steps.ev.outputs.shouldPush == 'true' }}
|
||||||
uses: docker/login-action@v3
|
uses: docker/login-action@v3
|
||||||
with:
|
with:
|
||||||
registry: ghcr.io
|
registry: ghcr.io
|
||||||
@ -269,15 +269,15 @@ jobs:
|
|||||||
GEOIPUPDATE_ACCOUNT_ID=${{ secrets.GEOIPUPDATE_ACCOUNT_ID }}
|
GEOIPUPDATE_ACCOUNT_ID=${{ secrets.GEOIPUPDATE_ACCOUNT_ID }}
|
||||||
GEOIPUPDATE_LICENSE_KEY=${{ secrets.GEOIPUPDATE_LICENSE_KEY }}
|
GEOIPUPDATE_LICENSE_KEY=${{ secrets.GEOIPUPDATE_LICENSE_KEY }}
|
||||||
tags: ${{ steps.ev.outputs.imageTags }}
|
tags: ${{ steps.ev.outputs.imageTags }}
|
||||||
push: ${{ steps.ev.outputs.shouldBuild == 'true' }}
|
push: ${{ steps.ev.outputs.shouldPush == 'true' }}
|
||||||
build-args: |
|
build-args: |
|
||||||
GIT_BUILD_HASH=${{ steps.ev.outputs.sha }}
|
GIT_BUILD_HASH=${{ steps.ev.outputs.sha }}
|
||||||
cache-from: type=registry,ref=ghcr.io/goauthentik/dev-server:buildcache
|
cache-from: type=registry,ref=ghcr.io/goauthentik/dev-server:buildcache
|
||||||
cache-to: ${{ steps.ev.outputs.shouldBuild == 'true' && 'type=registry,ref=ghcr.io/goauthentik/dev-server:buildcache,mode=max' || '' }}
|
cache-to: ${{ steps.ev.outputs.shouldPush == 'true' && 'type=registry,ref=ghcr.io/goauthentik/dev-server:buildcache,mode=max' || '' }}
|
||||||
platforms: linux/${{ matrix.arch }}
|
platforms: linux/${{ matrix.arch }}
|
||||||
- uses: actions/attest-build-provenance@v1
|
- uses: actions/attest-build-provenance@v1
|
||||||
id: attest
|
id: attest
|
||||||
if: ${{ steps.ev.outputs.shouldBuild == 'true' }}
|
if: ${{ steps.ev.outputs.shouldPush == 'true' }}
|
||||||
with:
|
with:
|
||||||
subject-name: ${{ steps.ev.outputs.attestImageNames }}
|
subject-name: ${{ steps.ev.outputs.attestImageNames }}
|
||||||
subject-digest: ${{ steps.push.outputs.digest }}
|
subject-digest: ${{ steps.push.outputs.digest }}
|
||||||
@ -303,7 +303,7 @@ jobs:
|
|||||||
with:
|
with:
|
||||||
image-name: ghcr.io/goauthentik/dev-server
|
image-name: ghcr.io/goauthentik/dev-server
|
||||||
- name: Comment on PR
|
- name: Comment on PR
|
||||||
if: ${{ steps.ev.outputs.shouldBuild == 'true' }}
|
if: ${{ steps.ev.outputs.shouldPush == 'true' }}
|
||||||
uses: ./.github/actions/comment-pr-instructions
|
uses: ./.github/actions/comment-pr-instructions
|
||||||
with:
|
with:
|
||||||
tag: ${{ steps.ev.outputs.imageMainTag }}
|
tag: ${{ steps.ev.outputs.imageMainTag }}
|
||||||
|
8
.github/workflows/ci-outpost.yml
vendored
8
.github/workflows/ci-outpost.yml
vendored
@ -90,7 +90,7 @@ jobs:
|
|||||||
with:
|
with:
|
||||||
image-name: ghcr.io/goauthentik/dev-${{ matrix.type }}
|
image-name: ghcr.io/goauthentik/dev-${{ matrix.type }}
|
||||||
- name: Login to Container Registry
|
- name: Login to Container Registry
|
||||||
if: ${{ steps.ev.outputs.shouldBuild == 'true' }}
|
if: ${{ steps.ev.outputs.shouldPush == 'true' }}
|
||||||
uses: docker/login-action@v3
|
uses: docker/login-action@v3
|
||||||
with:
|
with:
|
||||||
registry: ghcr.io
|
registry: ghcr.io
|
||||||
@ -104,16 +104,16 @@ jobs:
|
|||||||
with:
|
with:
|
||||||
tags: ${{ steps.ev.outputs.imageTags }}
|
tags: ${{ steps.ev.outputs.imageTags }}
|
||||||
file: ${{ matrix.type }}.Dockerfile
|
file: ${{ matrix.type }}.Dockerfile
|
||||||
push: ${{ steps.ev.outputs.shouldBuild == 'true' }}
|
push: ${{ steps.ev.outputs.shouldPush == 'true' }}
|
||||||
build-args: |
|
build-args: |
|
||||||
GIT_BUILD_HASH=${{ steps.ev.outputs.sha }}
|
GIT_BUILD_HASH=${{ steps.ev.outputs.sha }}
|
||||||
platforms: linux/amd64,linux/arm64
|
platforms: linux/amd64,linux/arm64
|
||||||
context: .
|
context: .
|
||||||
cache-from: type=registry,ref=ghcr.io/goauthentik/dev-${{ matrix.type }}:buildcache
|
cache-from: type=registry,ref=ghcr.io/goauthentik/dev-${{ matrix.type }}:buildcache
|
||||||
cache-to: ${{ steps.ev.outputs.shouldBuild == 'true' && format('type=registry,ref=ghcr.io/goauthentik/dev-{0}:buildcache,mode=max', matrix.type) || '' }}
|
cache-to: ${{ steps.ev.outputs.shouldPush == 'true' && format('type=registry,ref=ghcr.io/goauthentik/dev-{0}:buildcache,mode=max', matrix.type) || '' }}
|
||||||
- uses: actions/attest-build-provenance@v1
|
- uses: actions/attest-build-provenance@v1
|
||||||
id: attest
|
id: attest
|
||||||
if: ${{ steps.ev.outputs.shouldBuild == 'true' }}
|
if: ${{ steps.ev.outputs.shouldPush == 'true' }}
|
||||||
with:
|
with:
|
||||||
subject-name: ${{ steps.ev.outputs.attestImageNames }}
|
subject-name: ${{ steps.ev.outputs.attestImageNames }}
|
||||||
subject-digest: ${{ steps.push.outputs.digest }}
|
subject-digest: ${{ steps.push.outputs.digest }}
|
||||||
|
@ -11,6 +11,7 @@ env:
|
|||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build:
|
build:
|
||||||
|
if: ${{ github.repository != 'goauthentik/authentik-internal' }}
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- id: generate_token
|
- id: generate_token
|
||||||
|
1
.github/workflows/ghcr-retention.yml
vendored
1
.github/workflows/ghcr-retention.yml
vendored
@ -7,6 +7,7 @@ on:
|
|||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
clean-ghcr:
|
clean-ghcr:
|
||||||
|
if: ${{ github.repository != 'goauthentik/authentik-internal' }}
|
||||||
name: Delete old unused container images
|
name: Delete old unused container images
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
|
1
.github/workflows/publish-source-docs.yml
vendored
1
.github/workflows/publish-source-docs.yml
vendored
@ -12,6 +12,7 @@ env:
|
|||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
publish-source-docs:
|
publish-source-docs:
|
||||||
|
if: ${{ github.repository != 'goauthentik/authentik-internal' }}
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
timeout-minutes: 120
|
timeout-minutes: 120
|
||||||
steps:
|
steps:
|
||||||
|
1
.github/workflows/release-next-branch.yml
vendored
1
.github/workflows/release-next-branch.yml
vendored
@ -11,6 +11,7 @@ permissions:
|
|||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
update-next:
|
update-next:
|
||||||
|
if: ${{ github.repository != 'goauthentik/authentik-internal' }}
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
environment: internal-production
|
environment: internal-production
|
||||||
steps:
|
steps:
|
||||||
|
21
.github/workflows/release-publish.yml
vendored
21
.github/workflows/release-publish.yml
vendored
@ -169,6 +169,27 @@ jobs:
|
|||||||
file: ./authentik-outpost-${{ matrix.type }}_${{ matrix.goos }}_${{ matrix.goarch }}
|
file: ./authentik-outpost-${{ matrix.type }}_${{ matrix.goos }}_${{ matrix.goarch }}
|
||||||
asset_name: authentik-outpost-${{ matrix.type }}_${{ matrix.goos }}_${{ matrix.goarch }}
|
asset_name: authentik-outpost-${{ matrix.type }}_${{ matrix.goos }}_${{ matrix.goarch }}
|
||||||
tag: ${{ github.ref }}
|
tag: ${{ github.ref }}
|
||||||
|
upload-aws-cfn-template:
|
||||||
|
permissions:
|
||||||
|
# Needed for AWS login
|
||||||
|
id-token: write
|
||||||
|
contents: read
|
||||||
|
needs:
|
||||||
|
- build-server
|
||||||
|
- build-outpost
|
||||||
|
env:
|
||||||
|
AWS_REGION: eu-central-1
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
- uses: aws-actions/configure-aws-credentials@v4
|
||||||
|
with:
|
||||||
|
role-to-assume: "arn:aws:iam::016170277896:role/github_goauthentik_authentik"
|
||||||
|
aws-region: ${{ env.AWS_REGION }}
|
||||||
|
- name: Upload template
|
||||||
|
run: |
|
||||||
|
aws s3 cp website/docs/install-config/install/aws/template.yaml s3://authentik-cloudformation-templates/authentik.ecs.${{ github.ref }}.yaml
|
||||||
|
aws s3 cp website/docs/install-config/install/aws/template.yaml s3://authentik-cloudformation-templates/authentik.ecs.latest.yaml
|
||||||
test-release:
|
test-release:
|
||||||
needs:
|
needs:
|
||||||
- build-server
|
- build-server
|
||||||
|
21
.github/workflows/repo-mirror.yml
vendored
Normal file
21
.github/workflows/repo-mirror.yml
vendored
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
name: "authentik-repo-mirror"
|
||||||
|
|
||||||
|
on: [push, delete]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
to_internal:
|
||||||
|
if: ${{ github.repository != 'goauthentik/authentik-internal' }}
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
with:
|
||||||
|
fetch-depth: 0
|
||||||
|
- if: ${{ env.MIRROR_KEY != '' }}
|
||||||
|
uses: pixta-dev/repository-mirroring-action@v1
|
||||||
|
with:
|
||||||
|
target_repo_url:
|
||||||
|
git@github.com:goauthentik/authentik-internal.git
|
||||||
|
ssh_private_key:
|
||||||
|
${{ secrets.GH_MIRROR_KEY }}
|
||||||
|
env:
|
||||||
|
MIRROR_KEY: ${{ secrets.GH_MIRROR_KEY }}
|
1
.github/workflows/repo-stale.yml
vendored
1
.github/workflows/repo-stale.yml
vendored
@ -11,6 +11,7 @@ permissions:
|
|||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
stale:
|
stale:
|
||||||
|
if: ${{ github.repository != 'goauthentik/authentik-internal' }}
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- id: generate_token
|
- id: generate_token
|
||||||
|
@ -1 +1 @@
|
|||||||
website/developer-docs/index.md
|
website/docs/developer-docs/index.md
|
5
Makefile
5
Makefile
@ -5,7 +5,7 @@ PWD = $(shell pwd)
|
|||||||
UID = $(shell id -u)
|
UID = $(shell id -u)
|
||||||
GID = $(shell id -g)
|
GID = $(shell id -g)
|
||||||
NPM_VERSION = $(shell python -m scripts.npm_version)
|
NPM_VERSION = $(shell python -m scripts.npm_version)
|
||||||
PY_SOURCES = authentik tests scripts lifecycle .github
|
PY_SOURCES = authentik tests scripts lifecycle .github website/docs/install-config/install/aws
|
||||||
DOCKER_IMAGE ?= "authentik:test"
|
DOCKER_IMAGE ?= "authentik:test"
|
||||||
|
|
||||||
GEN_API_TS = "gen-ts-api"
|
GEN_API_TS = "gen-ts-api"
|
||||||
@ -252,6 +252,9 @@ website-build:
|
|||||||
website-watch: ## Build and watch the documentation website, updating automatically
|
website-watch: ## Build and watch the documentation website, updating automatically
|
||||||
cd website && npm run watch
|
cd website && npm run watch
|
||||||
|
|
||||||
|
aws-cfn:
|
||||||
|
cd website && npm run aws-cfn
|
||||||
|
|
||||||
#########################
|
#########################
|
||||||
## Docker
|
## Docker
|
||||||
#########################
|
#########################
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
from os import environ
|
from os import environ
|
||||||
|
|
||||||
__version__ = "2024.10.2"
|
__version__ = "2024.10.4"
|
||||||
ENV_GIT_HASH_KEY = "GIT_BUILD_HASH"
|
ENV_GIT_HASH_KEY = "GIT_BUILD_HASH"
|
||||||
|
|
||||||
|
|
||||||
|
@ -65,7 +65,12 @@ from authentik.lib.utils.reflection import get_apps
|
|||||||
from authentik.outposts.models import OutpostServiceConnection
|
from authentik.outposts.models import OutpostServiceConnection
|
||||||
from authentik.policies.models import Policy, PolicyBindingModel
|
from authentik.policies.models import Policy, PolicyBindingModel
|
||||||
from authentik.policies.reputation.models import Reputation
|
from authentik.policies.reputation.models import Reputation
|
||||||
from authentik.providers.oauth2.models import AccessToken, AuthorizationCode, RefreshToken
|
from authentik.providers.oauth2.models import (
|
||||||
|
AccessToken,
|
||||||
|
AuthorizationCode,
|
||||||
|
DeviceToken,
|
||||||
|
RefreshToken,
|
||||||
|
)
|
||||||
from authentik.providers.scim.models import SCIMProviderGroup, SCIMProviderUser
|
from authentik.providers.scim.models import SCIMProviderGroup, SCIMProviderUser
|
||||||
from authentik.rbac.models import Role
|
from authentik.rbac.models import Role
|
||||||
from authentik.sources.scim.models import SCIMSourceGroup, SCIMSourceUser
|
from authentik.sources.scim.models import SCIMSourceGroup, SCIMSourceUser
|
||||||
@ -125,6 +130,7 @@ def excluded_models() -> list[type[Model]]:
|
|||||||
MicrosoftEntraProviderGroup,
|
MicrosoftEntraProviderGroup,
|
||||||
EndpointDevice,
|
EndpointDevice,
|
||||||
EndpointDeviceConnection,
|
EndpointDeviceConnection,
|
||||||
|
DeviceToken,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@ -159,7 +159,7 @@ def blueprints_discovery(self: SystemTask, path: str | None = None):
|
|||||||
check_blueprint_v1_file(blueprint)
|
check_blueprint_v1_file(blueprint)
|
||||||
count += 1
|
count += 1
|
||||||
self.set_status(
|
self.set_status(
|
||||||
TaskStatus.SUCCESSFUL, _("Successfully imported %(count)d files." % {"count": count})
|
TaskStatus.SUCCESSFUL, _("Successfully imported {count} files.".format(count=count))
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
@ -84,8 +84,8 @@ class CurrentBrandSerializer(PassiveSerializer):
|
|||||||
|
|
||||||
matched_domain = CharField(source="domain")
|
matched_domain = CharField(source="domain")
|
||||||
branding_title = CharField()
|
branding_title = CharField()
|
||||||
branding_logo = CharField()
|
branding_logo = CharField(source="branding_logo_url")
|
||||||
branding_favicon = CharField()
|
branding_favicon = CharField(source="branding_favicon_url")
|
||||||
ui_footer_links = ListField(
|
ui_footer_links = ListField(
|
||||||
child=FooterLinkSerializer(),
|
child=FooterLinkSerializer(),
|
||||||
read_only=True,
|
read_only=True,
|
||||||
|
@ -10,6 +10,7 @@ from structlog.stdlib import get_logger
|
|||||||
|
|
||||||
from authentik.crypto.models import CertificateKeyPair
|
from authentik.crypto.models import CertificateKeyPair
|
||||||
from authentik.flows.models import Flow
|
from authentik.flows.models import Flow
|
||||||
|
from authentik.lib.config import CONFIG
|
||||||
from authentik.lib.models import SerializerModel
|
from authentik.lib.models import SerializerModel
|
||||||
|
|
||||||
LOGGER = get_logger()
|
LOGGER = get_logger()
|
||||||
@ -71,6 +72,18 @@ class Brand(SerializerModel):
|
|||||||
)
|
)
|
||||||
attributes = models.JSONField(default=dict, blank=True)
|
attributes = models.JSONField(default=dict, blank=True)
|
||||||
|
|
||||||
|
def branding_logo_url(self) -> str:
|
||||||
|
"""Get branding_logo with the correct prefix"""
|
||||||
|
if self.branding_logo.startswith("/static"):
|
||||||
|
return CONFIG.get("web.path", "/")[:-1] + self.branding_logo
|
||||||
|
return self.branding_logo
|
||||||
|
|
||||||
|
def branding_favicon_url(self) -> str:
|
||||||
|
"""Get branding_favicon with the correct prefix"""
|
||||||
|
if self.branding_favicon.startswith("/static"):
|
||||||
|
return CONFIG.get("web.path", "/")[:-1] + self.branding_favicon
|
||||||
|
return self.branding_favicon
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def serializer(self) -> Serializer:
|
def serializer(self) -> Serializer:
|
||||||
from authentik.brands.api import BrandSerializer
|
from authentik.brands.api import BrandSerializer
|
||||||
|
@ -9,6 +9,9 @@
|
|||||||
versionFamily: "{{ version_family }}",
|
versionFamily: "{{ version_family }}",
|
||||||
versionSubdomain: "{{ version_subdomain }}",
|
versionSubdomain: "{{ version_subdomain }}",
|
||||||
build: "{{ build }}",
|
build: "{{ build }}",
|
||||||
|
api: {
|
||||||
|
base: "{{ base_url }}",
|
||||||
|
},
|
||||||
};
|
};
|
||||||
window.addEventListener("DOMContentLoaded", function () {
|
window.addEventListener("DOMContentLoaded", function () {
|
||||||
{% for message in messages %}
|
{% for message in messages %}
|
||||||
|
@ -9,8 +9,8 @@
|
|||||||
<meta charset="UTF-8">
|
<meta charset="UTF-8">
|
||||||
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1">
|
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1">
|
||||||
<title>{% block title %}{% trans title|default:brand.branding_title %}{% endblock %}</title>
|
<title>{% block title %}{% trans title|default:brand.branding_title %}{% endblock %}</title>
|
||||||
<link rel="icon" href="{{ brand.branding_favicon }}">
|
<link rel="icon" href="{{ brand.branding_favicon_url }}">
|
||||||
<link rel="shortcut icon" href="{{ brand.branding_favicon }}">
|
<link rel="shortcut icon" href="{{ brand.branding_favicon_url }}">
|
||||||
{% block head_before %}
|
{% block head_before %}
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
<link rel="stylesheet" type="text/css" href="{% static 'dist/authentik.css' %}">
|
<link rel="stylesheet" type="text/css" href="{% static 'dist/authentik.css' %}">
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
{% load i18n %}
|
{% load i18n %}
|
||||||
|
|
||||||
{% block head_before %}
|
{% block head_before %}
|
||||||
<link rel="prefetch" href="/static/dist/assets/images/flow_background.jpg" />
|
<link rel="prefetch" href="{% static 'dist/assets/images/flow_background.jpg' %}" />
|
||||||
<link rel="stylesheet" type="text/css" href="{% static 'dist/patternfly.min.css' %}">
|
<link rel="stylesheet" type="text/css" href="{% static 'dist/patternfly.min.css' %}">
|
||||||
<link rel="stylesheet" type="text/css" href="{% static 'dist/theme-dark.css' %}" media="(prefers-color-scheme: dark)">
|
<link rel="stylesheet" type="text/css" href="{% static 'dist/theme-dark.css' %}" media="(prefers-color-scheme: dark)">
|
||||||
{% include "base/header_js.html" %}
|
{% include "base/header_js.html" %}
|
||||||
@ -13,7 +13,7 @@
|
|||||||
{% block head %}
|
{% block head %}
|
||||||
<style>
|
<style>
|
||||||
:root {
|
:root {
|
||||||
--ak-flow-background: url("/static/dist/assets/images/flow_background.jpg");
|
--ak-flow-background: url("{% static 'dist/assets/images/flow_background.jpg' %}");
|
||||||
--pf-c-background-image--BackgroundImage: var(--ak-flow-background);
|
--pf-c-background-image--BackgroundImage: var(--ak-flow-background);
|
||||||
--pf-c-background-image--BackgroundImage-2x: var(--ak-flow-background);
|
--pf-c-background-image--BackgroundImage-2x: var(--ak-flow-background);
|
||||||
--pf-c-background-image--BackgroundImage--sm: var(--ak-flow-background);
|
--pf-c-background-image--BackgroundImage--sm: var(--ak-flow-background);
|
||||||
@ -50,7 +50,7 @@
|
|||||||
<div class="ak-login-container">
|
<div class="ak-login-container">
|
||||||
<main class="pf-c-login__main">
|
<main class="pf-c-login__main">
|
||||||
<div class="pf-c-login__main-header pf-c-brand ak-brand">
|
<div class="pf-c-login__main-header pf-c-brand ak-brand">
|
||||||
<img src="{{ brand.branding_logo }}" alt="authentik Logo" />
|
<img src="{{ brand.branding_logo_url }}" alt="authentik Logo" />
|
||||||
</div>
|
</div>
|
||||||
<header class="pf-c-login__main-header">
|
<header class="pf-c-login__main-header">
|
||||||
<h1 class="pf-c-title pf-m-3xl">
|
<h1 class="pf-c-title pf-m-3xl">
|
||||||
|
@ -16,6 +16,7 @@ from authentik.api.v3.config import ConfigView
|
|||||||
from authentik.brands.api import CurrentBrandSerializer
|
from authentik.brands.api import CurrentBrandSerializer
|
||||||
from authentik.brands.models import Brand
|
from authentik.brands.models import Brand
|
||||||
from authentik.core.models import UserTypes
|
from authentik.core.models import UserTypes
|
||||||
|
from authentik.lib.config import CONFIG
|
||||||
from authentik.policies.denied import AccessDeniedResponse
|
from authentik.policies.denied import AccessDeniedResponse
|
||||||
|
|
||||||
|
|
||||||
@ -51,6 +52,7 @@ class InterfaceView(TemplateView):
|
|||||||
kwargs["version_subdomain"] = f"version-{LOCAL_VERSION.major}-{LOCAL_VERSION.minor}"
|
kwargs["version_subdomain"] = f"version-{LOCAL_VERSION.major}-{LOCAL_VERSION.minor}"
|
||||||
kwargs["build"] = get_build_hash()
|
kwargs["build"] = get_build_hash()
|
||||||
kwargs["url_kwargs"] = self.kwargs
|
kwargs["url_kwargs"] = self.kwargs
|
||||||
|
kwargs["base_url"] = self.request.build_absolute_uri(CONFIG.get("web.path", "/"))
|
||||||
return super().get_context_data(**kwargs)
|
return super().get_context_data(**kwargs)
|
||||||
|
|
||||||
|
|
||||||
|
@ -85,5 +85,5 @@ def certificate_discovery(self: SystemTask):
|
|||||||
if dirty:
|
if dirty:
|
||||||
cert.save()
|
cert.save()
|
||||||
self.set_status(
|
self.set_status(
|
||||||
TaskStatus.SUCCESSFUL, _("Successfully imported %(count)d files." % {"count": discovered})
|
TaskStatus.SUCCESSFUL, _("Successfully imported {count} files.".format(count=discovered))
|
||||||
)
|
)
|
||||||
|
@ -6,8 +6,8 @@
|
|||||||
<script src="{% versioned_script 'dist/enterprise/rac/index-%v.js' %}" type="module"></script>
|
<script src="{% versioned_script 'dist/enterprise/rac/index-%v.js' %}" type="module"></script>
|
||||||
<meta name="theme-color" content="#18191a" media="(prefers-color-scheme: dark)">
|
<meta name="theme-color" content="#18191a" media="(prefers-color-scheme: dark)">
|
||||||
<meta name="theme-color" content="#ffffff" media="(prefers-color-scheme: light)">
|
<meta name="theme-color" content="#ffffff" media="(prefers-color-scheme: light)">
|
||||||
<link rel="icon" href="{{ tenant.branding_favicon }}">
|
<link rel="icon" href="{{ tenant.branding_favicon_url }}">
|
||||||
<link rel="shortcut icon" href="{{ tenant.branding_favicon }}">
|
<link rel="shortcut icon" href="{{ tenant.branding_favicon_url }}">
|
||||||
{% include "base/header_js.html" %}
|
{% include "base/header_js.html" %}
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
|
||||||
|
@ -14,6 +14,7 @@ from structlog.stdlib import get_logger
|
|||||||
from authentik.core.models import Token
|
from authentik.core.models import Token
|
||||||
from authentik.core.types import UserSettingSerializer
|
from authentik.core.types import UserSettingSerializer
|
||||||
from authentik.flows.challenge import FlowLayout
|
from authentik.flows.challenge import FlowLayout
|
||||||
|
from authentik.lib.config import CONFIG
|
||||||
from authentik.lib.models import InheritanceForeignKey, SerializerModel
|
from authentik.lib.models import InheritanceForeignKey, SerializerModel
|
||||||
from authentik.lib.utils.reflection import class_to_path
|
from authentik.lib.utils.reflection import class_to_path
|
||||||
from authentik.policies.models import PolicyBindingModel
|
from authentik.policies.models import PolicyBindingModel
|
||||||
@ -177,9 +178,13 @@ class Flow(SerializerModel, PolicyBindingModel):
|
|||||||
"""Get the URL to the background image. If the name is /static or starts with http
|
"""Get the URL to the background image. If the name is /static or starts with http
|
||||||
it is returned as-is"""
|
it is returned as-is"""
|
||||||
if not self.background:
|
if not self.background:
|
||||||
return "/static/dist/assets/images/flow_background.jpg"
|
return (
|
||||||
if self.background.name.startswith("http") or self.background.name.startswith("/static"):
|
CONFIG.get("web.path", "/")[:-1] + "/static/dist/assets/images/flow_background.jpg"
|
||||||
|
)
|
||||||
|
if self.background.name.startswith("http"):
|
||||||
return self.background.name
|
return self.background.name
|
||||||
|
if self.background.name.startswith("/static"):
|
||||||
|
return CONFIG.get("web.path", "/")[:-1] + self.background.name
|
||||||
return self.background.url
|
return self.background.url
|
||||||
|
|
||||||
stages = models.ManyToManyField(Stage, through="FlowStageBinding", blank=True)
|
stages = models.ManyToManyField(Stage, through="FlowStageBinding", blank=True)
|
||||||
|
@ -9,8 +9,8 @@
|
|||||||
<meta charset="UTF-8">
|
<meta charset="UTF-8">
|
||||||
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1">
|
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1">
|
||||||
<title>{% block title %}{% trans title|default:brand.branding_title %}{% endblock %}</title>
|
<title>{% block title %}{% trans title|default:brand.branding_title %}{% endblock %}</title>
|
||||||
<link rel="icon" href="{{ brand.branding_favicon }}">
|
<link rel="icon" href="{{ brand.branding_favicon_url }}">
|
||||||
<link rel="shortcut icon" href="{{ brand.branding_favicon }}">
|
<link rel="shortcut icon" href="{{ brand.branding_favicon_url }}">
|
||||||
{% block head_before %}
|
{% block head_before %}
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
<link rel="stylesheet" type="text/css" href="{% static 'dist/sfe/bootstrap.min.css' %}">
|
<link rel="stylesheet" type="text/css" href="{% static 'dist/sfe/bootstrap.min.css' %}">
|
||||||
|
@ -135,6 +135,7 @@ web:
|
|||||||
# No default here as it's set dynamically
|
# No default here as it's set dynamically
|
||||||
# workers: 2
|
# workers: 2
|
||||||
threads: 4
|
threads: 4
|
||||||
|
path: /
|
||||||
|
|
||||||
worker:
|
worker:
|
||||||
concurrency: 2
|
concurrency: 2
|
||||||
|
@ -36,6 +36,7 @@ from authentik.lib.utils.http import authentik_user_agent
|
|||||||
from authentik.lib.utils.reflection import get_env
|
from authentik.lib.utils.reflection import get_env
|
||||||
|
|
||||||
LOGGER = get_logger()
|
LOGGER = get_logger()
|
||||||
|
_root_path = CONFIG.get("web.path", "/")
|
||||||
|
|
||||||
|
|
||||||
class SentryIgnoredException(Exception):
|
class SentryIgnoredException(Exception):
|
||||||
@ -90,7 +91,7 @@ def traces_sampler(sampling_context: dict) -> float:
|
|||||||
path = sampling_context.get("asgi_scope", {}).get("path", "")
|
path = sampling_context.get("asgi_scope", {}).get("path", "")
|
||||||
_type = sampling_context.get("asgi_scope", {}).get("type", "")
|
_type = sampling_context.get("asgi_scope", {}).get("type", "")
|
||||||
# Ignore all healthcheck routes
|
# Ignore all healthcheck routes
|
||||||
if path.startswith("/-/health") or path.startswith("/-/metrics"):
|
if path.startswith(f"{_root_path}-/health") or path.startswith(f"{_root_path}-/metrics"):
|
||||||
return 0
|
return 0
|
||||||
if _type == "websocket":
|
if _type == "websocket":
|
||||||
return 0
|
return 0
|
||||||
|
@ -82,7 +82,7 @@ class SyncTasks:
|
|||||||
return
|
return
|
||||||
try:
|
try:
|
||||||
for page in users_paginator.page_range:
|
for page in users_paginator.page_range:
|
||||||
messages.append(_("Syncing page %(page)d of users" % {"page": page}))
|
messages.append(_("Syncing page {page} of users".format(page=page)))
|
||||||
for msg in sync_objects.apply_async(
|
for msg in sync_objects.apply_async(
|
||||||
args=(class_to_path(User), page, provider_pk),
|
args=(class_to_path(User), page, provider_pk),
|
||||||
time_limit=PAGE_TIMEOUT,
|
time_limit=PAGE_TIMEOUT,
|
||||||
@ -90,7 +90,7 @@ class SyncTasks:
|
|||||||
).get():
|
).get():
|
||||||
messages.append(LogEvent(**msg))
|
messages.append(LogEvent(**msg))
|
||||||
for page in groups_paginator.page_range:
|
for page in groups_paginator.page_range:
|
||||||
messages.append(_("Syncing page %(page)d of groups" % {"page": page}))
|
messages.append(_("Syncing page {page} of groups".format(page=page)))
|
||||||
for msg in sync_objects.apply_async(
|
for msg in sync_objects.apply_async(
|
||||||
args=(class_to_path(Group), page, provider_pk),
|
args=(class_to_path(Group), page, provider_pk),
|
||||||
time_limit=PAGE_TIMEOUT,
|
time_limit=PAGE_TIMEOUT,
|
||||||
|
@ -43,8 +43,9 @@ class PasswordExpiryPolicy(Policy):
|
|||||||
request.user.set_unusable_password()
|
request.user.set_unusable_password()
|
||||||
request.user.save()
|
request.user.save()
|
||||||
message = _(
|
message = _(
|
||||||
"Password expired %(days)d days ago. Please update your password."
|
"Password expired {days} days ago. Please update your password.".format(
|
||||||
% {"days": days_since_expiry}
|
days=days_since_expiry
|
||||||
|
)
|
||||||
)
|
)
|
||||||
return PolicyResult(False, message)
|
return PolicyResult(False, message)
|
||||||
return PolicyResult(False, _("Password has expired."))
|
return PolicyResult(False, _("Password has expired."))
|
||||||
|
@ -135,7 +135,7 @@ class PasswordPolicy(Policy):
|
|||||||
LOGGER.debug("got hibp result", count=final_count, hash=pw_hash[:5])
|
LOGGER.debug("got hibp result", count=final_count, hash=pw_hash[:5])
|
||||||
if final_count > self.hibp_allowed_count:
|
if final_count > self.hibp_allowed_count:
|
||||||
LOGGER.debug("password failed", check="hibp", count=final_count)
|
LOGGER.debug("password failed", check="hibp", count=final_count)
|
||||||
message = _("Password exists on %(count)d online lists." % {"count": final_count})
|
message = _("Password exists on {count} online lists.".format(count=final_count))
|
||||||
return PolicyResult(False, message)
|
return PolicyResult(False, message)
|
||||||
return PolicyResult(True)
|
return PolicyResult(True)
|
||||||
|
|
||||||
|
@ -73,7 +73,8 @@ class OAuth2ProviderSerializer(ProviderSerializer):
|
|||||||
"sub_mode",
|
"sub_mode",
|
||||||
"property_mappings",
|
"property_mappings",
|
||||||
"issuer_mode",
|
"issuer_mode",
|
||||||
"jwks_sources",
|
"jwt_federation_sources",
|
||||||
|
"jwt_federation_providers",
|
||||||
]
|
]
|
||||||
extra_kwargs = ProviderSerializer.Meta.extra_kwargs
|
extra_kwargs = ProviderSerializer.Meta.extra_kwargs
|
||||||
|
|
||||||
|
@ -0,0 +1,25 @@
|
|||||||
|
# Generated by Django 5.0.9 on 2024-11-22 14:25
|
||||||
|
|
||||||
|
from django.db import migrations, models
|
||||||
|
|
||||||
|
|
||||||
|
class Migration(migrations.Migration):
|
||||||
|
|
||||||
|
dependencies = [
|
||||||
|
("authentik_providers_oauth2", "0024_remove_oauth2provider_redirect_uris_and_more"),
|
||||||
|
]
|
||||||
|
|
||||||
|
operations = [
|
||||||
|
migrations.RenameField(
|
||||||
|
model_name="oauth2provider",
|
||||||
|
old_name="jwks_sources",
|
||||||
|
new_name="jwt_federation_sources",
|
||||||
|
),
|
||||||
|
migrations.AddField(
|
||||||
|
model_name="oauth2provider",
|
||||||
|
name="jwt_federation_providers",
|
||||||
|
field=models.ManyToManyField(
|
||||||
|
blank=True, default=None, to="authentik_providers_oauth2.oauth2provider"
|
||||||
|
),
|
||||||
|
),
|
||||||
|
]
|
@ -244,7 +244,7 @@ class OAuth2Provider(WebfingerProvider, Provider):
|
|||||||
related_name="oauth2provider_encryption_key_set",
|
related_name="oauth2provider_encryption_key_set",
|
||||||
)
|
)
|
||||||
|
|
||||||
jwks_sources = models.ManyToManyField(
|
jwt_federation_sources = models.ManyToManyField(
|
||||||
OAuthSource,
|
OAuthSource,
|
||||||
verbose_name=_(
|
verbose_name=_(
|
||||||
"Any JWT signed by the JWK of the selected source can be used to authenticate."
|
"Any JWT signed by the JWK of the selected source can be used to authenticate."
|
||||||
@ -253,6 +253,7 @@ class OAuth2Provider(WebfingerProvider, Provider):
|
|||||||
default=None,
|
default=None,
|
||||||
blank=True,
|
blank=True,
|
||||||
)
|
)
|
||||||
|
jwt_federation_providers = models.ManyToManyField("OAuth2Provider", blank=True, default=None)
|
||||||
|
|
||||||
@cached_property
|
@cached_property
|
||||||
def jwt_key(self) -> tuple[str | PrivateKeyTypes, str]:
|
def jwt_key(self) -> tuple[str | PrivateKeyTypes, str]:
|
||||||
|
228
authentik/providers/oauth2/tests/test_token_cc_jwt_provider.py
Normal file
228
authentik/providers/oauth2/tests/test_token_cc_jwt_provider.py
Normal file
@ -0,0 +1,228 @@
|
|||||||
|
"""Test token view"""
|
||||||
|
|
||||||
|
from datetime import datetime, timedelta
|
||||||
|
from json import loads
|
||||||
|
|
||||||
|
from django.test import RequestFactory
|
||||||
|
from django.urls import reverse
|
||||||
|
from django.utils.timezone import now
|
||||||
|
from jwt import decode
|
||||||
|
|
||||||
|
from authentik.blueprints.tests import apply_blueprint
|
||||||
|
from authentik.core.models import Application, Group
|
||||||
|
from authentik.core.tests.utils import create_test_cert, create_test_flow, create_test_user
|
||||||
|
from authentik.lib.generators import generate_id
|
||||||
|
from authentik.policies.models import PolicyBinding
|
||||||
|
from authentik.providers.oauth2.constants import (
|
||||||
|
GRANT_TYPE_CLIENT_CREDENTIALS,
|
||||||
|
SCOPE_OPENID,
|
||||||
|
SCOPE_OPENID_EMAIL,
|
||||||
|
SCOPE_OPENID_PROFILE,
|
||||||
|
TOKEN_TYPE,
|
||||||
|
)
|
||||||
|
from authentik.providers.oauth2.models import (
|
||||||
|
AccessToken,
|
||||||
|
OAuth2Provider,
|
||||||
|
RedirectURI,
|
||||||
|
RedirectURIMatchingMode,
|
||||||
|
ScopeMapping,
|
||||||
|
)
|
||||||
|
from authentik.providers.oauth2.tests.utils import OAuthTestCase
|
||||||
|
|
||||||
|
|
||||||
|
class TestTokenClientCredentialsJWTProvider(OAuthTestCase):
|
||||||
|
"""Test token (client_credentials, with JWT) view"""
|
||||||
|
|
||||||
|
@apply_blueprint("system/providers-oauth2.yaml")
|
||||||
|
def setUp(self) -> None:
|
||||||
|
super().setUp()
|
||||||
|
self.factory = RequestFactory()
|
||||||
|
self.other_cert = create_test_cert()
|
||||||
|
self.cert = create_test_cert()
|
||||||
|
|
||||||
|
self.other_provider = OAuth2Provider.objects.create(
|
||||||
|
name=generate_id(),
|
||||||
|
authorization_flow=create_test_flow(),
|
||||||
|
signing_key=self.other_cert,
|
||||||
|
)
|
||||||
|
self.other_provider.property_mappings.set(ScopeMapping.objects.all())
|
||||||
|
self.app = Application.objects.create(
|
||||||
|
name=generate_id(), slug=generate_id(), provider=self.other_provider
|
||||||
|
)
|
||||||
|
|
||||||
|
self.provider: OAuth2Provider = OAuth2Provider.objects.create(
|
||||||
|
name="test",
|
||||||
|
authorization_flow=create_test_flow(),
|
||||||
|
redirect_uris=[RedirectURI(RedirectURIMatchingMode.STRICT, "http://testserver")],
|
||||||
|
signing_key=self.cert,
|
||||||
|
)
|
||||||
|
self.provider.jwt_federation_providers.add(self.other_provider)
|
||||||
|
self.provider.property_mappings.set(ScopeMapping.objects.all())
|
||||||
|
self.app = Application.objects.create(name="test", slug="test", provider=self.provider)
|
||||||
|
|
||||||
|
def test_invalid_type(self):
|
||||||
|
"""test invalid type"""
|
||||||
|
response = self.client.post(
|
||||||
|
reverse("authentik_providers_oauth2:token"),
|
||||||
|
{
|
||||||
|
"grant_type": GRANT_TYPE_CLIENT_CREDENTIALS,
|
||||||
|
"scope": f"{SCOPE_OPENID} {SCOPE_OPENID_EMAIL} {SCOPE_OPENID_PROFILE}",
|
||||||
|
"client_id": self.provider.client_id,
|
||||||
|
"client_assertion_type": "foo",
|
||||||
|
"client_assertion": "foo.bar",
|
||||||
|
},
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 400)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertEqual(body["error"], "invalid_grant")
|
||||||
|
|
||||||
|
def test_invalid_jwt(self):
|
||||||
|
"""test invalid JWT"""
|
||||||
|
response = self.client.post(
|
||||||
|
reverse("authentik_providers_oauth2:token"),
|
||||||
|
{
|
||||||
|
"grant_type": GRANT_TYPE_CLIENT_CREDENTIALS,
|
||||||
|
"scope": f"{SCOPE_OPENID} {SCOPE_OPENID_EMAIL} {SCOPE_OPENID_PROFILE}",
|
||||||
|
"client_id": self.provider.client_id,
|
||||||
|
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
|
||||||
|
"client_assertion": "foo.bar",
|
||||||
|
},
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 400)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertEqual(body["error"], "invalid_grant")
|
||||||
|
|
||||||
|
def test_invalid_signature(self):
|
||||||
|
"""test invalid JWT"""
|
||||||
|
token = self.provider.encode(
|
||||||
|
{
|
||||||
|
"sub": "foo",
|
||||||
|
"exp": datetime.now() + timedelta(hours=2),
|
||||||
|
}
|
||||||
|
)
|
||||||
|
response = self.client.post(
|
||||||
|
reverse("authentik_providers_oauth2:token"),
|
||||||
|
{
|
||||||
|
"grant_type": GRANT_TYPE_CLIENT_CREDENTIALS,
|
||||||
|
"scope": f"{SCOPE_OPENID} {SCOPE_OPENID_EMAIL} {SCOPE_OPENID_PROFILE}",
|
||||||
|
"client_id": self.provider.client_id,
|
||||||
|
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
|
||||||
|
"client_assertion": token + "foo",
|
||||||
|
},
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 400)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertEqual(body["error"], "invalid_grant")
|
||||||
|
|
||||||
|
def test_invalid_expired(self):
|
||||||
|
"""test invalid JWT"""
|
||||||
|
token = self.provider.encode(
|
||||||
|
{
|
||||||
|
"sub": "foo",
|
||||||
|
"exp": datetime.now() - timedelta(hours=2),
|
||||||
|
}
|
||||||
|
)
|
||||||
|
response = self.client.post(
|
||||||
|
reverse("authentik_providers_oauth2:token"),
|
||||||
|
{
|
||||||
|
"grant_type": GRANT_TYPE_CLIENT_CREDENTIALS,
|
||||||
|
"scope": f"{SCOPE_OPENID} {SCOPE_OPENID_EMAIL} {SCOPE_OPENID_PROFILE}",
|
||||||
|
"client_id": self.provider.client_id,
|
||||||
|
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
|
||||||
|
"client_assertion": token,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 400)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertEqual(body["error"], "invalid_grant")
|
||||||
|
|
||||||
|
def test_invalid_no_app(self):
|
||||||
|
"""test invalid JWT"""
|
||||||
|
self.app.provider = None
|
||||||
|
self.app.save()
|
||||||
|
token = self.provider.encode(
|
||||||
|
{
|
||||||
|
"sub": "foo",
|
||||||
|
"exp": datetime.now() + timedelta(hours=2),
|
||||||
|
}
|
||||||
|
)
|
||||||
|
response = self.client.post(
|
||||||
|
reverse("authentik_providers_oauth2:token"),
|
||||||
|
{
|
||||||
|
"grant_type": GRANT_TYPE_CLIENT_CREDENTIALS,
|
||||||
|
"scope": f"{SCOPE_OPENID} {SCOPE_OPENID_EMAIL} {SCOPE_OPENID_PROFILE}",
|
||||||
|
"client_id": self.provider.client_id,
|
||||||
|
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
|
||||||
|
"client_assertion": token,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 400)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertEqual(body["error"], "invalid_grant")
|
||||||
|
|
||||||
|
def test_invalid_access_denied(self):
|
||||||
|
"""test invalid JWT"""
|
||||||
|
group = Group.objects.create(name="foo")
|
||||||
|
PolicyBinding.objects.create(
|
||||||
|
group=group,
|
||||||
|
target=self.app,
|
||||||
|
order=0,
|
||||||
|
)
|
||||||
|
token = self.provider.encode(
|
||||||
|
{
|
||||||
|
"sub": "foo",
|
||||||
|
"exp": datetime.now() + timedelta(hours=2),
|
||||||
|
}
|
||||||
|
)
|
||||||
|
response = self.client.post(
|
||||||
|
reverse("authentik_providers_oauth2:token"),
|
||||||
|
{
|
||||||
|
"grant_type": GRANT_TYPE_CLIENT_CREDENTIALS,
|
||||||
|
"scope": f"{SCOPE_OPENID} {SCOPE_OPENID_EMAIL} {SCOPE_OPENID_PROFILE}",
|
||||||
|
"client_id": self.provider.client_id,
|
||||||
|
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
|
||||||
|
"client_assertion": token,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 400)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertEqual(body["error"], "invalid_grant")
|
||||||
|
|
||||||
|
def test_successful(self):
|
||||||
|
"""test successful"""
|
||||||
|
user = create_test_user()
|
||||||
|
token = self.other_provider.encode(
|
||||||
|
{
|
||||||
|
"sub": "foo",
|
||||||
|
"exp": datetime.now() + timedelta(hours=2),
|
||||||
|
}
|
||||||
|
)
|
||||||
|
AccessToken.objects.create(
|
||||||
|
provider=self.other_provider,
|
||||||
|
token=token,
|
||||||
|
user=user,
|
||||||
|
auth_time=now(),
|
||||||
|
)
|
||||||
|
|
||||||
|
response = self.client.post(
|
||||||
|
reverse("authentik_providers_oauth2:token"),
|
||||||
|
{
|
||||||
|
"grant_type": GRANT_TYPE_CLIENT_CREDENTIALS,
|
||||||
|
"scope": f"{SCOPE_OPENID} {SCOPE_OPENID_EMAIL} {SCOPE_OPENID_PROFILE}",
|
||||||
|
"client_id": self.provider.client_id,
|
||||||
|
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
|
||||||
|
"client_assertion": token,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
self.assertEqual(response.status_code, 200)
|
||||||
|
body = loads(response.content.decode())
|
||||||
|
self.assertEqual(body["token_type"], TOKEN_TYPE)
|
||||||
|
_, alg = self.provider.jwt_key
|
||||||
|
jwt = decode(
|
||||||
|
body["access_token"],
|
||||||
|
key=self.provider.signing_key.public_key,
|
||||||
|
algorithms=[alg],
|
||||||
|
audience=self.provider.client_id,
|
||||||
|
)
|
||||||
|
self.assertEqual(jwt["given_name"], user.name)
|
||||||
|
self.assertEqual(jwt["preferred_username"], user.username)
|
@ -37,9 +37,16 @@ class TestTokenClientCredentialsJWTSource(OAuthTestCase):
|
|||||||
def setUp(self) -> None:
|
def setUp(self) -> None:
|
||||||
super().setUp()
|
super().setUp()
|
||||||
self.factory = RequestFactory()
|
self.factory = RequestFactory()
|
||||||
|
self.other_cert = create_test_cert()
|
||||||
|
# Provider used as a helper to sign JWTs with the same key as the OAuth source has
|
||||||
|
self.helper_provider = OAuth2Provider.objects.create(
|
||||||
|
name=generate_id(),
|
||||||
|
authorization_flow=create_test_flow(),
|
||||||
|
signing_key=self.other_cert,
|
||||||
|
)
|
||||||
self.cert = create_test_cert()
|
self.cert = create_test_cert()
|
||||||
|
|
||||||
jwk = JWKSView().get_jwk_for_key(self.cert, "sig")
|
jwk = JWKSView().get_jwk_for_key(self.other_cert, "sig")
|
||||||
self.source: OAuthSource = OAuthSource.objects.create(
|
self.source: OAuthSource = OAuthSource.objects.create(
|
||||||
name=generate_id(),
|
name=generate_id(),
|
||||||
slug=generate_id(),
|
slug=generate_id(),
|
||||||
@ -62,7 +69,7 @@ class TestTokenClientCredentialsJWTSource(OAuthTestCase):
|
|||||||
redirect_uris=[RedirectURI(RedirectURIMatchingMode.STRICT, "http://testserver")],
|
redirect_uris=[RedirectURI(RedirectURIMatchingMode.STRICT, "http://testserver")],
|
||||||
signing_key=self.cert,
|
signing_key=self.cert,
|
||||||
)
|
)
|
||||||
self.provider.jwks_sources.add(self.source)
|
self.provider.jwt_federation_sources.add(self.source)
|
||||||
self.provider.property_mappings.set(ScopeMapping.objects.all())
|
self.provider.property_mappings.set(ScopeMapping.objects.all())
|
||||||
self.app = Application.objects.create(name="test", slug="test", provider=self.provider)
|
self.app = Application.objects.create(name="test", slug="test", provider=self.provider)
|
||||||
|
|
||||||
@ -100,7 +107,7 @@ class TestTokenClientCredentialsJWTSource(OAuthTestCase):
|
|||||||
|
|
||||||
def test_invalid_signature(self):
|
def test_invalid_signature(self):
|
||||||
"""test invalid JWT"""
|
"""test invalid JWT"""
|
||||||
token = self.provider.encode(
|
token = self.helper_provider.encode(
|
||||||
{
|
{
|
||||||
"sub": "foo",
|
"sub": "foo",
|
||||||
"exp": datetime.now() + timedelta(hours=2),
|
"exp": datetime.now() + timedelta(hours=2),
|
||||||
@ -122,7 +129,7 @@ class TestTokenClientCredentialsJWTSource(OAuthTestCase):
|
|||||||
|
|
||||||
def test_invalid_expired(self):
|
def test_invalid_expired(self):
|
||||||
"""test invalid JWT"""
|
"""test invalid JWT"""
|
||||||
token = self.provider.encode(
|
token = self.helper_provider.encode(
|
||||||
{
|
{
|
||||||
"sub": "foo",
|
"sub": "foo",
|
||||||
"exp": datetime.now() - timedelta(hours=2),
|
"exp": datetime.now() - timedelta(hours=2),
|
||||||
@ -146,7 +153,7 @@ class TestTokenClientCredentialsJWTSource(OAuthTestCase):
|
|||||||
"""test invalid JWT"""
|
"""test invalid JWT"""
|
||||||
self.app.provider = None
|
self.app.provider = None
|
||||||
self.app.save()
|
self.app.save()
|
||||||
token = self.provider.encode(
|
token = self.helper_provider.encode(
|
||||||
{
|
{
|
||||||
"sub": "foo",
|
"sub": "foo",
|
||||||
"exp": datetime.now() + timedelta(hours=2),
|
"exp": datetime.now() + timedelta(hours=2),
|
||||||
@ -174,7 +181,7 @@ class TestTokenClientCredentialsJWTSource(OAuthTestCase):
|
|||||||
target=self.app,
|
target=self.app,
|
||||||
order=0,
|
order=0,
|
||||||
)
|
)
|
||||||
token = self.provider.encode(
|
token = self.helper_provider.encode(
|
||||||
{
|
{
|
||||||
"sub": "foo",
|
"sub": "foo",
|
||||||
"exp": datetime.now() + timedelta(hours=2),
|
"exp": datetime.now() + timedelta(hours=2),
|
||||||
@ -196,7 +203,7 @@ class TestTokenClientCredentialsJWTSource(OAuthTestCase):
|
|||||||
|
|
||||||
def test_successful(self):
|
def test_successful(self):
|
||||||
"""test successful"""
|
"""test successful"""
|
||||||
token = self.provider.encode(
|
token = self.helper_provider.encode(
|
||||||
{
|
{
|
||||||
"sub": "foo",
|
"sub": "foo",
|
||||||
"exp": datetime.now() + timedelta(hours=2),
|
"exp": datetime.now() + timedelta(hours=2),
|
||||||
|
@ -137,7 +137,7 @@ class OAuthDeviceCodeChallengeResponse(ChallengeResponse):
|
|||||||
|
|
||||||
|
|
||||||
class OAuthDeviceCodeStage(ChallengeStageView):
|
class OAuthDeviceCodeStage(ChallengeStageView):
|
||||||
"""Flow challenge for users to enter device codes"""
|
"""Flow challenge for users to enter device code"""
|
||||||
|
|
||||||
response_class = OAuthDeviceCodeChallengeResponse
|
response_class = OAuthDeviceCodeChallengeResponse
|
||||||
|
|
||||||
|
@ -362,23 +362,9 @@ class TokenParams:
|
|||||||
},
|
},
|
||||||
).from_http(request, user=user)
|
).from_http(request, user=user)
|
||||||
|
|
||||||
def __post_init_client_credentials_jwt(self, request: HttpRequest):
|
def __validate_jwt_from_source(
|
||||||
assertion_type = request.POST.get(CLIENT_ASSERTION_TYPE, "")
|
self, assertion: str
|
||||||
if assertion_type != CLIENT_ASSERTION_TYPE_JWT:
|
) -> tuple[dict, OAuthSource] | tuple[None, None]:
|
||||||
LOGGER.warning("Invalid assertion type", assertion_type=assertion_type)
|
|
||||||
raise TokenError("invalid_grant")
|
|
||||||
|
|
||||||
client_secret = request.POST.get("client_secret", None)
|
|
||||||
assertion = request.POST.get(CLIENT_ASSERTION, client_secret)
|
|
||||||
if not assertion:
|
|
||||||
LOGGER.warning("Missing client assertion")
|
|
||||||
raise TokenError("invalid_grant")
|
|
||||||
|
|
||||||
token = None
|
|
||||||
|
|
||||||
source: OAuthSource | None = None
|
|
||||||
parsed_key: PyJWK | None = None
|
|
||||||
|
|
||||||
# Fully decode the JWT without verifying the signature, so we can get access to
|
# Fully decode the JWT without verifying the signature, so we can get access to
|
||||||
# the header.
|
# the header.
|
||||||
# Get the Key ID from the header, and use that to optimise our source query to only find
|
# Get the Key ID from the header, and use that to optimise our source query to only find
|
||||||
@ -393,19 +379,23 @@ class TokenParams:
|
|||||||
LOGGER.warning("failed to parse JWT for kid lookup", exc=exc)
|
LOGGER.warning("failed to parse JWT for kid lookup", exc=exc)
|
||||||
raise TokenError("invalid_grant") from None
|
raise TokenError("invalid_grant") from None
|
||||||
expected_kid = decode_unvalidated["header"]["kid"]
|
expected_kid = decode_unvalidated["header"]["kid"]
|
||||||
for source in self.provider.jwks_sources.filter(
|
fallback_alg = decode_unvalidated["header"]["alg"]
|
||||||
|
token = source = None
|
||||||
|
for source in self.provider.jwt_federation_sources.filter(
|
||||||
oidc_jwks__keys__contains=[{"kid": expected_kid}]
|
oidc_jwks__keys__contains=[{"kid": expected_kid}]
|
||||||
):
|
):
|
||||||
LOGGER.debug("verifying JWT with source", source=source.slug)
|
LOGGER.debug("verifying JWT with source", source=source.slug)
|
||||||
keys = source.oidc_jwks.get("keys", [])
|
keys = source.oidc_jwks.get("keys", [])
|
||||||
for key in keys:
|
for key in keys:
|
||||||
|
if key.get("kid") and key.get("kid") != expected_kid:
|
||||||
|
continue
|
||||||
LOGGER.debug("verifying JWT with key", source=source.slug, key=key.get("kid"))
|
LOGGER.debug("verifying JWT with key", source=source.slug, key=key.get("kid"))
|
||||||
try:
|
try:
|
||||||
parsed_key = PyJWK.from_dict(key)
|
parsed_key = PyJWK.from_dict(key).key
|
||||||
token = decode(
|
token = decode(
|
||||||
assertion,
|
assertion,
|
||||||
parsed_key.key,
|
parsed_key,
|
||||||
algorithms=[key.get("alg")],
|
algorithms=[key.get("alg")] if "alg" in key else [fallback_alg],
|
||||||
options={
|
options={
|
||||||
"verify_aud": False,
|
"verify_aud": False,
|
||||||
},
|
},
|
||||||
@ -414,13 +404,61 @@ class TokenParams:
|
|||||||
# and not a public key
|
# and not a public key
|
||||||
except (PyJWTError, ValueError, TypeError, AttributeError) as exc:
|
except (PyJWTError, ValueError, TypeError, AttributeError) as exc:
|
||||||
LOGGER.warning("failed to verify JWT", exc=exc, source=source.slug)
|
LOGGER.warning("failed to verify JWT", exc=exc, source=source.slug)
|
||||||
|
if token:
|
||||||
|
LOGGER.info("successfully verified JWT with source", source=source.slug)
|
||||||
|
return token, source
|
||||||
|
|
||||||
|
def __validate_jwt_from_provider(
|
||||||
|
self, assertion: str
|
||||||
|
) -> tuple[dict, OAuth2Provider] | tuple[None, None]:
|
||||||
|
token = provider = _key = None
|
||||||
|
federated_token = AccessToken.objects.filter(
|
||||||
|
token=assertion, provider__in=self.provider.jwt_federation_providers.all()
|
||||||
|
).first()
|
||||||
|
if federated_token:
|
||||||
|
_key, _alg = federated_token.provider.jwt_key
|
||||||
|
try:
|
||||||
|
token = decode(
|
||||||
|
assertion,
|
||||||
|
_key.public_key(),
|
||||||
|
algorithms=[_alg],
|
||||||
|
options={
|
||||||
|
"verify_aud": False,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
provider = federated_token.provider
|
||||||
|
self.user = federated_token.user
|
||||||
|
except (PyJWTError, ValueError, TypeError, AttributeError) as exc:
|
||||||
|
LOGGER.warning(
|
||||||
|
"failed to verify JWT", exc=exc, provider=federated_token.provider.name
|
||||||
|
)
|
||||||
|
|
||||||
|
if token:
|
||||||
|
LOGGER.info("successfully verified JWT with provider", provider=provider.name)
|
||||||
|
return token, provider
|
||||||
|
|
||||||
|
def __post_init_client_credentials_jwt(self, request: HttpRequest):
|
||||||
|
assertion_type = request.POST.get(CLIENT_ASSERTION_TYPE, "")
|
||||||
|
if assertion_type != CLIENT_ASSERTION_TYPE_JWT:
|
||||||
|
LOGGER.warning("Invalid assertion type", assertion_type=assertion_type)
|
||||||
|
raise TokenError("invalid_grant")
|
||||||
|
|
||||||
|
client_secret = request.POST.get("client_secret", None)
|
||||||
|
assertion = request.POST.get(CLIENT_ASSERTION, client_secret)
|
||||||
|
if not assertion:
|
||||||
|
LOGGER.warning("Missing client assertion")
|
||||||
|
raise TokenError("invalid_grant")
|
||||||
|
|
||||||
|
source = provider = None
|
||||||
|
|
||||||
|
token, source = self.__validate_jwt_from_source(assertion)
|
||||||
|
if not token:
|
||||||
|
token, provider = self.__validate_jwt_from_provider(assertion)
|
||||||
|
|
||||||
if not token:
|
if not token:
|
||||||
LOGGER.warning("No token could be verified")
|
LOGGER.warning("No token could be verified")
|
||||||
raise TokenError("invalid_grant")
|
raise TokenError("invalid_grant")
|
||||||
|
|
||||||
LOGGER.info("successfully verified JWT with source", source=source.slug)
|
|
||||||
|
|
||||||
if "exp" in token:
|
if "exp" in token:
|
||||||
exp = datetime.fromtimestamp(token["exp"])
|
exp = datetime.fromtimestamp(token["exp"])
|
||||||
# Non-timezone aware check since we assume `exp` is in UTC
|
# Non-timezone aware check since we assume `exp` is in UTC
|
||||||
@ -434,15 +472,16 @@ class TokenParams:
|
|||||||
raise TokenError("invalid_grant")
|
raise TokenError("invalid_grant")
|
||||||
|
|
||||||
self.__check_policy_access(app, request, oauth_jwt=token)
|
self.__check_policy_access(app, request, oauth_jwt=token)
|
||||||
self.__create_user_from_jwt(token, app, source)
|
if not provider:
|
||||||
|
self.__create_user_from_jwt(token, app, source)
|
||||||
|
|
||||||
method_args = {
|
method_args = {
|
||||||
"jwt": token,
|
"jwt": token,
|
||||||
}
|
}
|
||||||
if source:
|
if source:
|
||||||
method_args["source"] = source
|
method_args["source"] = source
|
||||||
if parsed_key:
|
if provider:
|
||||||
method_args["jwk_id"] = parsed_key.key_id
|
method_args["provider"] = provider
|
||||||
Event.new(
|
Event.new(
|
||||||
action=EventAction.LOGIN,
|
action=EventAction.LOGIN,
|
||||||
**{
|
**{
|
||||||
|
@ -94,7 +94,8 @@ class ProxyProviderSerializer(ProviderSerializer):
|
|||||||
"intercept_header_auth",
|
"intercept_header_auth",
|
||||||
"redirect_uris",
|
"redirect_uris",
|
||||||
"cookie_domain",
|
"cookie_domain",
|
||||||
"jwks_sources",
|
"jwt_federation_sources",
|
||||||
|
"jwt_federation_providers",
|
||||||
"access_token_validity",
|
"access_token_validity",
|
||||||
"refresh_token_validity",
|
"refresh_token_validity",
|
||||||
"outpost_set",
|
"outpost_set",
|
||||||
|
@ -32,6 +32,8 @@ LOGIN_URL = "authentik_flows:default-authentication"
|
|||||||
# Custom user model
|
# Custom user model
|
||||||
AUTH_USER_MODEL = "authentik_core.User"
|
AUTH_USER_MODEL = "authentik_core.User"
|
||||||
|
|
||||||
|
CSRF_COOKIE_PATH = LANGUAGE_COOKIE_PATH = SESSION_COOKIE_PATH = CONFIG.get("web.path", "/")
|
||||||
|
|
||||||
CSRF_COOKIE_NAME = "authentik_csrf"
|
CSRF_COOKIE_NAME = "authentik_csrf"
|
||||||
CSRF_HEADER_NAME = "HTTP_X_AUTHENTIK_CSRF"
|
CSRF_HEADER_NAME = "HTTP_X_AUTHENTIK_CSRF"
|
||||||
LANGUAGE_COOKIE_NAME = "authentik_language"
|
LANGUAGE_COOKIE_NAME = "authentik_language"
|
||||||
@ -304,10 +306,12 @@ DATABASES = {
|
|||||||
"USER": CONFIG.get("postgresql.user"),
|
"USER": CONFIG.get("postgresql.user"),
|
||||||
"PASSWORD": CONFIG.get("postgresql.password"),
|
"PASSWORD": CONFIG.get("postgresql.password"),
|
||||||
"PORT": CONFIG.get("postgresql.port"),
|
"PORT": CONFIG.get("postgresql.port"),
|
||||||
"SSLMODE": CONFIG.get("postgresql.sslmode"),
|
"OPTIONS": {
|
||||||
"SSLROOTCERT": CONFIG.get("postgresql.sslrootcert"),
|
"sslmode": CONFIG.get("postgresql.sslmode"),
|
||||||
"SSLCERT": CONFIG.get("postgresql.sslcert"),
|
"sslrootcert": CONFIG.get("postgresql.sslrootcert"),
|
||||||
"SSLKEY": CONFIG.get("postgresql.sslkey"),
|
"sslcert": CONFIG.get("postgresql.sslcert"),
|
||||||
|
"sslkey": CONFIG.get("postgresql.sslkey"),
|
||||||
|
},
|
||||||
"TEST": {
|
"TEST": {
|
||||||
"NAME": CONFIG.get("postgresql.test.name"),
|
"NAME": CONFIG.get("postgresql.test.name"),
|
||||||
},
|
},
|
||||||
@ -425,7 +429,7 @@ if _ERROR_REPORTING:
|
|||||||
# https://docs.djangoproject.com/en/2.1/howto/static-files/
|
# https://docs.djangoproject.com/en/2.1/howto/static-files/
|
||||||
|
|
||||||
STATICFILES_DIRS = [BASE_DIR / Path("web")]
|
STATICFILES_DIRS = [BASE_DIR / Path("web")]
|
||||||
STATIC_URL = "/static/"
|
STATIC_URL = CONFIG.get("web.path", "/") + "static/"
|
||||||
|
|
||||||
STORAGES = {
|
STORAGES = {
|
||||||
"staticfiles": {
|
"staticfiles": {
|
||||||
|
@ -4,6 +4,7 @@ from django.urls import include, path
|
|||||||
from structlog.stdlib import get_logger
|
from structlog.stdlib import get_logger
|
||||||
|
|
||||||
from authentik.core.views import error
|
from authentik.core.views import error
|
||||||
|
from authentik.lib.config import CONFIG
|
||||||
from authentik.lib.utils.reflection import get_apps
|
from authentik.lib.utils.reflection import get_apps
|
||||||
from authentik.root.monitoring import LiveView, MetricsView, ReadyView
|
from authentik.root.monitoring import LiveView, MetricsView, ReadyView
|
||||||
|
|
||||||
@ -14,7 +15,7 @@ handler403 = error.ForbiddenView.as_view()
|
|||||||
handler404 = error.NotFoundView.as_view()
|
handler404 = error.NotFoundView.as_view()
|
||||||
handler500 = error.ServerErrorView.as_view()
|
handler500 = error.ServerErrorView.as_view()
|
||||||
|
|
||||||
urlpatterns = []
|
_urlpatterns = []
|
||||||
|
|
||||||
for _authentik_app in get_apps():
|
for _authentik_app in get_apps():
|
||||||
mountpoints = None
|
mountpoints = None
|
||||||
@ -35,7 +36,7 @@ for _authentik_app in get_apps():
|
|||||||
namespace=namespace,
|
namespace=namespace,
|
||||||
),
|
),
|
||||||
)
|
)
|
||||||
urlpatterns.append(_path)
|
_urlpatterns.append(_path)
|
||||||
LOGGER.debug(
|
LOGGER.debug(
|
||||||
"Mounted URLs",
|
"Mounted URLs",
|
||||||
app_name=_authentik_app.name,
|
app_name=_authentik_app.name,
|
||||||
@ -43,8 +44,10 @@ for _authentik_app in get_apps():
|
|||||||
namespace=namespace,
|
namespace=namespace,
|
||||||
)
|
)
|
||||||
|
|
||||||
urlpatterns += [
|
_urlpatterns += [
|
||||||
path("-/metrics/", MetricsView.as_view(), name="metrics"),
|
path("-/metrics/", MetricsView.as_view(), name="metrics"),
|
||||||
path("-/health/live/", LiveView.as_view(), name="health-live"),
|
path("-/health/live/", LiveView.as_view(), name="health-live"),
|
||||||
path("-/health/ready/", ReadyView.as_view(), name="health-ready"),
|
path("-/health/ready/", ReadyView.as_view(), name="health-ready"),
|
||||||
]
|
]
|
||||||
|
|
||||||
|
urlpatterns = [path(CONFIG.get("web.path", "/")[1:], include(_urlpatterns))]
|
||||||
|
@ -2,13 +2,16 @@
|
|||||||
|
|
||||||
from importlib import import_module
|
from importlib import import_module
|
||||||
|
|
||||||
|
from channels.routing import URLRouter
|
||||||
|
from django.urls import path
|
||||||
from structlog.stdlib import get_logger
|
from structlog.stdlib import get_logger
|
||||||
|
|
||||||
|
from authentik.lib.config import CONFIG
|
||||||
from authentik.lib.utils.reflection import get_apps
|
from authentik.lib.utils.reflection import get_apps
|
||||||
|
|
||||||
LOGGER = get_logger()
|
LOGGER = get_logger()
|
||||||
|
|
||||||
websocket_urlpatterns = []
|
_websocket_urlpatterns = []
|
||||||
for _authentik_app in get_apps():
|
for _authentik_app in get_apps():
|
||||||
try:
|
try:
|
||||||
api_urls = import_module(f"{_authentik_app.name}.urls")
|
api_urls = import_module(f"{_authentik_app.name}.urls")
|
||||||
@ -17,8 +20,15 @@ for _authentik_app in get_apps():
|
|||||||
if not hasattr(api_urls, "websocket_urlpatterns"):
|
if not hasattr(api_urls, "websocket_urlpatterns"):
|
||||||
continue
|
continue
|
||||||
urls: list = api_urls.websocket_urlpatterns
|
urls: list = api_urls.websocket_urlpatterns
|
||||||
websocket_urlpatterns.extend(urls)
|
_websocket_urlpatterns.extend(urls)
|
||||||
LOGGER.debug(
|
LOGGER.debug(
|
||||||
"Mounted Websocket URLs",
|
"Mounted Websocket URLs",
|
||||||
app_name=_authentik_app.name,
|
app_name=_authentik_app.name,
|
||||||
)
|
)
|
||||||
|
|
||||||
|
websocket_urlpatterns = [
|
||||||
|
path(
|
||||||
|
CONFIG.get("web.path", "/")[1:],
|
||||||
|
URLRouter(_websocket_urlpatterns),
|
||||||
|
),
|
||||||
|
]
|
||||||
|
@ -127,19 +127,19 @@
|
|||||||
"icon_dark":"data:image/svg+xml;base64,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",
|
"icon_dark":"data:image/svg+xml;base64,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",
|
||||||
"icon_light":"data:image/svg+xml;base64,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"
|
"icon_light":"data:image/svg+xml;base64,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"
|
||||||
},
|
},
|
||||||
"b35a26b2-8f6e-4697-ab1d-d44db4da28c6":{
|
"b35a26b2-8f6e-4697-ab1d-d44db4da28c6":{
|
||||||
"name": "Zoho Vault",
|
"name": "Zoho Vault",
|
||||||
"icon_dark": "data:image/svg+xml;base64,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",
|
"icon_dark": "data:image/svg+xml;base64,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",
|
||||||
"icon_light": "data:image/svg+xml;base64,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"
|
"icon_light": "data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz4KPHN2ZyBpZD0iTGF5ZXJfMSIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB2aWV3Qm94PSIwIDAgMzIgMzIiPgogIDxkZWZzPgogICAgPHN0eWxlPgogICAgICAuY2xzLTEgewogICAgICAgIGZpbGw6ICMyMjZlYjM7CiAgICAgIH0KCiAgICAgIC5jbHMtMiB7CiAgICAgICAgZmlsbDogI2ZmZjsKICAgICAgfQoKICAgICAgLmNscy0zIHsKICAgICAgICBvcGFjaXR5OiAuOTsKICAgICAgfQoKICAgICAgLmNscy00IHsKICAgICAgICBmaWxsOiAjZTQyNTI4OwogICAgICB9CiAgICA8L3N0eWxlPgogIDwvZGVmcz4KICA8cGF0aCBjbGFzcz0iY2xzLTIiIGQ9Ik0yNi4xLDMuNjJINS45Yy0xLjI0LDAtMi4yNSwxLjAxLTIuMjUsMi4yNXYxNi45NGMwLDEuMjQsMS4wMSwyLjI1LDIuMjUsMi4yNWguMWMuMy4wNy42Ny4yOS42Ny45MXYyLjExYzAsLjE1LjEyLjI3LjI3LjI3aDIuNzVjLjE1LDAsLjI3LS4xMi4yNy0uMjd2LTEuMjNzLjA3LTEuNTYsMS43NS0xLjc5aDguNThjMS42OC4yMywxLjc1LDEuNzksMS43NSwxLjc5djEuMjNjMCwuMTUuMTIuMjcuMjcuMjdoMi43NWMuMTUsMCwuMjctLjEyLjI3LS4yN3YtMi4xMWMwLS42Mi4zNy0uODMuNjctLjkxaC4wOWMxLjI0LDAsMi4yNS0xLjAxLDIuMjUtMi4yNVY1Ljg3YzAtMS4yNC0xLjAxLTIuMjUtMi4yNS0yLjI1WiIvPgogIDxnPgogICAgPGcgY2xhc3M9ImNscy0zIj4KICAgICAgPHBhdGggY2xhc3M9ImNscy0xIiBkPSJNMjUuMDYsMzBoLTIuNzVjLTEuMDYsMC0xLjkyLS44Ni0xLjkyLTEuOTJ2LTEuMTNjMC0uMTUtLjEyLS4yNy0uMjctLjI3aC04LjI0Yy0uMTUsMC0uMjcuMTItLjI3LjI3djEuMTNjMCwxLjA2LS44NiwxLjkyLTEuOTIsMS45MmgtMi43NWMtMS4wNiwwLTEuOTItLjg2LTEuOTItMS45MnYtMS40OWMtMS43Mi0uMzgtMy4wMi0xLjkyLTMuMDItMy43NlY1Ljg0YzAtMi4xMiwxLjcyLTMuODQsMy44NC0zLjg0aDIwLjMxYzIuMTIsMCwzLjg0LDEuNzIsMy44NCwzLjg0djE2Ljk5YzAsMS44NC0xLjMsMy4zOC0zLjAyLDMuNzZ2MS40OWMwLDEuMDYtLjg2LDEuOTItMS45MiwxLjkyWk0xMS44OCwyNS4wM2g4LjI0YzEuMDYsMCwxLjkyLjg2LDEuOTIsMS45MnYxLjEzYzAsLjE1LjEyLjI3LjI3LjI3aDIuNzVjLjE1LDAsLjI3LS4xMi4yNy0uMjd2LTIuMjJjMC0uNDYuMzctLjgyLjgyLS44MiwxLjIxLDAsMi4yLS45OSwyLjItMi4yVjUuODRjMC0xLjIxLS45OS0yLjItMi4yLTIuMkg1Ljg0Yy0xLjIxLDAtMi4yLjk5LTIuMiwyLjJ2MTYuOTljMCwxLjIxLjk5LDIuMiwyLjIsMi4yLjQ2LDAsLjgyLjM3LjgyLjgydjIuMjJjMCwuMTUuMTIuMjcuMjcuMjdoMi43NWMuMTUsMCwuMjctLjEyLjI3LS4yN3YtMS4xM2MwLTEuMDYuODYtMS45MiwxLjkyLTEuOTJaIi8+CiAgICA8L2c+CiAgICA8ZyBjbGFzcz0iY2xzLTMiPgogICAgICA8cGF0aCBjbGFzcz0iY2xzLTQiIGQ9Ik0xMC43NywxOS4yNWMtLjE3LDAtLjM0LS4wNS0uNDgtLjE2LS4zNy0uMjctLjQ1LS43OC0uMTgtMS4xNWwyLjY3LTMuNjhjLjI3LS4zNy43OC0uNDUsMS4xNS0uMTguMzcuMjcuNDUuNzguMTgsMS4xNWwtMi42NywzLjY4Yy0uMTYuMjItLjQxLjM0LS42Ny4zNFoiLz4KICAgIDwvZz4KICAgIDxnIGNsYXNzPSJjbHMtMyI+CiAgICAgIDxwYXRoIGNsYXNzPSJjbHMtNCIgZD0iTTE2LjEyLDE5LjI1Yy0uMjYsMC0uNTEtLjEyLS42Ny0uMzRsLTIuNjctMy42OGMtLjI3LS4zNy0uMTktLjg4LjE4LTEuMTUuMzctLjI3Ljg4LS4xOSwxLjE1LjE4bDIuNjcsMy42OGMuMjcuMzcuMTkuODgtLjE4LDEuMTUtLjE1LjExLS4zMi4xNi0uNDguMTZaIi8+CiAgICA8L2c+CiAgICA8ZyBjbGFzcz0iY2xzLTMiPgogICAgICA8cGF0aCBjbGFzcz0iY2xzLTQiIGQ9Ik0xMy40NCwxNS41N2MtLjQ2LDAtLjgyLS4zNy0uODItLjgydi00LjUxYzAtLjQ2LjM3LS44Mi44Mi0uODJzLjgyLjM3LjgyLjgydjQuNTFjMCwuNDYtLjM3LjgyLS44Mi44MloiLz4KICAgIDwvZz4KICAgIDxnIGNsYXNzPSJjbHMtMyI+CiAgICAgIDxwYXRoIGNsYXNzPSJjbHMtNCIgZD0iTTEzLjQ0LDE1LjU4Yy0uMzUsMC0uNjctLjIyLS43OC0uNTctLjE0LS40My4xLS45LjUzLTEuMDRsNC4zMi0xLjM5Yy40My0uMTQuOS4xLDEuMDQuNTMuMTQuNDMtLjEuOS0uNTMsMS4wNGwtNC4zMiwxLjM5Yy0uMDkuMDMtLjE3LjA0LS4yNi4wNFoiLz4KICAgIDwvZz4KICAgIDxnIGNsYXNzPSJjbHMtMyI+CiAgICAgIDxwYXRoIGNsYXNzPSJjbHMtNCIgZD0iTTEzLjQ0LDE1LjU4Yy0uMDksMC0uMTctLjAxLS4yNS0uMDRsLTQuMzItMS4zOWMtLjQzLS4xNC0uNjctLjYtLjUzLTEuMDQuMTQtLjQzLjYtLjY3LDEuMDQtLjUzbDQuMzIsMS4zOWMuNDMuMTQuNjcuNi41MywxLjA0LS4xMS4zNS0uNDMuNTctLjc4LjU3WiIvPgogICAgPC9nPgogICAgPGcgY2xhc3M9ImNscy0zIj4KICAgICAgPHBhdGggY2xhc3M9ImNscy0xIiBkPSJNMjIuODUsMTkuMjNjLS40NiwwLS44Mi0uMzctLjgyLS44MnYtOC4xNWMwLS40Ni4zNy0uODIuODItLjgycy44Mi4zNy44Mi44MnY4LjE1YzAsLjQ2LS4zNy44Mi0uODIuODJaIi8+CiAgICA8L2c+CiAgPC9nPgo8L3N2Zz4="
|
||||||
},
|
},
|
||||||
"b78a0a55-6ef8-d246-a042-ba0f6d55050c": {
|
"b78a0a55-6ef8-d246-a042-ba0f6d55050c": {
|
||||||
"name": "LastPass",
|
"name": "LastPass",
|
||||||
"icon_dark": "data:image/svg+xml;base64,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",
|
"icon_dark": "data:image/svg+xml;base64,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",
|
||||||
"icon_light": "data:image/svg+xml;base64,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"
|
"icon_light": "data:image/svg+xml;base64,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"
|
||||||
},
|
},
|
||||||
"de503f9c-21a4-4f76-b4b7-558eb55c6f89": {
|
"de503f9c-21a4-4f76-b4b7-558eb55c6f89": {
|
||||||
"name": "Devolutions",
|
"name": "Devolutions",
|
||||||
"icon_dark": "data:image/svg+xml;base64,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",
|
"icon_dark": "data:image/svg+xml;base64,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",
|
||||||
"icon_light": "data:image/svg+xml;base64,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"
|
"icon_light": "data:image/svg+xml;base64,CjxzdmcgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB3aWR0aD0iNzJweCIgaGVpZ2h0PSI3MnB4IiB2aWV3Qm94PSIwIDAgNzIgNzIiPgk8ZGVmcz4KICAgICAgICA8ZmlsdGVyIGlkPSJhIiB3aWR0aD0iMjAwJSIgaGVpZ2h0PSIyMDAlIj4KICAgICAgICAgICAgPGZlT2Zmc2V0IHJlc3VsdD0ib2ZmT3V0IiBpbj0iU291cmNlQWxwaGEiIGR5PSIyLjIiLz4KICAgICAgICAgICAgPGZlR2F1c3NpYW5CbHVyIHJlc3VsdD0iYmx1ck91dCIgaW49Im9mZk91dCIgc3RkRGV2aWF0aW9uPSIxLjUiLz4KICAgICAgICAgICAgPGZlQ29sb3JNYXRyaXggdmFsdWVzPSIwIDAgMCAwIDAgMCAwIDAgMCAwIDAgMCAwIDAgMCAwIDAgMCAwLjQgMCIvPgogICAgICAgICAgICA8ZmVNZXJnZT4KICAgICAgICAgICAgICAgIDxmZU1lcmdlTm9kZS8+CiAgICAgICAgICAgICAgICA8ZmVNZXJnZU5vZGUgaW49IlNvdXJjZUdyYXBoaWMiLz4KICAgICAgICAgICAgPC9mZU1lcmdlPgogICAgICAgIDwvZmlsdGVyPgogICAgPC9kZWZzPgo8cGF0aCBmaWxsPSIjZmZmZmZmIiBmaWx0ZXI9InVybCgjYSkiIGQ9Ik0zMS4wNTksNS4zOTVjMTYuODktMi43MjcsMzIuODE3LDguNzcyLDM1LjU0NSwyNS42NjJjMi43MjcsMTYuODktOC43NzIsMzIuODE3LTI1LjY2MiwzNS41NDUKCUMyNC4wNTEsNjkuMzI5LDguMTI0LDU3LjgzLDUuMzk3LDQwLjk0QzIuNjcsMjQuMDQ5LDE0LjE2OSw4LjEyMiwzMS4wNTksNS4zOTV6Ii8+CjxwYXRoIGZpbGw9IiMwMDY4YzMiIGQ9Ik01NS4zNjQsMTcuMjAyYy01LjA0Ny01LjE5Ny0xMS44MDItOC4xMDktMTkuMDItOC4yYy03LjE5MS0wLjA5LTEzLjk4NSwyLjY2OS0xOS4xNDksNy43NjgKCUMxMS45MSwyMS45ODksOSwyOC45NTUsOSwzNi4zOTJsMC4wNDQsMS4yNmMwLDEuMTgxLDAuOTYxLDIuMTQyLDIuMTQyLDIuMTQyczIuMTQxLTAuOTYsMi4xNDItMi4xNGwwLjAxLTAuOTEzCgljMC05Ljk0NSw4LjQ1My0yMC41OTMsMjEuMDM1LTIwLjU5M2MxMy4xMzIsMCwyMS4yNjEsMTAuNzEyLDIxLjI2MSwyMC42MzdjMCw1LjE3My0yLjA2Myw5LjkxOS01LjgwOCwxMy4zNjMKCUM0Ni4xNyw1My41MDksNDEuMjYsNTUuMzYsMzYsNTUuMzZjLTMuMTMsMC02LjIxOS0wLjc1NS04Ljk1OC0yLjE4NmwxOC44Ny04LjY4NmMxLjI2Ny0wLjU4MywyLjExNS0xLjgxLDIuMjEzLTMuMjAxCglzLTAuNTY5LTIuNzI1LTEuNzU0LTMuNDg3bC0xNS43MDYtOC40MTVjLTAuNTU0LTAuMzU3LTEuMjEzLTAuNDc3LTEuODU4LTAuMzM3Yy0wLjY0NCwwLjEzOS0xLjE5NSwwLjUyMS0xLjU1MiwxLjA3NQoJYy0wLjczNywxLjE0NC0wLjQwNiwyLjY3MywwLjcyMSwzLjM5N2w4LjQ1NCw2LjkyM2wtMTguNDE5LDguNDc4Yy0xLjQyNywwLjY1Ny0yLjI5OCwyLjEtMi4yMTgsMy42NzUKCWMwLjA0OCwwLjk0OSwwLjQ5MywxLjg4NCwxLjI1MywyLjYzNEMyMi4xNTgsNjAuMjY5LDI4Ljg0LDYzLDM1Ljk4NSw2M2MwLjQ0NSwwLDAuODkyLTAuMDExLDEuMzQxLTAuMDMyCgljMTQuMTU2LTAuNjczLDI1LjQzMi0xMi4zMTUsMjUuNjcxLTI2LjUwNUM2My4xMTgsMjkuMjM2LDYwLjQwNywyMi4zOTYsNTUuMzY0LDE3LjIwMnoiLz4KPC9zdmc+Cg=="
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,7 +2,7 @@
|
|||||||
"$schema": "http://json-schema.org/draft-07/schema",
|
"$schema": "http://json-schema.org/draft-07/schema",
|
||||||
"$id": "https://goauthentik.io/blueprints/schema.json",
|
"$id": "https://goauthentik.io/blueprints/schema.json",
|
||||||
"type": "object",
|
"type": "object",
|
||||||
"title": "authentik 2024.10.2 Blueprint schema",
|
"title": "authentik 2024.10.4 Blueprint schema",
|
||||||
"required": [
|
"required": [
|
||||||
"version",
|
"version",
|
||||||
"entries"
|
"entries"
|
||||||
@ -5617,13 +5617,20 @@
|
|||||||
"title": "Issuer mode",
|
"title": "Issuer mode",
|
||||||
"description": "Configure how the issuer field of the ID Token should be filled."
|
"description": "Configure how the issuer field of the ID Token should be filled."
|
||||||
},
|
},
|
||||||
"jwks_sources": {
|
"jwt_federation_sources": {
|
||||||
"type": "array",
|
"type": "array",
|
||||||
"items": {
|
"items": {
|
||||||
"type": "integer",
|
"type": "integer",
|
||||||
"title": "Any JWT signed by the JWK of the selected source can be used to authenticate."
|
"title": "Any JWT signed by the JWK of the selected source can be used to authenticate."
|
||||||
},
|
},
|
||||||
"title": "Any JWT signed by the JWK of the selected source can be used to authenticate."
|
"title": "Any JWT signed by the JWK of the selected source can be used to authenticate."
|
||||||
|
},
|
||||||
|
"jwt_federation_providers": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"type": "integer"
|
||||||
|
},
|
||||||
|
"title": "Jwt federation providers"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"required": []
|
"required": []
|
||||||
@ -5746,7 +5753,7 @@
|
|||||||
"type": "string",
|
"type": "string",
|
||||||
"title": "Cookie domain"
|
"title": "Cookie domain"
|
||||||
},
|
},
|
||||||
"jwks_sources": {
|
"jwt_federation_sources": {
|
||||||
"type": "array",
|
"type": "array",
|
||||||
"items": {
|
"items": {
|
||||||
"type": "integer",
|
"type": "integer",
|
||||||
@ -5754,6 +5761,13 @@
|
|||||||
},
|
},
|
||||||
"title": "Any JWT signed by the JWK of the selected source can be used to authenticate."
|
"title": "Any JWT signed by the JWK of the selected source can be used to authenticate."
|
||||||
},
|
},
|
||||||
|
"jwt_federation_providers": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"type": "integer"
|
||||||
|
},
|
||||||
|
"title": "Jwt federation providers"
|
||||||
|
},
|
||||||
"access_token_validity": {
|
"access_token_validity": {
|
||||||
"type": "string",
|
"type": "string",
|
||||||
"minLength": 1,
|
"minLength": 1,
|
||||||
|
@ -47,7 +47,7 @@ func checkServer() int {
|
|||||||
h := &http.Client{
|
h := &http.Client{
|
||||||
Transport: web.NewUserAgentTransport("goauthentik.io/healthcheck", http.DefaultTransport),
|
Transport: web.NewUserAgentTransport("goauthentik.io/healthcheck", http.DefaultTransport),
|
||||||
}
|
}
|
||||||
url := fmt.Sprintf("http://%s/-/health/live/", config.Get().Listen.HTTP)
|
url := fmt.Sprintf("http://%s%s-/health/live/", config.Get().Listen.HTTP, config.Get().Web.Path)
|
||||||
res, err := h.Head(url)
|
res, err := h.Head(url)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.WithError(err).Warning("failed to send healthcheck request")
|
log.WithError(err).Warning("failed to send healthcheck request")
|
||||||
|
@ -61,7 +61,7 @@ var rootCmd = &cobra.Command{
|
|||||||
ex := common.Init()
|
ex := common.Init()
|
||||||
defer common.Defer()
|
defer common.Defer()
|
||||||
|
|
||||||
u, err := url.Parse(fmt.Sprintf("http://%s", config.Get().Listen.HTTP))
|
u, err := url.Parse(fmt.Sprintf("http://%s%s", config.Get().Listen.HTTP, config.Get().Web.Path))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
|
@ -31,7 +31,7 @@ services:
|
|||||||
volumes:
|
volumes:
|
||||||
- redis:/data
|
- redis:/data
|
||||||
server:
|
server:
|
||||||
image: ${AUTHENTIK_IMAGE:-ghcr.io/goauthentik/server}:${AUTHENTIK_TAG:-2024.10.2}
|
image: ${AUTHENTIK_IMAGE:-ghcr.io/goauthentik/server}:${AUTHENTIK_TAG:-2024.10.4}
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
command: server
|
command: server
|
||||||
environment:
|
environment:
|
||||||
@ -52,7 +52,7 @@ services:
|
|||||||
- postgresql
|
- postgresql
|
||||||
- redis
|
- redis
|
||||||
worker:
|
worker:
|
||||||
image: ${AUTHENTIK_IMAGE:-ghcr.io/goauthentik/server}:${AUTHENTIK_TAG:-2024.10.2}
|
image: ${AUTHENTIK_IMAGE:-ghcr.io/goauthentik/server}:${AUTHENTIK_TAG:-2024.10.4}
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
command: worker
|
command: worker
|
||||||
environment:
|
environment:
|
||||||
|
4
go.mod
4
go.mod
@ -27,9 +27,9 @@ require (
|
|||||||
github.com/sethvargo/go-envconfig v1.1.0
|
github.com/sethvargo/go-envconfig v1.1.0
|
||||||
github.com/sirupsen/logrus v1.9.3
|
github.com/sirupsen/logrus v1.9.3
|
||||||
github.com/spf13/cobra v1.8.1
|
github.com/spf13/cobra v1.8.1
|
||||||
github.com/stretchr/testify v1.9.0
|
github.com/stretchr/testify v1.10.0
|
||||||
github.com/wwt/guac v1.3.2
|
github.com/wwt/guac v1.3.2
|
||||||
goauthentik.io/api/v3 v3.2024102.2
|
goauthentik.io/api/v3 v3.2024104.1
|
||||||
golang.org/x/exp v0.0.0-20230210204819-062eb4c674ab
|
golang.org/x/exp v0.0.0-20230210204819-062eb4c674ab
|
||||||
golang.org/x/oauth2 v0.24.0
|
golang.org/x/oauth2 v0.24.0
|
||||||
golang.org/x/sync v0.9.0
|
golang.org/x/sync v0.9.0
|
||||||
|
8
go.sum
8
go.sum
@ -274,8 +274,8 @@ github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/
|
|||||||
github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
|
||||||
github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
|
github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=
|
||||||
github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
|
github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
|
||||||
github.com/stretchr/testify v1.9.0 h1:HtqpIVDClZ4nwg75+f6Lvsy/wHu+3BoSGCbBAcpTsTg=
|
github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=
|
||||||
github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
|
github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
|
||||||
github.com/wwt/guac v1.3.2 h1:sH6OFGa/1tBs7ieWBVlZe7t6F5JAOWBry/tqQL/Vup4=
|
github.com/wwt/guac v1.3.2 h1:sH6OFGa/1tBs7ieWBVlZe7t6F5JAOWBry/tqQL/Vup4=
|
||||||
github.com/wwt/guac v1.3.2/go.mod h1:eKm+NrnK7A88l4UBEcYNpZQGMpZRryYKoz4D/0/n1C0=
|
github.com/wwt/guac v1.3.2/go.mod h1:eKm+NrnK7A88l4UBEcYNpZQGMpZRryYKoz4D/0/n1C0=
|
||||||
github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
github.com/yuin/goldmark v1.1.25/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=
|
||||||
@ -299,8 +299,8 @@ go.opentelemetry.io/otel/trace v1.24.0 h1:CsKnnL4dUAr/0llH9FKuc698G04IrpWV0MQA/Y
|
|||||||
go.opentelemetry.io/otel/trace v1.24.0/go.mod h1:HPc3Xr/cOApsBI154IU0OI0HJexz+aw5uPdbs3UCjNU=
|
go.opentelemetry.io/otel/trace v1.24.0/go.mod h1:HPc3Xr/cOApsBI154IU0OI0HJexz+aw5uPdbs3UCjNU=
|
||||||
go.uber.org/goleak v1.3.0 h1:2K3zAYmnTNqV73imy9J1T3WC+gmCePx2hEGkimedGto=
|
go.uber.org/goleak v1.3.0 h1:2K3zAYmnTNqV73imy9J1T3WC+gmCePx2hEGkimedGto=
|
||||||
go.uber.org/goleak v1.3.0/go.mod h1:CoHD4mav9JJNrW/WLlf7HGZPjdw8EucARQHekz1X6bE=
|
go.uber.org/goleak v1.3.0/go.mod h1:CoHD4mav9JJNrW/WLlf7HGZPjdw8EucARQHekz1X6bE=
|
||||||
goauthentik.io/api/v3 v3.2024102.2 h1:k2sIU7TkT2fOomBYo5KEc/mz5ipzaZUp5TuEOJLPX4g=
|
goauthentik.io/api/v3 v3.2024104.1 h1:N09HAJ66W965QEYpx6sJzcaQxPsnFykVwkzVjVK/zH0=
|
||||||
goauthentik.io/api/v3 v3.2024102.2/go.mod h1:zz+mEZg8rY/7eEjkMGWJ2DnGqk+zqxuybGCGrR2O4Kw=
|
goauthentik.io/api/v3 v3.2024104.1/go.mod h1:zz+mEZg8rY/7eEjkMGWJ2DnGqk+zqxuybGCGrR2O4Kw=
|
||||||
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
|
||||||
golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
golang.org/x/crypto v0.0.0-20190510104115-cbcb75029529/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
||||||
golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
|
||||||
|
@ -14,6 +14,7 @@ type Config struct {
|
|||||||
// Config for both core and outposts
|
// Config for both core and outposts
|
||||||
Debug bool `yaml:"debug" env:"AUTHENTIK_DEBUG, overwrite"`
|
Debug bool `yaml:"debug" env:"AUTHENTIK_DEBUG, overwrite"`
|
||||||
Listen ListenConfig `yaml:"listen" env:", prefix=AUTHENTIK_LISTEN__"`
|
Listen ListenConfig `yaml:"listen" env:", prefix=AUTHENTIK_LISTEN__"`
|
||||||
|
Web WebConfig `yaml:"web" env:", prefix=AUTHENTIK_WEB__"`
|
||||||
|
|
||||||
// Outpost specific config
|
// Outpost specific config
|
||||||
// These are only relevant for proxy/ldap outposts, and cannot be set via YAML
|
// These are only relevant for proxy/ldap outposts, and cannot be set via YAML
|
||||||
@ -72,3 +73,7 @@ type OutpostConfig struct {
|
|||||||
Discover bool `yaml:"discover" env:"DISCOVER, overwrite"`
|
Discover bool `yaml:"discover" env:"DISCOVER, overwrite"`
|
||||||
DisableEmbeddedOutpost bool `yaml:"disable_embedded_outpost" env:"DISABLE_EMBEDDED_OUTPOST, overwrite"`
|
DisableEmbeddedOutpost bool `yaml:"disable_embedded_outpost" env:"DISABLE_EMBEDDED_OUTPOST, overwrite"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type WebConfig struct {
|
||||||
|
Path string `yaml:"path" env:"PATH, overwrite"`
|
||||||
|
}
|
||||||
|
@ -29,4 +29,4 @@ func UserAgent() string {
|
|||||||
return fmt.Sprintf("authentik@%s", FullVersion())
|
return fmt.Sprintf("authentik@%s", FullVersion())
|
||||||
}
|
}
|
||||||
|
|
||||||
const VERSION = "2024.10.2"
|
const VERSION = "2024.10.4"
|
||||||
|
@ -56,10 +56,10 @@ type APIController struct {
|
|||||||
func NewAPIController(akURL url.URL, token string) *APIController {
|
func NewAPIController(akURL url.URL, token string) *APIController {
|
||||||
rsp := sentry.StartSpan(context.Background(), "authentik.outposts.init")
|
rsp := sentry.StartSpan(context.Background(), "authentik.outposts.init")
|
||||||
|
|
||||||
config := api.NewConfiguration()
|
apiConfig := api.NewConfiguration()
|
||||||
config.Host = akURL.Host
|
apiConfig.Host = akURL.Host
|
||||||
config.Scheme = akURL.Scheme
|
apiConfig.Scheme = akURL.Scheme
|
||||||
config.HTTPClient = &http.Client{
|
apiConfig.HTTPClient = &http.Client{
|
||||||
Transport: web.NewUserAgentTransport(
|
Transport: web.NewUserAgentTransport(
|
||||||
constants.OutpostUserAgent(),
|
constants.OutpostUserAgent(),
|
||||||
web.NewTracingTransport(
|
web.NewTracingTransport(
|
||||||
@ -68,10 +68,15 @@ func NewAPIController(akURL url.URL, token string) *APIController {
|
|||||||
),
|
),
|
||||||
),
|
),
|
||||||
}
|
}
|
||||||
config.AddDefaultHeader("Authorization", fmt.Sprintf("Bearer %s", token))
|
apiConfig.Servers = api.ServerConfigurations{
|
||||||
|
{
|
||||||
|
URL: fmt.Sprintf("%sapi/v3", akURL.Path),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
apiConfig.AddDefaultHeader("Authorization", fmt.Sprintf("Bearer %s", token))
|
||||||
|
|
||||||
// create the API client, with the transport
|
// create the API client, with the transport
|
||||||
apiClient := api.NewAPIClient(config)
|
apiClient := api.NewAPIClient(apiConfig)
|
||||||
|
|
||||||
log := log.WithField("logger", "authentik.outpost.ak-api-controller")
|
log := log.WithField("logger", "authentik.outpost.ak-api-controller")
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func (ac *APIController) initWS(akURL url.URL, outpostUUID string) error {
|
func (ac *APIController) initWS(akURL url.URL, outpostUUID string) error {
|
||||||
pathTemplate := "%s://%s/ws/outpost/%s/?%s"
|
pathTemplate := "%s://%s%sws/outpost/%s/?%s"
|
||||||
query := akURL.Query()
|
query := akURL.Query()
|
||||||
query.Set("instance_uuid", ac.instanceUUID.String())
|
query.Set("instance_uuid", ac.instanceUUID.String())
|
||||||
scheme := strings.ReplaceAll(akURL.Scheme, "http", "ws")
|
scheme := strings.ReplaceAll(akURL.Scheme, "http", "ws")
|
||||||
@ -37,7 +37,7 @@ func (ac *APIController) initWS(akURL url.URL, outpostUUID string) error {
|
|||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
ws, _, err := dialer.Dial(fmt.Sprintf(pathTemplate, scheme, akURL.Host, outpostUUID, akURL.Query().Encode()), header)
|
ws, _, err := dialer.Dial(fmt.Sprintf(pathTemplate, scheme, akURL.Host, akURL.Path, outpostUUID, akURL.Query().Encode()), header)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ac.logger.WithError(err).Warning("failed to connect websocket")
|
ac.logger.WithError(err).Warning("failed to connect websocket")
|
||||||
return err
|
return err
|
||||||
@ -83,6 +83,7 @@ func (ac *APIController) reconnectWS() {
|
|||||||
u := url.URL{
|
u := url.URL{
|
||||||
Host: ac.Client.GetConfig().Host,
|
Host: ac.Client.GetConfig().Host,
|
||||||
Scheme: ac.Client.GetConfig().Scheme,
|
Scheme: ac.Client.GetConfig().Scheme,
|
||||||
|
Path: strings.ReplaceAll(ac.Client.GetConfig().Servers[0].URL, "api/v3", ""),
|
||||||
}
|
}
|
||||||
attempt := 1
|
attempt := 1
|
||||||
for {
|
for {
|
||||||
|
@ -46,7 +46,7 @@ func (ws *WebServer) runMetricsServer() {
|
|||||||
).ServeHTTP(rw, r)
|
).ServeHTTP(rw, r)
|
||||||
|
|
||||||
// Get upstream metrics
|
// Get upstream metrics
|
||||||
re, err := http.NewRequest("GET", fmt.Sprintf("%s/-/metrics/", ws.ul.String()), nil)
|
re, err := http.NewRequest("GET", fmt.Sprintf("%s%s-/metrics/", ws.upstreamURL.String(), config.Get().Web.Path), nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
l.WithError(err).Warning("failed to get upstream metrics")
|
l.WithError(err).Warning("failed to get upstream metrics")
|
||||||
return
|
return
|
||||||
|
@ -9,14 +9,15 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/prometheus/client_golang/prometheus"
|
"github.com/prometheus/client_golang/prometheus"
|
||||||
|
"goauthentik.io/internal/config"
|
||||||
"goauthentik.io/internal/utils/sentry"
|
"goauthentik.io/internal/utils/sentry"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (ws *WebServer) configureProxy() {
|
func (ws *WebServer) configureProxy() {
|
||||||
// Reverse proxy to the application server
|
// Reverse proxy to the application server
|
||||||
director := func(req *http.Request) {
|
director := func(req *http.Request) {
|
||||||
req.URL.Scheme = ws.ul.Scheme
|
req.URL.Scheme = ws.upstreamURL.Scheme
|
||||||
req.URL.Host = ws.ul.Host
|
req.URL.Host = ws.upstreamURL.Host
|
||||||
if _, ok := req.Header["User-Agent"]; !ok {
|
if _, ok := req.Header["User-Agent"]; !ok {
|
||||||
// explicitly disable User-Agent so it's not set to default value
|
// explicitly disable User-Agent so it's not set to default value
|
||||||
req.Header.Set("User-Agent", "")
|
req.Header.Set("User-Agent", "")
|
||||||
@ -32,7 +33,10 @@ func (ws *WebServer) configureProxy() {
|
|||||||
}
|
}
|
||||||
rp.ErrorHandler = ws.proxyErrorHandler
|
rp.ErrorHandler = ws.proxyErrorHandler
|
||||||
rp.ModifyResponse = ws.proxyModifyResponse
|
rp.ModifyResponse = ws.proxyModifyResponse
|
||||||
ws.m.PathPrefix("/").HandlerFunc(sentry.SentryNoSample(func(rw http.ResponseWriter, r *http.Request) {
|
ws.mainRouter.PathPrefix(config.Get().Web.Path).Path("/-/health/live/").HandlerFunc(sentry.SentryNoSample(func(rw http.ResponseWriter, r *http.Request) {
|
||||||
|
rw.WriteHeader(200)
|
||||||
|
}))
|
||||||
|
ws.mainRouter.PathPrefix(config.Get().Web.Path).HandlerFunc(sentry.SentryNoSample(func(rw http.ResponseWriter, r *http.Request) {
|
||||||
if !ws.g.IsRunning() {
|
if !ws.g.IsRunning() {
|
||||||
ws.proxyErrorHandler(rw, r, errors.New("authentik starting"))
|
ws.proxyErrorHandler(rw, r, errors.New("authentik starting"))
|
||||||
return
|
return
|
||||||
|
@ -14,46 +14,74 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func (ws *WebServer) configureStatic() {
|
func (ws *WebServer) configureStatic() {
|
||||||
staticRouter := ws.lh.NewRoute().Subrouter()
|
// Setup routers
|
||||||
|
staticRouter := ws.loggingRouter.NewRoute().Subrouter()
|
||||||
staticRouter.Use(ws.staticHeaderMiddleware)
|
staticRouter.Use(ws.staticHeaderMiddleware)
|
||||||
staticRouter.Use(web.DisableIndex)
|
indexLessRouter := staticRouter.NewRoute().Subrouter()
|
||||||
|
// Specifically disable index
|
||||||
|
indexLessRouter.Use(web.DisableIndex)
|
||||||
|
|
||||||
distFs := http.FileServer(http.Dir("./web/dist"))
|
distFs := http.FileServer(http.Dir("./web/dist"))
|
||||||
authentikHandler := http.StripPrefix("/static/authentik/", http.FileServer(http.Dir("./web/authentik")))
|
|
||||||
|
|
||||||
// Root file paths, from which they should be accessed
|
pathStripper := func(handler http.Handler, paths ...string) http.Handler {
|
||||||
staticRouter.PathPrefix("/static/dist/").Handler(http.StripPrefix("/static/dist/", distFs))
|
h := handler
|
||||||
staticRouter.PathPrefix("/static/authentik/").Handler(authentikHandler)
|
for _, path := range paths {
|
||||||
|
h = http.StripPrefix(path, h)
|
||||||
|
}
|
||||||
|
return h
|
||||||
|
}
|
||||||
|
|
||||||
// Also serve assets folder in specific interfaces since fonts in patternfly are imported
|
helpHandler := http.FileServer(http.Dir("./website/help/"))
|
||||||
// with a relative path
|
|
||||||
staticRouter.PathPrefix("/if/flow/{flow_slug}/assets").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
indexLessRouter.PathPrefix(config.Get().Web.Path).PathPrefix("/static/dist/").Handler(pathStripper(
|
||||||
|
distFs,
|
||||||
|
"static/dist/",
|
||||||
|
config.Get().Web.Path,
|
||||||
|
))
|
||||||
|
indexLessRouter.PathPrefix(config.Get().Web.Path).PathPrefix("/static/authentik/").Handler(pathStripper(
|
||||||
|
http.FileServer(http.Dir("./web/authentik")),
|
||||||
|
"static/authentik/",
|
||||||
|
config.Get().Web.Path,
|
||||||
|
))
|
||||||
|
|
||||||
|
indexLessRouter.PathPrefix(config.Get().Web.Path).PathPrefix("/if/flow/{flow_slug}/assets").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
||||||
vars := mux.Vars(r)
|
vars := mux.Vars(r)
|
||||||
|
|
||||||
web.DisableIndex(http.StripPrefix(fmt.Sprintf("/if/flow/%s", vars["flow_slug"]), distFs)).ServeHTTP(rw, r)
|
pathStripper(
|
||||||
|
distFs,
|
||||||
|
"if/flow/"+vars["flow_slug"],
|
||||||
|
config.Get().Web.Path,
|
||||||
|
).ServeHTTP(rw, r)
|
||||||
})
|
})
|
||||||
staticRouter.PathPrefix("/if/admin/assets").Handler(http.StripPrefix("/if/admin", distFs))
|
indexLessRouter.PathPrefix(config.Get().Web.Path).PathPrefix("/if/admin/assets").Handler(http.StripPrefix(fmt.Sprintf("%sif/admin", config.Get().Web.Path), distFs))
|
||||||
staticRouter.PathPrefix("/if/user/assets").Handler(http.StripPrefix("/if/user", distFs))
|
indexLessRouter.PathPrefix(config.Get().Web.Path).PathPrefix("/if/user/assets").Handler(http.StripPrefix(fmt.Sprintf("%sif/user", config.Get().Web.Path), distFs))
|
||||||
staticRouter.PathPrefix("/if/rac/{app_slug}/assets").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
indexLessRouter.PathPrefix(config.Get().Web.Path).PathPrefix("/if/rac/{app_slug}/assets").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
||||||
vars := mux.Vars(r)
|
vars := mux.Vars(r)
|
||||||
|
|
||||||
web.DisableIndex(http.StripPrefix(fmt.Sprintf("/if/rac/%s", vars["app_slug"]), distFs)).ServeHTTP(rw, r)
|
pathStripper(
|
||||||
|
distFs,
|
||||||
|
"if/rac/"+vars["app_slug"],
|
||||||
|
config.Get().Web.Path,
|
||||||
|
).ServeHTTP(rw, r)
|
||||||
})
|
})
|
||||||
|
|
||||||
// Media files, if backend is file
|
// Media files, if backend is file
|
||||||
if config.Get().Storage.Media.Backend == "file" {
|
if config.Get().Storage.Media.Backend == "file" {
|
||||||
fsMedia := http.StripPrefix("/media", http.FileServer(http.Dir(config.Get().Storage.Media.File.Path)))
|
fsMedia := http.StripPrefix("/media", http.FileServer(http.Dir(config.Get().Storage.Media.File.Path)))
|
||||||
staticRouter.PathPrefix("/media/").HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
indexLessRouter.PathPrefix(config.Get().Web.Path).PathPrefix("/media/").HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
w.Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline'; sandbox")
|
w.Header().Set("Content-Security-Policy", "default-src 'none'; style-src 'unsafe-inline'; sandbox")
|
||||||
fsMedia.ServeHTTP(w, r)
|
fsMedia.ServeHTTP(w, r)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
staticRouter.PathPrefix("/if/help/").Handler(http.StripPrefix("/if/help/", http.FileServer(http.Dir("./website/help/"))))
|
staticRouter.PathPrefix(config.Get().Web.Path).PathPrefix("/if/help/").Handler(pathStripper(
|
||||||
staticRouter.PathPrefix("/help").Handler(http.RedirectHandler("/if/help/", http.StatusMovedPermanently))
|
helpHandler,
|
||||||
|
config.Get().Web.Path,
|
||||||
|
"/if/help/",
|
||||||
|
))
|
||||||
|
staticRouter.PathPrefix(config.Get().Web.Path).PathPrefix("/help").Handler(http.RedirectHandler(fmt.Sprintf("%sif/help/", config.Get().Web.Path), http.StatusMovedPermanently))
|
||||||
|
|
||||||
// Static misc files
|
staticRouter.PathPrefix(config.Get().Web.Path).Path("/robots.txt").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
||||||
ws.lh.Path("/robots.txt").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
|
||||||
rw.Header()["Content-Type"] = []string{"text/plain"}
|
rw.Header()["Content-Type"] = []string{"text/plain"}
|
||||||
rw.WriteHeader(200)
|
rw.WriteHeader(200)
|
||||||
_, err := rw.Write(staticWeb.RobotsTxt)
|
_, err := rw.Write(staticWeb.RobotsTxt)
|
||||||
@ -61,7 +89,7 @@ func (ws *WebServer) configureStatic() {
|
|||||||
ws.log.WithError(err).Warning("failed to write response")
|
ws.log.WithError(err).Warning("failed to write response")
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
ws.lh.Path("/.well-known/security.txt").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
staticRouter.PathPrefix(config.Get().Web.Path).Path("/.well-known/security.txt").HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
|
||||||
rw.Header()["Content-Type"] = []string{"text/plain"}
|
rw.Header()["Content-Type"] = []string{"text/plain"}
|
||||||
rw.WriteHeader(200)
|
rw.WriteHeader(200)
|
||||||
_, err := rw.Write(staticWeb.SecurityTxt)
|
_, err := rw.Write(staticWeb.SecurityTxt)
|
||||||
|
@ -33,13 +33,13 @@ type WebServer struct {
|
|||||||
ProxyServer *proxyv2.ProxyServer
|
ProxyServer *proxyv2.ProxyServer
|
||||||
BrandTLS *brand_tls.Watcher
|
BrandTLS *brand_tls.Watcher
|
||||||
|
|
||||||
g *gounicorn.GoUnicorn
|
g *gounicorn.GoUnicorn
|
||||||
gr bool
|
gunicornReady bool
|
||||||
m *mux.Router
|
mainRouter *mux.Router
|
||||||
lh *mux.Router
|
loggingRouter *mux.Router
|
||||||
log *log.Entry
|
log *log.Entry
|
||||||
uc *http.Client
|
upstreamClient *http.Client
|
||||||
ul *url.URL
|
upstreamURL *url.URL
|
||||||
}
|
}
|
||||||
|
|
||||||
const UnixSocketName = "authentik-core.sock"
|
const UnixSocketName = "authentik-core.sock"
|
||||||
@ -73,17 +73,22 @@ func NewWebServer() *WebServer {
|
|||||||
u, _ := url.Parse("http://localhost:8000")
|
u, _ := url.Parse("http://localhost:8000")
|
||||||
|
|
||||||
ws := &WebServer{
|
ws := &WebServer{
|
||||||
m: mainHandler,
|
mainRouter: mainHandler,
|
||||||
lh: loggingHandler,
|
loggingRouter: loggingHandler,
|
||||||
log: l,
|
log: l,
|
||||||
gr: true,
|
gunicornReady: true,
|
||||||
uc: upstreamClient,
|
upstreamClient: upstreamClient,
|
||||||
ul: u,
|
upstreamURL: u,
|
||||||
}
|
}
|
||||||
ws.configureStatic()
|
ws.configureStatic()
|
||||||
ws.configureProxy()
|
ws.configureProxy()
|
||||||
|
// Redirect for sub-folder
|
||||||
|
if sp := config.Get().Web.Path; sp != "/" {
|
||||||
|
ws.mainRouter.Path("/").Handler(http.RedirectHandler(sp, http.StatusFound))
|
||||||
|
}
|
||||||
|
hcUrl := fmt.Sprintf("%s%s-/health/live/", ws.upstreamURL.String(), config.Get().Web.Path)
|
||||||
ws.g = gounicorn.New(func() bool {
|
ws.g = gounicorn.New(func() bool {
|
||||||
req, err := http.NewRequest(http.MethodGet, fmt.Sprintf("%s/-/health/live/", ws.ul.String()), nil)
|
req, err := http.NewRequest(http.MethodGet, hcUrl, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ws.log.WithError(err).Warning("failed to create request for healthcheck")
|
ws.log.WithError(err).Warning("failed to create request for healthcheck")
|
||||||
return false
|
return false
|
||||||
@ -107,7 +112,7 @@ func (ws *WebServer) Start() {
|
|||||||
|
|
||||||
func (ws *WebServer) attemptStartBackend() {
|
func (ws *WebServer) attemptStartBackend() {
|
||||||
for {
|
for {
|
||||||
if !ws.gr {
|
if !ws.gunicornReady {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
err := ws.g.Start()
|
err := ws.g.Start()
|
||||||
@ -135,7 +140,7 @@ func (ws *WebServer) Core() *gounicorn.GoUnicorn {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (ws *WebServer) upstreamHttpClient() *http.Client {
|
func (ws *WebServer) upstreamHttpClient() *http.Client {
|
||||||
return ws.uc
|
return ws.upstreamClient
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ws *WebServer) Shutdown() {
|
func (ws *WebServer) Shutdown() {
|
||||||
@ -160,7 +165,7 @@ func (ws *WebServer) listenPlain() {
|
|||||||
|
|
||||||
func (ws *WebServer) serve(listener net.Listener) {
|
func (ws *WebServer) serve(listener net.Listener) {
|
||||||
srv := &http.Server{
|
srv := &http.Server{
|
||||||
Handler: ws.m,
|
Handler: ws.mainRouter,
|
||||||
}
|
}
|
||||||
|
|
||||||
// See https://golang.org/pkg/net/http/#Server.Shutdown
|
// See https://golang.org/pkg/net/http/#Server.Shutdown
|
||||||
|
Binary file not shown.
@ -8,7 +8,7 @@ msgid ""
|
|||||||
msgstr ""
|
msgstr ""
|
||||||
"Project-Id-Version: PACKAGE VERSION\n"
|
"Project-Id-Version: PACKAGE VERSION\n"
|
||||||
"Report-Msgid-Bugs-To: \n"
|
"Report-Msgid-Bugs-To: \n"
|
||||||
"POT-Creation-Date: 2024-11-18 00:09+0000\n"
|
"POT-Creation-Date: 2024-11-26 00:09+0000\n"
|
||||||
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
|
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
|
||||||
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
||||||
"Language-Team: LANGUAGE <LL@li.org>\n"
|
"Language-Team: LANGUAGE <LL@li.org>\n"
|
||||||
@ -73,8 +73,8 @@ msgid "authentik Export - {date}"
|
|||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/blueprints/v1/tasks.py authentik/crypto/tasks.py
|
#: authentik/blueprints/v1/tasks.py authentik/crypto/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Successfully imported %(count)d files."
|
msgid "Successfully imported {count} files."
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/brands/models.py
|
#: authentik/brands/models.py
|
||||||
@ -856,13 +856,13 @@ msgid "Starting full provider sync"
|
|||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Syncing page %(page)d of users"
|
msgid "Syncing page {page} of users"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Syncing page %(page)d of groups"
|
msgid "Syncing page {page} of groups"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
@ -1012,8 +1012,8 @@ msgid "Event Matcher Policies"
|
|||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/policies/expiry/models.py
|
#: authentik/policies/expiry/models.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Password expired %(days)d days ago. Please update your password."
|
msgid "Password expired {days} days ago. Please update your password."
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/policies/expiry/models.py
|
#: authentik/policies/expiry/models.py
|
||||||
@ -1140,8 +1140,8 @@ msgid "Invalid password."
|
|||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/policies/password/models.py
|
#: authentik/policies/password/models.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Password exists on %(count)d online lists."
|
msgid "Password exists on {count} online lists."
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/policies/password/models.py
|
#: authentik/policies/password/models.py
|
||||||
@ -1252,6 +1252,11 @@ msgstr ""
|
|||||||
msgid "Search full LDAP directory"
|
msgid "Search full LDAP directory"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/api/providers.py
|
||||||
|
#, python-brace-format
|
||||||
|
msgid "Invalid Regex Pattern: {url}"
|
||||||
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/providers/oauth2/id_token.py
|
#: authentik/providers/oauth2/id_token.py
|
||||||
msgid "Based on the Hashed User ID"
|
msgid "Based on the Hashed User ID"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
@ -1294,6 +1299,14 @@ msgstr ""
|
|||||||
msgid "Each provider has a different issuer, based on the application slug."
|
msgid "Each provider has a different issuer, based on the application slug."
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/models.py
|
||||||
|
msgid "Strict URL comparison"
|
||||||
|
msgstr ""
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/models.py
|
||||||
|
msgid "Regular Expression URL matching"
|
||||||
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
#: authentik/providers/oauth2/models.py
|
||||||
msgid "code (Authorization Code Flow)"
|
msgid "code (Authorization Code Flow)"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
@ -1370,10 +1383,6 @@ msgstr ""
|
|||||||
msgid "Redirect URIs"
|
msgid "Redirect URIs"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
|
||||||
msgid "Enter each URI on a new line."
|
|
||||||
msgstr ""
|
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
#: authentik/providers/oauth2/models.py
|
||||||
msgid "Include claims in id_token"
|
msgid "Include claims in id_token"
|
||||||
msgstr ""
|
msgstr ""
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
# Mordecai, 2023
|
# Mordecai, 2023
|
||||||
# Charles Leclerc, 2024
|
# Charles Leclerc, 2024
|
||||||
# nerdinator <florian.dupret@gmail.com>, 2024
|
# nerdinator <florian.dupret@gmail.com>, 2024
|
||||||
# Titouan Petit, 2024
|
# Tina, 2024
|
||||||
# Marc Schmitt, 2024
|
# Marc Schmitt, 2024
|
||||||
#
|
#
|
||||||
#, fuzzy
|
#, fuzzy
|
||||||
@ -19,7 +19,7 @@ msgid ""
|
|||||||
msgstr ""
|
msgstr ""
|
||||||
"Project-Id-Version: PACKAGE VERSION\n"
|
"Project-Id-Version: PACKAGE VERSION\n"
|
||||||
"Report-Msgid-Bugs-To: \n"
|
"Report-Msgid-Bugs-To: \n"
|
||||||
"POT-Creation-Date: 2024-10-23 16:39+0000\n"
|
"POT-Creation-Date: 2024-11-26 00:09+0000\n"
|
||||||
"PO-Revision-Date: 2022-09-26 16:47+0000\n"
|
"PO-Revision-Date: 2022-09-26 16:47+0000\n"
|
||||||
"Last-Translator: Marc Schmitt, 2024\n"
|
"Last-Translator: Marc Schmitt, 2024\n"
|
||||||
"Language-Team: French (https://app.transifex.com/authentik/teams/119923/fr/)\n"
|
"Language-Team: French (https://app.transifex.com/authentik/teams/119923/fr/)\n"
|
||||||
@ -89,9 +89,9 @@ msgid "authentik Export - {date}"
|
|||||||
msgstr "Export authentik - {date}"
|
msgstr "Export authentik - {date}"
|
||||||
|
|
||||||
#: authentik/blueprints/v1/tasks.py authentik/crypto/tasks.py
|
#: authentik/blueprints/v1/tasks.py authentik/crypto/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Successfully imported %(count)d files."
|
msgid "Successfully imported {count} files."
|
||||||
msgstr " %(count)d fichiers importés avec succès."
|
msgstr "{count} fichiers importés avec succès."
|
||||||
|
|
||||||
#: authentik/brands/models.py
|
#: authentik/brands/models.py
|
||||||
msgid ""
|
msgid ""
|
||||||
@ -121,6 +121,10 @@ msgstr "Marque"
|
|||||||
msgid "Brands"
|
msgid "Brands"
|
||||||
msgstr "Marques"
|
msgstr "Marques"
|
||||||
|
|
||||||
|
#: authentik/core/api/devices.py
|
||||||
|
msgid "Extra description not available"
|
||||||
|
msgstr "Description supplémentaire indisponible"
|
||||||
|
|
||||||
#: authentik/core/api/providers.py
|
#: authentik/core/api/providers.py
|
||||||
msgid ""
|
msgid ""
|
||||||
"When not set all providers are returned. When set to true, only backchannel "
|
"When not set all providers are returned. When set to true, only backchannel "
|
||||||
@ -131,6 +135,11 @@ msgstr ""
|
|||||||
"fournisseurs backchannels sont retournés. Si faux, les fournisseurs "
|
"fournisseurs backchannels sont retournés. Si faux, les fournisseurs "
|
||||||
"backchannels sont exclus"
|
"backchannels sont exclus"
|
||||||
|
|
||||||
|
#: authentik/core/api/transactional_applications.py
|
||||||
|
#, python-brace-format
|
||||||
|
msgid "User lacks permission to create {model}"
|
||||||
|
msgstr "L'utilisateur manque de permission pour créer {model}"
|
||||||
|
|
||||||
#: authentik/core/api/users.py
|
#: authentik/core/api/users.py
|
||||||
msgid "No leading or trailing slashes allowed."
|
msgid "No leading or trailing slashes allowed."
|
||||||
msgstr ""
|
msgstr ""
|
||||||
@ -933,14 +942,14 @@ msgid "Starting full provider sync"
|
|||||||
msgstr "Démarrage d'une synchronisation complète du fournisseur"
|
msgstr "Démarrage d'une synchronisation complète du fournisseur"
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Syncing page %(page)d of users"
|
msgid "Syncing page {page} of users"
|
||||||
msgstr "Synchronisation de la page %(page)d d'utilisateurs"
|
msgstr "Synchronisation de la page {page} d'utilisateurs"
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Syncing page %(page)d of groups"
|
msgid "Syncing page {page} of groups"
|
||||||
msgstr "Synchronisation de la page %(page)d de groupes"
|
msgstr "Synchronisation de la page {page} de groupes"
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
#, python-brace-format
|
#, python-brace-format
|
||||||
@ -1113,11 +1122,11 @@ msgid "Event Matcher Policies"
|
|||||||
msgstr "Politiques d'association d'évènements"
|
msgstr "Politiques d'association d'évènements"
|
||||||
|
|
||||||
#: authentik/policies/expiry/models.py
|
#: authentik/policies/expiry/models.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Password expired %(days)d days ago. Please update your password."
|
msgid "Password expired {days} days ago. Please update your password."
|
||||||
msgstr ""
|
msgstr ""
|
||||||
"Mot de passe expiré il y a %(days)d jours. Merci de mettre à jour votre mot "
|
"Mot de passe expiré il y a {days} jours. Merci de mettre à jour votre mot de"
|
||||||
"de passe."
|
" passe."
|
||||||
|
|
||||||
#: authentik/policies/expiry/models.py
|
#: authentik/policies/expiry/models.py
|
||||||
msgid "Password has expired."
|
msgid "Password has expired."
|
||||||
@ -1249,9 +1258,13 @@ msgid "Password not set in context"
|
|||||||
msgstr "Mot de passe non défini dans le contexte"
|
msgstr "Mot de passe non défini dans le contexte"
|
||||||
|
|
||||||
#: authentik/policies/password/models.py
|
#: authentik/policies/password/models.py
|
||||||
#, python-format
|
msgid "Invalid password."
|
||||||
msgid "Password exists on %(count)d online lists."
|
msgstr "Mot de passe invalide."
|
||||||
msgstr "Le mot de passe existe sur %(count)d liste en ligne."
|
|
||||||
|
#: authentik/policies/password/models.py
|
||||||
|
#, python-brace-format
|
||||||
|
msgid "Password exists on {count} online lists."
|
||||||
|
msgstr "Le mot de passe existe sur {count} listes en ligne."
|
||||||
|
|
||||||
#: authentik/policies/password/models.py
|
#: authentik/policies/password/models.py
|
||||||
msgid "Password is too weak."
|
msgid "Password is too weak."
|
||||||
@ -1378,6 +1391,11 @@ msgstr "Fournisseurs LDAP"
|
|||||||
msgid "Search full LDAP directory"
|
msgid "Search full LDAP directory"
|
||||||
msgstr "Rechercher dans l'annuaire LDAP complet"
|
msgstr "Rechercher dans l'annuaire LDAP complet"
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/api/providers.py
|
||||||
|
#, python-brace-format
|
||||||
|
msgid "Invalid Regex Pattern: {url}"
|
||||||
|
msgstr "Pattern de regex invalide : {url}"
|
||||||
|
|
||||||
#: authentik/providers/oauth2/id_token.py
|
#: authentik/providers/oauth2/id_token.py
|
||||||
msgid "Based on the Hashed User ID"
|
msgid "Based on the Hashed User ID"
|
||||||
msgstr "Basé sur le hash de l'ID utilisateur"
|
msgstr "Basé sur le hash de l'ID utilisateur"
|
||||||
@ -1427,6 +1445,14 @@ msgstr ""
|
|||||||
"Chaque fournisseur a un émetteur différent, basé sur le slug de "
|
"Chaque fournisseur a un émetteur différent, basé sur le slug de "
|
||||||
"l'application."
|
"l'application."
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/models.py
|
||||||
|
msgid "Strict URL comparison"
|
||||||
|
msgstr "Comparaison stricte d'URL"
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/models.py
|
||||||
|
msgid "Regular Expression URL matching"
|
||||||
|
msgstr "Correspondance d'URL par expression régulière"
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
#: authentik/providers/oauth2/models.py
|
||||||
msgid "code (Authorization Code Flow)"
|
msgid "code (Authorization Code Flow)"
|
||||||
msgstr "code (Authorization Code Flow)"
|
msgstr "code (Authorization Code Flow)"
|
||||||
@ -1507,10 +1533,6 @@ msgstr "Secret du client"
|
|||||||
msgid "Redirect URIs"
|
msgid "Redirect URIs"
|
||||||
msgstr "URIs de redirection"
|
msgstr "URIs de redirection"
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
|
||||||
msgid "Enter each URI on a new line."
|
|
||||||
msgstr "Entrez chaque URI sur une nouvelle ligne."
|
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
#: authentik/providers/oauth2/models.py
|
||||||
msgid "Include claims in id_token"
|
msgid "Include claims in id_token"
|
||||||
msgstr "Include les demandes utilisateurs dans id_token"
|
msgstr "Include les demandes utilisateurs dans id_token"
|
||||||
@ -2889,13 +2911,8 @@ msgid "Captcha Stages"
|
|||||||
msgstr "Étapes de Captcha"
|
msgstr "Étapes de Captcha"
|
||||||
|
|
||||||
#: authentik/stages/captcha/stage.py
|
#: authentik/stages/captcha/stage.py
|
||||||
msgid "Unknown error"
|
msgid "Invalid captcha response. Retrying may solve this issue."
|
||||||
msgstr "Erreur inconnue"
|
msgstr "Réponse captcha invalide. Réessayer peut résoudre ce problème."
|
||||||
|
|
||||||
#: authentik/stages/captcha/stage.py
|
|
||||||
#, python-brace-format
|
|
||||||
msgid "Failed to validate token: {error}"
|
|
||||||
msgstr "Échec de validation du jeton : {error}"
|
|
||||||
|
|
||||||
#: authentik/stages/captcha/stage.py
|
#: authentik/stages/captcha/stage.py
|
||||||
msgid "Invalid captcha response"
|
msgid "Invalid captcha response"
|
||||||
@ -3562,6 +3579,11 @@ msgstr ""
|
|||||||
msgid "Globally enable/disable impersonation."
|
msgid "Globally enable/disable impersonation."
|
||||||
msgstr "Activer/désactiver l'appropriation utilisateur de manière globale."
|
msgstr "Activer/désactiver l'appropriation utilisateur de manière globale."
|
||||||
|
|
||||||
|
#: authentik/tenants/models.py
|
||||||
|
msgid "Require administrators to provide a reason for impersonating a user."
|
||||||
|
msgstr ""
|
||||||
|
"Forcer les administrateurs à fournir une raison d'appropriation utilisateur."
|
||||||
|
|
||||||
#: authentik/tenants/models.py
|
#: authentik/tenants/models.py
|
||||||
msgid "Default token duration"
|
msgid "Default token duration"
|
||||||
msgstr "Durée par défaut des jetons"
|
msgstr "Durée par défaut des jetons"
|
||||||
|
Binary file not shown.
@ -15,7 +15,7 @@ msgid ""
|
|||||||
msgstr ""
|
msgstr ""
|
||||||
"Project-Id-Version: PACKAGE VERSION\n"
|
"Project-Id-Version: PACKAGE VERSION\n"
|
||||||
"Report-Msgid-Bugs-To: \n"
|
"Report-Msgid-Bugs-To: \n"
|
||||||
"POT-Creation-Date: 2024-11-18 00:09+0000\n"
|
"POT-Creation-Date: 2024-11-26 00:09+0000\n"
|
||||||
"PO-Revision-Date: 2022-09-26 16:47+0000\n"
|
"PO-Revision-Date: 2022-09-26 16:47+0000\n"
|
||||||
"Last-Translator: deluxghost, 2024\n"
|
"Last-Translator: deluxghost, 2024\n"
|
||||||
"Language-Team: Chinese Simplified (https://app.transifex.com/authentik/teams/119923/zh-Hans/)\n"
|
"Language-Team: Chinese Simplified (https://app.transifex.com/authentik/teams/119923/zh-Hans/)\n"
|
||||||
@ -82,9 +82,9 @@ msgid "authentik Export - {date}"
|
|||||||
msgstr "authentik 导出 - {date}"
|
msgstr "authentik 导出 - {date}"
|
||||||
|
|
||||||
#: authentik/blueprints/v1/tasks.py authentik/crypto/tasks.py
|
#: authentik/blueprints/v1/tasks.py authentik/crypto/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Successfully imported %(count)d files."
|
msgid "Successfully imported {count} files."
|
||||||
msgstr "已成功导入 %(count)d 个文件。"
|
msgstr "已成功导入 {count} 个文件。"
|
||||||
|
|
||||||
#: authentik/brands/models.py
|
#: authentik/brands/models.py
|
||||||
msgid ""
|
msgid ""
|
||||||
@ -868,14 +868,14 @@ msgid "Starting full provider sync"
|
|||||||
msgstr "开始全量提供程序同步"
|
msgstr "开始全量提供程序同步"
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Syncing page %(page)d of users"
|
msgid "Syncing page {page} of users"
|
||||||
msgstr "正在同步用户页面 %(page)d"
|
msgstr "正在同步用户页面 {page}"
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Syncing page %(page)d of groups"
|
msgid "Syncing page {page} of groups"
|
||||||
msgstr "正在同步群组页面 %(page)d"
|
msgstr "正在同步群组页面 {page}"
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
#, python-brace-format
|
#, python-brace-format
|
||||||
@ -1026,9 +1026,9 @@ msgid "Event Matcher Policies"
|
|||||||
msgstr "事件匹配策略"
|
msgstr "事件匹配策略"
|
||||||
|
|
||||||
#: authentik/policies/expiry/models.py
|
#: authentik/policies/expiry/models.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Password expired %(days)d days ago. Please update your password."
|
msgid "Password expired {days} days ago. Please update your password."
|
||||||
msgstr "密码在 %(days)d 天前过期。请更新您的密码。"
|
msgstr "密码在 {days} 天前过期。请更新您的密码。"
|
||||||
|
|
||||||
#: authentik/policies/expiry/models.py
|
#: authentik/policies/expiry/models.py
|
||||||
msgid "Password has expired."
|
msgid "Password has expired."
|
||||||
@ -1154,9 +1154,9 @@ msgid "Invalid password."
|
|||||||
msgstr "无效密码。"
|
msgstr "无效密码。"
|
||||||
|
|
||||||
#: authentik/policies/password/models.py
|
#: authentik/policies/password/models.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Password exists on %(count)d online lists."
|
msgid "Password exists on {count} online lists."
|
||||||
msgstr "%(count)d 个在线列表中存在密码。"
|
msgstr "{count} 个在线列表中存在密码。"
|
||||||
|
|
||||||
#: authentik/policies/password/models.py
|
#: authentik/policies/password/models.py
|
||||||
msgid "Password is too weak."
|
msgid "Password is too weak."
|
||||||
@ -1275,6 +1275,11 @@ msgstr "LDAP 提供程序"
|
|||||||
msgid "Search full LDAP directory"
|
msgid "Search full LDAP directory"
|
||||||
msgstr "搜索完整 LDAP 目录"
|
msgstr "搜索完整 LDAP 目录"
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/api/providers.py
|
||||||
|
#, python-brace-format
|
||||||
|
msgid "Invalid Regex Pattern: {url}"
|
||||||
|
msgstr "无效的正则表达式模式:{url}"
|
||||||
|
|
||||||
#: authentik/providers/oauth2/id_token.py
|
#: authentik/providers/oauth2/id_token.py
|
||||||
msgid "Based on the Hashed User ID"
|
msgid "Based on the Hashed User ID"
|
||||||
msgstr "基于经过哈希处理的用户 ID"
|
msgstr "基于经过哈希处理的用户 ID"
|
||||||
@ -1317,6 +1322,14 @@ msgstr "所有提供程序都使用相同的标识符"
|
|||||||
msgid "Each provider has a different issuer, based on the application slug."
|
msgid "Each provider has a different issuer, based on the application slug."
|
||||||
msgstr "根据应用程序 Slug,每个提供程序都有不同的颁发者。"
|
msgstr "根据应用程序 Slug,每个提供程序都有不同的颁发者。"
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/models.py
|
||||||
|
msgid "Strict URL comparison"
|
||||||
|
msgstr "严格 URL 比较"
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/models.py
|
||||||
|
msgid "Regular Expression URL matching"
|
||||||
|
msgstr "正则表达式 URL 匹配"
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
#: authentik/providers/oauth2/models.py
|
||||||
msgid "code (Authorization Code Flow)"
|
msgid "code (Authorization Code Flow)"
|
||||||
msgstr "code(授权码流程)"
|
msgstr "code(授权码流程)"
|
||||||
@ -1393,10 +1406,6 @@ msgstr "客户端密钥"
|
|||||||
msgid "Redirect URIs"
|
msgid "Redirect URIs"
|
||||||
msgstr "重定向 URI"
|
msgstr "重定向 URI"
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
|
||||||
msgid "Enter each URI on a new line."
|
|
||||||
msgstr "每行输入一个 URI。"
|
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
#: authentik/providers/oauth2/models.py
|
||||||
msgid "Include claims in id_token"
|
msgid "Include claims in id_token"
|
||||||
msgstr "在 id_token 中包含声明"
|
msgstr "在 id_token 中包含声明"
|
||||||
|
@ -14,7 +14,7 @@ msgid ""
|
|||||||
msgstr ""
|
msgstr ""
|
||||||
"Project-Id-Version: PACKAGE VERSION\n"
|
"Project-Id-Version: PACKAGE VERSION\n"
|
||||||
"Report-Msgid-Bugs-To: \n"
|
"Report-Msgid-Bugs-To: \n"
|
||||||
"POT-Creation-Date: 2024-11-18 00:09+0000\n"
|
"POT-Creation-Date: 2024-11-26 00:09+0000\n"
|
||||||
"PO-Revision-Date: 2022-09-26 16:47+0000\n"
|
"PO-Revision-Date: 2022-09-26 16:47+0000\n"
|
||||||
"Last-Translator: deluxghost, 2024\n"
|
"Last-Translator: deluxghost, 2024\n"
|
||||||
"Language-Team: Chinese (China) (https://app.transifex.com/authentik/teams/119923/zh_CN/)\n"
|
"Language-Team: Chinese (China) (https://app.transifex.com/authentik/teams/119923/zh_CN/)\n"
|
||||||
@ -81,9 +81,9 @@ msgid "authentik Export - {date}"
|
|||||||
msgstr "authentik 导出 - {date}"
|
msgstr "authentik 导出 - {date}"
|
||||||
|
|
||||||
#: authentik/blueprints/v1/tasks.py authentik/crypto/tasks.py
|
#: authentik/blueprints/v1/tasks.py authentik/crypto/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Successfully imported %(count)d files."
|
msgid "Successfully imported {count} files."
|
||||||
msgstr "已成功导入 %(count)d 个文件。"
|
msgstr "已成功导入 {count} 个文件。"
|
||||||
|
|
||||||
#: authentik/brands/models.py
|
#: authentik/brands/models.py
|
||||||
msgid ""
|
msgid ""
|
||||||
@ -867,14 +867,14 @@ msgid "Starting full provider sync"
|
|||||||
msgstr "开始全量提供程序同步"
|
msgstr "开始全量提供程序同步"
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Syncing page %(page)d of users"
|
msgid "Syncing page {page} of users"
|
||||||
msgstr "正在同步用户页面 %(page)d"
|
msgstr "正在同步用户页面 {page}"
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Syncing page %(page)d of groups"
|
msgid "Syncing page {page} of groups"
|
||||||
msgstr "正在同步群组页面 %(page)d"
|
msgstr "正在同步群组页面 {page}"
|
||||||
|
|
||||||
#: authentik/lib/sync/outgoing/tasks.py
|
#: authentik/lib/sync/outgoing/tasks.py
|
||||||
#, python-brace-format
|
#, python-brace-format
|
||||||
@ -1025,9 +1025,9 @@ msgid "Event Matcher Policies"
|
|||||||
msgstr "事件匹配策略"
|
msgstr "事件匹配策略"
|
||||||
|
|
||||||
#: authentik/policies/expiry/models.py
|
#: authentik/policies/expiry/models.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Password expired %(days)d days ago. Please update your password."
|
msgid "Password expired {days} days ago. Please update your password."
|
||||||
msgstr "密码在 %(days)d 天前过期。请更新您的密码。"
|
msgstr "密码在 {days} 天前过期。请更新您的密码。"
|
||||||
|
|
||||||
#: authentik/policies/expiry/models.py
|
#: authentik/policies/expiry/models.py
|
||||||
msgid "Password has expired."
|
msgid "Password has expired."
|
||||||
@ -1153,9 +1153,9 @@ msgid "Invalid password."
|
|||||||
msgstr "无效密码。"
|
msgstr "无效密码。"
|
||||||
|
|
||||||
#: authentik/policies/password/models.py
|
#: authentik/policies/password/models.py
|
||||||
#, python-format
|
#, python-brace-format
|
||||||
msgid "Password exists on %(count)d online lists."
|
msgid "Password exists on {count} online lists."
|
||||||
msgstr "%(count)d 个在线列表中存在密码。"
|
msgstr "{count} 个在线列表中存在密码。"
|
||||||
|
|
||||||
#: authentik/policies/password/models.py
|
#: authentik/policies/password/models.py
|
||||||
msgid "Password is too weak."
|
msgid "Password is too weak."
|
||||||
@ -1274,6 +1274,11 @@ msgstr "LDAP 提供程序"
|
|||||||
msgid "Search full LDAP directory"
|
msgid "Search full LDAP directory"
|
||||||
msgstr "搜索完整 LDAP 目录"
|
msgstr "搜索完整 LDAP 目录"
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/api/providers.py
|
||||||
|
#, python-brace-format
|
||||||
|
msgid "Invalid Regex Pattern: {url}"
|
||||||
|
msgstr "无效的正则表达式模式:{url}"
|
||||||
|
|
||||||
#: authentik/providers/oauth2/id_token.py
|
#: authentik/providers/oauth2/id_token.py
|
||||||
msgid "Based on the Hashed User ID"
|
msgid "Based on the Hashed User ID"
|
||||||
msgstr "基于经过哈希处理的用户 ID"
|
msgstr "基于经过哈希处理的用户 ID"
|
||||||
@ -1316,6 +1321,14 @@ msgstr "所有提供程序都使用相同的标识符"
|
|||||||
msgid "Each provider has a different issuer, based on the application slug."
|
msgid "Each provider has a different issuer, based on the application slug."
|
||||||
msgstr "根据应用程序 Slug,每个提供程序都有不同的颁发者。"
|
msgstr "根据应用程序 Slug,每个提供程序都有不同的颁发者。"
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/models.py
|
||||||
|
msgid "Strict URL comparison"
|
||||||
|
msgstr "严格 URL 比较"
|
||||||
|
|
||||||
|
#: authentik/providers/oauth2/models.py
|
||||||
|
msgid "Regular Expression URL matching"
|
||||||
|
msgstr "正则表达式 URL 匹配"
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
#: authentik/providers/oauth2/models.py
|
||||||
msgid "code (Authorization Code Flow)"
|
msgid "code (Authorization Code Flow)"
|
||||||
msgstr "code(授权码流程)"
|
msgstr "code(授权码流程)"
|
||||||
@ -1392,10 +1405,6 @@ msgstr "客户端密钥"
|
|||||||
msgid "Redirect URIs"
|
msgid "Redirect URIs"
|
||||||
msgstr "重定向 URI"
|
msgstr "重定向 URI"
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
|
||||||
msgid "Enter each URI on a new line."
|
|
||||||
msgstr "每行输入一个 URI。"
|
|
||||||
|
|
||||||
#: authentik/providers/oauth2/models.py
|
#: authentik/providers/oauth2/models.py
|
||||||
msgid "Include claims in id_token"
|
msgid "Include claims in id_token"
|
||||||
msgstr "在 id_token 中包含声明"
|
msgstr "在 id_token 中包含声明"
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
{
|
{
|
||||||
"name": "@goauthentik/authentik",
|
"name": "@goauthentik/authentik",
|
||||||
"version": "2024.10.2",
|
"version": "2024.10.4",
|
||||||
"private": true
|
"private": true
|
||||||
}
|
}
|
||||||
|
965
poetry.lock
generated
965
poetry.lock
generated
File diff suppressed because it is too large
Load Diff
@ -1,6 +1,6 @@
|
|||||||
[tool.poetry]
|
[tool.poetry]
|
||||||
name = "authentik"
|
name = "authentik"
|
||||||
version = "2024.10.2"
|
version = "2024.10.4"
|
||||||
description = ""
|
description = ""
|
||||||
authors = ["authentik Team <hello@goauthentik.io>"]
|
authors = ["authentik Team <hello@goauthentik.io>"]
|
||||||
|
|
||||||
@ -131,7 +131,7 @@ pydantic-scim = "*"
|
|||||||
pyjwt = "*"
|
pyjwt = "*"
|
||||||
pyrad = "*"
|
pyrad = "*"
|
||||||
python = "~3.12"
|
python = "~3.12"
|
||||||
python-kadmin-rs = "0.2.0"
|
python-kadmin-rs = "0.3.0"
|
||||||
pyyaml = "*"
|
pyyaml = "*"
|
||||||
requests-oauthlib = "*"
|
requests-oauthlib = "*"
|
||||||
scim2-filter-parser = "*"
|
scim2-filter-parser = "*"
|
||||||
@ -153,12 +153,14 @@ xmlsec = "*"
|
|||||||
zxcvbn = "*"
|
zxcvbn = "*"
|
||||||
|
|
||||||
[tool.poetry.dev-dependencies]
|
[tool.poetry.dev-dependencies]
|
||||||
|
aws-cdk-lib = "*"
|
||||||
bandit = "*"
|
bandit = "*"
|
||||||
black = "*"
|
black = "*"
|
||||||
bump2version = "*"
|
bump2version = "*"
|
||||||
channels = { version = "*", extras = ["daphne"] }
|
channels = { version = "*", extras = ["daphne"] }
|
||||||
codespell = "*"
|
codespell = "*"
|
||||||
colorama = "*"
|
colorama = "*"
|
||||||
|
constructs = "*"
|
||||||
coverage = { extras = ["toml"], version = "*" }
|
coverage = { extras = ["toml"], version = "*" }
|
||||||
debugpy = "*"
|
debugpy = "*"
|
||||||
drf-jsonschema-serializer = "*"
|
drf-jsonschema-serializer = "*"
|
||||||
|
38
schema.yml
38
schema.yml
@ -1,7 +1,7 @@
|
|||||||
openapi: 3.0.3
|
openapi: 3.0.3
|
||||||
info:
|
info:
|
||||||
title: authentik
|
title: authentik
|
||||||
version: 2024.10.2
|
version: 2024.10.4
|
||||||
description: Making authentication simple.
|
description: Making authentication simple.
|
||||||
contact:
|
contact:
|
||||||
email: hello@goauthentik.io
|
email: hello@goauthentik.io
|
||||||
@ -44785,7 +44785,7 @@ components:
|
|||||||
allOf:
|
allOf:
|
||||||
- $ref: '#/components/schemas/IssuerModeEnum'
|
- $ref: '#/components/schemas/IssuerModeEnum'
|
||||||
description: Configure how the issuer field of the ID Token should be filled.
|
description: Configure how the issuer field of the ID Token should be filled.
|
||||||
jwks_sources:
|
jwt_federation_sources:
|
||||||
type: array
|
type: array
|
||||||
items:
|
items:
|
||||||
type: string
|
type: string
|
||||||
@ -44793,6 +44793,10 @@ components:
|
|||||||
title: Any JWT signed by the JWK of the selected source can be used to
|
title: Any JWT signed by the JWK of the selected source can be used to
|
||||||
authenticate.
|
authenticate.
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
||||||
|
jwt_federation_providers:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: integer
|
||||||
required:
|
required:
|
||||||
- assigned_application_name
|
- assigned_application_name
|
||||||
- assigned_application_slug
|
- assigned_application_slug
|
||||||
@ -44888,7 +44892,7 @@ components:
|
|||||||
allOf:
|
allOf:
|
||||||
- $ref: '#/components/schemas/IssuerModeEnum'
|
- $ref: '#/components/schemas/IssuerModeEnum'
|
||||||
description: Configure how the issuer field of the ID Token should be filled.
|
description: Configure how the issuer field of the ID Token should be filled.
|
||||||
jwks_sources:
|
jwt_federation_sources:
|
||||||
type: array
|
type: array
|
||||||
items:
|
items:
|
||||||
type: string
|
type: string
|
||||||
@ -44896,6 +44900,10 @@ components:
|
|||||||
title: Any JWT signed by the JWK of the selected source can be used to
|
title: Any JWT signed by the JWK of the selected source can be used to
|
||||||
authenticate.
|
authenticate.
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
||||||
|
jwt_federation_providers:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: integer
|
||||||
required:
|
required:
|
||||||
- authorization_flow
|
- authorization_flow
|
||||||
- invalidation_flow
|
- invalidation_flow
|
||||||
@ -48911,7 +48919,7 @@ components:
|
|||||||
allOf:
|
allOf:
|
||||||
- $ref: '#/components/schemas/IssuerModeEnum'
|
- $ref: '#/components/schemas/IssuerModeEnum'
|
||||||
description: Configure how the issuer field of the ID Token should be filled.
|
description: Configure how the issuer field of the ID Token should be filled.
|
||||||
jwks_sources:
|
jwt_federation_sources:
|
||||||
type: array
|
type: array
|
||||||
items:
|
items:
|
||||||
type: string
|
type: string
|
||||||
@ -48919,6 +48927,10 @@ components:
|
|||||||
title: Any JWT signed by the JWK of the selected source can be used to
|
title: Any JWT signed by the JWK of the selected source can be used to
|
||||||
authenticate.
|
authenticate.
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
||||||
|
jwt_federation_providers:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: integer
|
||||||
PatchedOAuthSourcePropertyMappingRequest:
|
PatchedOAuthSourcePropertyMappingRequest:
|
||||||
type: object
|
type: object
|
||||||
description: OAuthSourcePropertyMapping Serializer
|
description: OAuthSourcePropertyMapping Serializer
|
||||||
@ -49434,7 +49446,7 @@ components:
|
|||||||
header and authenticate requests based on its value.
|
header and authenticate requests based on its value.
|
||||||
cookie_domain:
|
cookie_domain:
|
||||||
type: string
|
type: string
|
||||||
jwks_sources:
|
jwt_federation_sources:
|
||||||
type: array
|
type: array
|
||||||
items:
|
items:
|
||||||
type: string
|
type: string
|
||||||
@ -49442,6 +49454,10 @@ components:
|
|||||||
title: Any JWT signed by the JWK of the selected source can be used to
|
title: Any JWT signed by the JWK of the selected source can be used to
|
||||||
authenticate.
|
authenticate.
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
||||||
|
jwt_federation_providers:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: integer
|
||||||
access_token_validity:
|
access_token_validity:
|
||||||
type: string
|
type: string
|
||||||
minLength: 1
|
minLength: 1
|
||||||
@ -51504,7 +51520,7 @@ components:
|
|||||||
readOnly: true
|
readOnly: true
|
||||||
cookie_domain:
|
cookie_domain:
|
||||||
type: string
|
type: string
|
||||||
jwks_sources:
|
jwt_federation_sources:
|
||||||
type: array
|
type: array
|
||||||
items:
|
items:
|
||||||
type: string
|
type: string
|
||||||
@ -51512,6 +51528,10 @@ components:
|
|||||||
title: Any JWT signed by the JWK of the selected source can be used to
|
title: Any JWT signed by the JWK of the selected source can be used to
|
||||||
authenticate.
|
authenticate.
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
||||||
|
jwt_federation_providers:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: integer
|
||||||
access_token_validity:
|
access_token_validity:
|
||||||
type: string
|
type: string
|
||||||
description: 'Tokens not valid on or after current time + this value (Format:
|
description: 'Tokens not valid on or after current time + this value (Format:
|
||||||
@ -51612,7 +51632,7 @@ components:
|
|||||||
header and authenticate requests based on its value.
|
header and authenticate requests based on its value.
|
||||||
cookie_domain:
|
cookie_domain:
|
||||||
type: string
|
type: string
|
||||||
jwks_sources:
|
jwt_federation_sources:
|
||||||
type: array
|
type: array
|
||||||
items:
|
items:
|
||||||
type: string
|
type: string
|
||||||
@ -51620,6 +51640,10 @@ components:
|
|||||||
title: Any JWT signed by the JWK of the selected source can be used to
|
title: Any JWT signed by the JWK of the selected source can be used to
|
||||||
authenticate.
|
authenticate.
|
||||||
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
title: Any JWT signed by the JWK of the selected source can be used to authenticate.
|
||||||
|
jwt_federation_providers:
|
||||||
|
type: array
|
||||||
|
items:
|
||||||
|
type: integer
|
||||||
access_token_validity:
|
access_token_validity:
|
||||||
type: string
|
type: string
|
||||||
minLength: 1
|
minLength: 1
|
||||||
|
@ -4,4 +4,4 @@ from time import time
|
|||||||
|
|
||||||
from authentik import __version__
|
from authentik import __version__
|
||||||
|
|
||||||
print("%s-%d" % (__version__, time()))
|
print(f"{__version__}-{int(time())}")
|
||||||
|
@ -3,6 +3,7 @@
|
|||||||
from json import loads
|
from json import loads
|
||||||
from pathlib import Path
|
from pathlib import Path
|
||||||
from time import sleep
|
from time import sleep
|
||||||
|
from unittest import skip
|
||||||
|
|
||||||
from selenium.webdriver.common.by import By
|
from selenium.webdriver.common.by import By
|
||||||
|
|
||||||
@ -123,6 +124,7 @@ class TestProviderProxyForward(SeleniumTestCase):
|
|||||||
title = session_end_stage.find_element(By.CSS_SELECTOR, ".pf-c-title.pf-m-3xl").text
|
title = session_end_stage.find_element(By.CSS_SELECTOR, ".pf-c-title.pf-m-3xl").text
|
||||||
self.assertIn("You've logged out of", title)
|
self.assertIn("You've logged out of", title)
|
||||||
|
|
||||||
|
@skip("Flaky test")
|
||||||
@retry()
|
@retry()
|
||||||
def test_nginx(self):
|
def test_nginx(self):
|
||||||
"""Test nginx"""
|
"""Test nginx"""
|
||||||
|
16
web/package-lock.json
generated
16
web/package-lock.json
generated
@ -23,7 +23,7 @@
|
|||||||
"@floating-ui/dom": "^1.6.11",
|
"@floating-ui/dom": "^1.6.11",
|
||||||
"@formatjs/intl-listformat": "^7.5.7",
|
"@formatjs/intl-listformat": "^7.5.7",
|
||||||
"@fortawesome/fontawesome-free": "^6.6.0",
|
"@fortawesome/fontawesome-free": "^6.6.0",
|
||||||
"@goauthentik/api": "^2024.10.2-1732206118",
|
"@goauthentik/api": "^2024.10.4-1733219849",
|
||||||
"@lit-labs/ssr": "^3.2.2",
|
"@lit-labs/ssr": "^3.2.2",
|
||||||
"@lit/context": "^1.1.2",
|
"@lit/context": "^1.1.2",
|
||||||
"@lit/localize": "^0.12.2",
|
"@lit/localize": "^0.12.2",
|
||||||
@ -84,7 +84,7 @@
|
|||||||
"@wdio/cli": "^9.1.2",
|
"@wdio/cli": "^9.1.2",
|
||||||
"@wdio/spec-reporter": "^9.1.2",
|
"@wdio/spec-reporter": "^9.1.2",
|
||||||
"chokidar": "^4.0.1",
|
"chokidar": "^4.0.1",
|
||||||
"chromedriver": "^130.0.4",
|
"chromedriver": "^131.0.1",
|
||||||
"esbuild": "^0.24.0",
|
"esbuild": "^0.24.0",
|
||||||
"eslint": "^9.11.1",
|
"eslint": "^9.11.1",
|
||||||
"eslint-plugin-lit": "^1.15.0",
|
"eslint-plugin-lit": "^1.15.0",
|
||||||
@ -1775,9 +1775,9 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/@goauthentik/api": {
|
"node_modules/@goauthentik/api": {
|
||||||
"version": "2024.10.2-1732206118",
|
"version": "2024.10.4-1733219849",
|
||||||
"resolved": "https://registry.npmjs.org/@goauthentik/api/-/api-2024.10.2-1732206118.tgz",
|
"resolved": "https://registry.npmjs.org/@goauthentik/api/-/api-2024.10.4-1733219849.tgz",
|
||||||
"integrity": "sha512-Zg90AJvGDquD3u73yIBKXFBDxsCljPxVqylylS6hgPzkLSogKVVkjhmKteWFXDrVxxsxo5XIa4FuTe3wAERyzw=="
|
"integrity": "sha512-Bls5D7PjtOytn2NqWUQEzKxeBql+kwwOWvBR+Dvo9fj7j6J5Sj5O/cIwGlKqN9q6p3ynSarstPv5YlLvYvPOGw=="
|
||||||
},
|
},
|
||||||
"node_modules/@goauthentik/web": {
|
"node_modules/@goauthentik/web": {
|
||||||
"resolved": "",
|
"resolved": "",
|
||||||
@ -8699,9 +8699,9 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"node_modules/chromedriver": {
|
"node_modules/chromedriver": {
|
||||||
"version": "130.0.4",
|
"version": "131.0.1",
|
||||||
"resolved": "https://registry.npmjs.org/chromedriver/-/chromedriver-130.0.4.tgz",
|
"resolved": "https://registry.npmjs.org/chromedriver/-/chromedriver-131.0.1.tgz",
|
||||||
"integrity": "sha512-lpR+PWXszij1k4Ig3t338Zvll9HtCTiwoLM7n4pCCswALHxzmgwaaIFBh3rt9+5wRk9D07oFblrazrBxwaYYAQ==",
|
"integrity": "sha512-LHRh+oaNU1WowJjAkWsviN8pTzQYJDbv/FvJyrQ7XhjKdIzVh/s3GV1iU7IjMTsxIQnBsTjx+9jWjzCWIXC7ug==",
|
||||||
"dev": true,
|
"dev": true,
|
||||||
"hasInstallScript": true,
|
"hasInstallScript": true,
|
||||||
"dependencies": {
|
"dependencies": {
|
||||||
|
@ -11,7 +11,7 @@
|
|||||||
"@floating-ui/dom": "^1.6.11",
|
"@floating-ui/dom": "^1.6.11",
|
||||||
"@formatjs/intl-listformat": "^7.5.7",
|
"@formatjs/intl-listformat": "^7.5.7",
|
||||||
"@fortawesome/fontawesome-free": "^6.6.0",
|
"@fortawesome/fontawesome-free": "^6.6.0",
|
||||||
"@goauthentik/api": "^2024.10.2-1732206118",
|
"@goauthentik/api": "^2024.10.4-1733219849",
|
||||||
"@lit-labs/ssr": "^3.2.2",
|
"@lit-labs/ssr": "^3.2.2",
|
||||||
"@lit/context": "^1.1.2",
|
"@lit/context": "^1.1.2",
|
||||||
"@lit/localize": "^0.12.2",
|
"@lit/localize": "^0.12.2",
|
||||||
@ -72,7 +72,7 @@
|
|||||||
"@wdio/cli": "^9.1.2",
|
"@wdio/cli": "^9.1.2",
|
||||||
"@wdio/spec-reporter": "^9.1.2",
|
"@wdio/spec-reporter": "^9.1.2",
|
||||||
"chokidar": "^4.0.1",
|
"chokidar": "^4.0.1",
|
||||||
"chromedriver": "^130.0.4",
|
"chromedriver": "^131.0.1",
|
||||||
"esbuild": "^0.24.0",
|
"esbuild": "^0.24.0",
|
||||||
"eslint": "^9.11.1",
|
"eslint": "^9.11.1",
|
||||||
"eslint-plugin-lit": "^1.15.0",
|
"eslint-plugin-lit": "^1.15.0",
|
||||||
|
@ -20,6 +20,9 @@ interface GlobalAuthentik {
|
|||||||
brand: {
|
brand: {
|
||||||
branding_logo: string;
|
branding_logo: string;
|
||||||
};
|
};
|
||||||
|
api: {
|
||||||
|
base: string;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
function ak(): GlobalAuthentik {
|
function ak(): GlobalAuthentik {
|
||||||
@ -41,7 +44,7 @@ class SimpleFlowExecutor {
|
|||||||
}
|
}
|
||||||
|
|
||||||
get apiURL() {
|
get apiURL() {
|
||||||
return `/api/v3/flows/executor/${this.flowSlug}/?query=${encodeURIComponent(window.location.search.substring(1))}`;
|
return `${ak().api.base}api/v3/flows/executor/${this.flowSlug}/?query=${encodeURIComponent(window.location.search.substring(1))}`;
|
||||||
}
|
}
|
||||||
|
|
||||||
start() {
|
start() {
|
||||||
|
@ -1,5 +1,6 @@
|
|||||||
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
import { EVENT_SIDEBAR_TOGGLE, VERSION } from "@goauthentik/common/constants";
|
import { EVENT_SIDEBAR_TOGGLE, VERSION } from "@goauthentik/common/constants";
|
||||||
|
import { globalAK } from "@goauthentik/common/global";
|
||||||
import { me } from "@goauthentik/common/users";
|
import { me } from "@goauthentik/common/users";
|
||||||
import { AKElement } from "@goauthentik/elements/Base";
|
import { AKElement } from "@goauthentik/elements/Base";
|
||||||
import {
|
import {
|
||||||
@ -112,7 +113,7 @@ export class AkAdminSidebar extends WithCapabilitiesConfig(AKElement) {
|
|||||||
|
|
||||||
// prettier-ignore
|
// prettier-ignore
|
||||||
const sidebarContent: SidebarEntry[] = [
|
const sidebarContent: SidebarEntry[] = [
|
||||||
["/if/user/", msg("User interface"), { "?isAbsoluteLink": true, "?highlight": true }],
|
[`${globalAK().api.base}if/user/`, msg("User interface"), { "?isAbsoluteLink": true, "?highlight": true }],
|
||||||
[null, msg("Dashboards"), { "?expanded": true }, [
|
[null, msg("Dashboards"), { "?expanded": true }, [
|
||||||
["/administration/overview", msg("Overview")],
|
["/administration/overview", msg("Overview")],
|
||||||
["/administration/dashboard/users", msg("User Statistics")],
|
["/administration/dashboard/users", msg("User Statistics")],
|
||||||
|
@ -1,23 +1,23 @@
|
|||||||
import "@goauthentik/admin/applications/wizard/ak-wizard-title";
|
import "@goauthentik/admin/applications/wizard/ak-wizard-title";
|
||||||
import "@goauthentik/admin/common/ak-crypto-certificate-search";
|
import "@goauthentik/admin/common/ak-crypto-certificate-search";
|
||||||
import "@goauthentik/admin/common/ak-flow-search/ak-branded-flow-search";
|
import "@goauthentik/admin/common/ak-flow-search/ak-branded-flow-search";
|
||||||
import {
|
|
||||||
makeOAuth2PropertyMappingsSelector,
|
|
||||||
oauth2PropertyMappingsProvider,
|
|
||||||
} from "@goauthentik/admin/providers/oauth2/OAuth2PropertyMappings.js";
|
|
||||||
import {
|
import {
|
||||||
clientTypeOptions,
|
clientTypeOptions,
|
||||||
issuerModeOptions,
|
issuerModeOptions,
|
||||||
redirectUriHelp,
|
redirectUriHelp,
|
||||||
subjectModeOptions,
|
subjectModeOptions,
|
||||||
} from "@goauthentik/admin/providers/oauth2/OAuth2ProviderForm";
|
} from "@goauthentik/admin/providers/oauth2/OAuth2ProviderForm";
|
||||||
|
import {
|
||||||
|
propertyMappingsProvider,
|
||||||
|
propertyMappingsSelector,
|
||||||
|
} from "@goauthentik/admin/providers/oauth2/OAuth2ProviderFormHelpers.js";
|
||||||
import {
|
import {
|
||||||
IRedirectURIInput,
|
IRedirectURIInput,
|
||||||
akOAuthRedirectURIInput,
|
akOAuthRedirectURIInput,
|
||||||
} from "@goauthentik/admin/providers/oauth2/OAuth2ProviderRedirectURI";
|
} from "@goauthentik/admin/providers/oauth2/OAuth2ProviderRedirectURI";
|
||||||
import {
|
import {
|
||||||
makeSourceSelector,
|
|
||||||
oauth2SourcesProvider,
|
oauth2SourcesProvider,
|
||||||
|
oauth2SourcesSelector,
|
||||||
} from "@goauthentik/admin/providers/oauth2/OAuth2Sources.js";
|
} from "@goauthentik/admin/providers/oauth2/OAuth2Sources.js";
|
||||||
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
import { ascii_letters, digits, first, randomString } from "@goauthentik/common/utils";
|
import { ascii_letters, digits, first, randomString } from "@goauthentik/common/utils";
|
||||||
@ -252,10 +252,8 @@ export class ApplicationWizardAuthenticationByOauth extends BaseProviderPanel {
|
|||||||
.errorMessages=${errors?.propertyMappings ?? []}
|
.errorMessages=${errors?.propertyMappings ?? []}
|
||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${oauth2PropertyMappingsProvider}
|
.provider=${propertyMappingsProvider}
|
||||||
.selector=${makeOAuth2PropertyMappingsSelector(
|
.selector=${propertyMappingsSelector(provider?.propertyMappings)}
|
||||||
provider?.propertyMappings,
|
|
||||||
)}
|
|
||||||
available-label=${msg("Available Scopes")}
|
available-label=${msg("Available Scopes")}
|
||||||
selected-label=${msg("Selected Scopes")}
|
selected-label=${msg("Selected Scopes")}
|
||||||
></ak-dual-select-dynamic-selected>
|
></ak-dual-select-dynamic-selected>
|
||||||
@ -309,7 +307,7 @@ export class ApplicationWizardAuthenticationByOauth extends BaseProviderPanel {
|
|||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${oauth2SourcesProvider}
|
.provider=${oauth2SourcesProvider}
|
||||||
.selector=${makeSourceSelector(provider?.jwksSources)}
|
.selector=${oauth2SourcesSelector(provider?.jwtFederationSources)}
|
||||||
available-label=${msg("Available Sources")}
|
available-label=${msg("Available Sources")}
|
||||||
selected-label=${msg("Selected Sources")}
|
selected-label=${msg("Selected Sources")}
|
||||||
></ak-dual-select-dynamic-selected>
|
></ak-dual-select-dynamic-selected>
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
import "@goauthentik/admin/applications/wizard/ak-wizard-title";
|
import "@goauthentik/admin/applications/wizard/ak-wizard-title";
|
||||||
import {
|
import {
|
||||||
makeSourceSelector,
|
|
||||||
oauth2SourcesProvider,
|
oauth2SourcesProvider,
|
||||||
|
oauth2SourcesSelector,
|
||||||
} from "@goauthentik/admin/providers/oauth2/OAuth2Sources.js";
|
} from "@goauthentik/admin/providers/oauth2/OAuth2Sources.js";
|
||||||
import {
|
import {
|
||||||
makeProxyPropertyMappingsSelector,
|
propertyMappingsProvider,
|
||||||
proxyPropertyMappingsProvider,
|
propertyMappingsSelector,
|
||||||
} from "@goauthentik/admin/providers/proxy/ProxyProviderPropertyMappings.js";
|
} from "@goauthentik/admin/providers/proxy/ProxyProviderFormHelpers.js";
|
||||||
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
import { first } from "@goauthentik/common/utils";
|
import { first } from "@goauthentik/common/utils";
|
||||||
import "@goauthentik/components/ak-switch-input";
|
import "@goauthentik/components/ak-switch-input";
|
||||||
@ -147,8 +147,8 @@ export class AkTypeProxyApplicationWizardPage extends BaseProviderPanel {
|
|||||||
name="propertyMappings"
|
name="propertyMappings"
|
||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${proxyPropertyMappingsProvider}
|
.provider=${propertyMappingsProvider}
|
||||||
.selector=${makeProxyPropertyMappingsSelector(
|
.selector=${propertyMappingsSelector(
|
||||||
this.instance?.propertyMappings,
|
this.instance?.propertyMappings,
|
||||||
)}
|
)}
|
||||||
available-label="${msg("Available Scopes")}"
|
available-label="${msg("Available Scopes")}"
|
||||||
@ -248,7 +248,9 @@ export class AkTypeProxyApplicationWizardPage extends BaseProviderPanel {
|
|||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${oauth2SourcesProvider}
|
.provider=${oauth2SourcesProvider}
|
||||||
.selector=${makeSourceSelector(this.instance?.jwksSources)}
|
.selector=${oauth2SourcesSelector(
|
||||||
|
this.instance?.jwtFederationSources,
|
||||||
|
)}
|
||||||
available-label=${msg("Available Sources")}
|
available-label=${msg("Available Sources")}
|
||||||
selected-label=${msg("Selected Sources")}
|
selected-label=${msg("Selected Sources")}
|
||||||
></ak-dual-select-dynamic-selected>
|
></ak-dual-select-dynamic-selected>
|
||||||
|
@ -1,9 +1,9 @@
|
|||||||
import "@goauthentik/admin/applications/wizard/ak-wizard-title";
|
import "@goauthentik/admin/applications/wizard/ak-wizard-title";
|
||||||
import "@goauthentik/admin/common/ak-flow-search/ak-flow-search";
|
import "@goauthentik/admin/common/ak-flow-search/ak-flow-search";
|
||||||
import {
|
import {
|
||||||
makeRACPropertyMappingsSelector,
|
propertyMappingsProvider,
|
||||||
racPropertyMappingsProvider,
|
propertyMappingsSelector,
|
||||||
} from "@goauthentik/admin/providers/rac/RACPropertyMappings.js";
|
} from "@goauthentik/admin/providers/rac/RACProviderFormHelpers.js";
|
||||||
import "@goauthentik/components/ak-text-input";
|
import "@goauthentik/components/ak-text-input";
|
||||||
import "@goauthentik/elements/CodeMirror";
|
import "@goauthentik/elements/CodeMirror";
|
||||||
import "@goauthentik/elements/ak-dual-select/ak-dual-select-dynamic-selected-provider.js";
|
import "@goauthentik/elements/ak-dual-select/ak-dual-select-dynamic-selected-provider.js";
|
||||||
@ -70,10 +70,8 @@ export class ApplicationWizardAuthenticationByRAC extends BaseProviderPanel {
|
|||||||
name="propertyMappings"
|
name="propertyMappings"
|
||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${racPropertyMappingsProvider}
|
.provider=${propertyMappingsProvider}
|
||||||
.selector=${makeRACPropertyMappingsSelector(
|
.selector=${propertyMappingsSelector(provider?.propertyMappings)}
|
||||||
provider?.propertyMappings,
|
|
||||||
)}
|
|
||||||
available-label="${msg("Available Property Mappings")}"
|
available-label="${msg("Available Property Mappings")}"
|
||||||
selected-label="${msg("Selected Property Mappings")}"
|
selected-label="${msg("Selected Property Mappings")}"
|
||||||
></ak-dual-select-dynamic-selected>
|
></ak-dual-select-dynamic-selected>
|
||||||
|
@ -1,7 +1,6 @@
|
|||||||
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
import { severityToLabel } from "@goauthentik/common/labels";
|
import { severityToLabel } from "@goauthentik/common/labels";
|
||||||
import "@goauthentik/elements/ak-dual-select/ak-dual-select-dynamic-selected-provider.js";
|
import "@goauthentik/elements/ak-dual-select/ak-dual-select-dynamic-selected-provider.js";
|
||||||
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types";
|
|
||||||
import "@goauthentik/elements/forms/HorizontalFormElement";
|
import "@goauthentik/elements/forms/HorizontalFormElement";
|
||||||
import { ModelForm } from "@goauthentik/elements/forms/ModelForm";
|
import { ModelForm } from "@goauthentik/elements/forms/ModelForm";
|
||||||
import "@goauthentik/elements/forms/Radio";
|
import "@goauthentik/elements/forms/Radio";
|
||||||
@ -18,32 +17,12 @@ import {
|
|||||||
EventsApi,
|
EventsApi,
|
||||||
Group,
|
Group,
|
||||||
NotificationRule,
|
NotificationRule,
|
||||||
NotificationTransport,
|
|
||||||
PaginatedNotificationTransportList,
|
PaginatedNotificationTransportList,
|
||||||
SeverityEnum,
|
SeverityEnum,
|
||||||
} from "@goauthentik/api";
|
} from "@goauthentik/api";
|
||||||
|
|
||||||
async function eventTransportsProvider(page = 1, search = "") {
|
import { eventTransportsProvider, eventTransportsSelector } from "./RuleFormHelpers.js";
|
||||||
const eventTransports = await new EventsApi(DEFAULT_CONFIG).eventsTransportsList({
|
|
||||||
ordering: "name",
|
|
||||||
pageSize: 20,
|
|
||||||
search: search.trim(),
|
|
||||||
page,
|
|
||||||
});
|
|
||||||
|
|
||||||
return {
|
|
||||||
pagination: eventTransports.pagination,
|
|
||||||
options: eventTransports.results.map((transport) => [transport.pk, transport.name]),
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
export function makeTransportSelector(instanceTransports: string[] | undefined) {
|
|
||||||
const localTransports = instanceTransports ? new Set(instanceTransports) : undefined;
|
|
||||||
|
|
||||||
return localTransports
|
|
||||||
? ([pk, _]: DualSelectPair) => localTransports.has(pk)
|
|
||||||
: ([_0, _1, _2, stage]: DualSelectPair<NotificationTransport>) => stage !== undefined;
|
|
||||||
}
|
|
||||||
@customElement("ak-event-rule-form")
|
@customElement("ak-event-rule-form")
|
||||||
export class RuleForm extends ModelForm<NotificationRule, string> {
|
export class RuleForm extends ModelForm<NotificationRule, string> {
|
||||||
eventTransports?: PaginatedNotificationTransportList;
|
eventTransports?: PaginatedNotificationTransportList;
|
||||||
@ -126,7 +105,7 @@ export class RuleForm extends ModelForm<NotificationRule, string> {
|
|||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${eventTransportsProvider}
|
.provider=${eventTransportsProvider}
|
||||||
.selector=${makeTransportSelector(this.instance?.transports)}
|
.selector=${eventTransportsSelector(this.instance?.transports)}
|
||||||
available-label="${msg("Available Transports")}"
|
available-label="${msg("Available Transports")}"
|
||||||
selected-label="${msg("Selected Transports")}"
|
selected-label="${msg("Selected Transports")}"
|
||||||
></ak-dual-select-dynamic-selected>
|
></ak-dual-select-dynamic-selected>
|
||||||
|
42
web/src/admin/events/RuleFormHelpers.ts
Normal file
42
web/src/admin/events/RuleFormHelpers.ts
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
|
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types";
|
||||||
|
|
||||||
|
import { EventsApi, NotificationTransport } from "@goauthentik/api";
|
||||||
|
|
||||||
|
const transportToSelect = (transport: NotificationTransport) => [transport.pk, transport.name];
|
||||||
|
|
||||||
|
export async function eventTransportsProvider(page = 1, search = "") {
|
||||||
|
const eventTransports = await new EventsApi(DEFAULT_CONFIG).eventsTransportsList({
|
||||||
|
ordering: "name",
|
||||||
|
pageSize: 20,
|
||||||
|
search: search.trim(),
|
||||||
|
page,
|
||||||
|
});
|
||||||
|
|
||||||
|
return {
|
||||||
|
pagination: eventTransports.pagination,
|
||||||
|
options: eventTransports.results.map(transportToSelect),
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
export function eventTransportsSelector(instanceTransports: string[] | undefined) {
|
||||||
|
if (!instanceTransports) {
|
||||||
|
return async (transports: DualSelectPair<NotificationTransport>[]) =>
|
||||||
|
transports.filter(
|
||||||
|
([_0, _1, _2, stage]: DualSelectPair<NotificationTransport>) => stage !== undefined,
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
return async () => {
|
||||||
|
const transportsApi = new EventsApi(DEFAULT_CONFIG);
|
||||||
|
const transports = await Promise.allSettled(
|
||||||
|
instanceTransports.map((instanceId) =>
|
||||||
|
transportsApi.eventsTransportsRetrieve({ uuid: instanceId }),
|
||||||
|
),
|
||||||
|
);
|
||||||
|
return transports
|
||||||
|
.filter((s) => s.status === "fulfilled")
|
||||||
|
.map((s) => s.value)
|
||||||
|
.map(transportToSelect);
|
||||||
|
};
|
||||||
|
}
|
@ -1,8 +1,8 @@
|
|||||||
import { BaseProviderForm } from "@goauthentik/admin/providers/BaseProviderForm";
|
import { BaseProviderForm } from "@goauthentik/admin/providers/BaseProviderForm";
|
||||||
import {
|
import {
|
||||||
googleWorkspacePropertyMappingsProvider,
|
propertyMappingsProvider,
|
||||||
makeGoogleWorkspacePropertyMappingsSelector,
|
propertyMappingsSelector,
|
||||||
} from "@goauthentik/admin/providers/google_workspace/GoogleWorkspaceProviderPropertyMappings";
|
} from "@goauthentik/admin/providers/google_workspace/GoogleWorkspaceProviderFormHelpers.js";
|
||||||
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
import { first } from "@goauthentik/common/utils";
|
import { first } from "@goauthentik/common/utils";
|
||||||
import "@goauthentik/elements/CodeMirror";
|
import "@goauthentik/elements/CodeMirror";
|
||||||
@ -224,8 +224,8 @@ export class GoogleWorkspaceProviderFormPage extends BaseProviderForm<GoogleWork
|
|||||||
name="propertyMappings"
|
name="propertyMappings"
|
||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${googleWorkspacePropertyMappingsProvider}
|
.provider=${propertyMappingsProvider}
|
||||||
.selector=${makeGoogleWorkspacePropertyMappingsSelector(
|
.selector=${propertyMappingsSelector(
|
||||||
this.instance?.propertyMappings,
|
this.instance?.propertyMappings,
|
||||||
"goauthentik.io/providers/google_workspace/user",
|
"goauthentik.io/providers/google_workspace/user",
|
||||||
)}
|
)}
|
||||||
@ -241,8 +241,8 @@ export class GoogleWorkspaceProviderFormPage extends BaseProviderForm<GoogleWork
|
|||||||
name="propertyMappingsGroup"
|
name="propertyMappingsGroup"
|
||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${googleWorkspacePropertyMappingsProvider}
|
.provider=${propertyMappingsProvider}
|
||||||
.selector=${makeGoogleWorkspacePropertyMappingsSelector(
|
.selector=${propertyMappingsSelector(
|
||||||
this.instance?.propertyMappingsGroup,
|
this.instance?.propertyMappingsGroup,
|
||||||
"goauthentik.io/providers/google_workspace/group",
|
"goauthentik.io/providers/google_workspace/group",
|
||||||
)}
|
)}
|
||||||
|
@ -0,0 +1,48 @@
|
|||||||
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
|
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types.js";
|
||||||
|
|
||||||
|
import { GoogleWorkspaceProviderMapping, PropertymappingsApi } from "@goauthentik/api";
|
||||||
|
|
||||||
|
const mappingToSelect = (m: GoogleWorkspaceProviderMapping) => [m.pk, m.name, m.name, m];
|
||||||
|
|
||||||
|
export async function propertyMappingsProvider(page = 1, search = "") {
|
||||||
|
const propertyMappings = await new PropertymappingsApi(
|
||||||
|
DEFAULT_CONFIG,
|
||||||
|
).propertymappingsProviderGoogleWorkspaceList({
|
||||||
|
ordering: "managed",
|
||||||
|
pageSize: 20,
|
||||||
|
search: search.trim(),
|
||||||
|
page,
|
||||||
|
});
|
||||||
|
return {
|
||||||
|
pagination: propertyMappings.pagination,
|
||||||
|
options: propertyMappings.results.map(mappingToSelect),
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
export function propertyMappingsSelector(
|
||||||
|
instanceMappings: string[] | undefined,
|
||||||
|
defaultSelection: string,
|
||||||
|
) {
|
||||||
|
if (!instanceMappings) {
|
||||||
|
return async (mappings: DualSelectPair<GoogleWorkspaceProviderMapping>[]) =>
|
||||||
|
mappings.filter(
|
||||||
|
([_0, _1, _2, mapping]: DualSelectPair<GoogleWorkspaceProviderMapping>) =>
|
||||||
|
mapping?.managed === defaultSelection,
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
return async () => {
|
||||||
|
const pm = new PropertymappingsApi(DEFAULT_CONFIG);
|
||||||
|
const mappings = await Promise.allSettled(
|
||||||
|
instanceMappings.map((instanceId) =>
|
||||||
|
pm.propertymappingsProviderGoogleWorkspaceRetrieve({ pmUuid: instanceId }),
|
||||||
|
),
|
||||||
|
);
|
||||||
|
|
||||||
|
return mappings
|
||||||
|
.filter((s) => s.status === "fulfilled")
|
||||||
|
.map((s) => s.value)
|
||||||
|
.map(mappingToSelect);
|
||||||
|
};
|
||||||
|
}
|
@ -1,30 +0,0 @@
|
|||||||
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
|
||||||
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types.js";
|
|
||||||
|
|
||||||
import { PropertymappingsApi, ScopeMapping } from "@goauthentik/api";
|
|
||||||
|
|
||||||
export async function googleWorkspacePropertyMappingsProvider(page = 1, search = "") {
|
|
||||||
const propertyMappings = await new PropertymappingsApi(
|
|
||||||
DEFAULT_CONFIG,
|
|
||||||
).propertymappingsProviderGoogleWorkspaceList({
|
|
||||||
ordering: "managed",
|
|
||||||
pageSize: 20,
|
|
||||||
search: search.trim(),
|
|
||||||
page,
|
|
||||||
});
|
|
||||||
return {
|
|
||||||
pagination: propertyMappings.pagination,
|
|
||||||
options: propertyMappings.results.map((scope) => [scope.pk, scope.name, scope.name, scope]),
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
export function makeGoogleWorkspacePropertyMappingsSelector(
|
|
||||||
instanceMappings: string[] | undefined,
|
|
||||||
defaultSelection: string,
|
|
||||||
) {
|
|
||||||
const localMappings = instanceMappings ? new Set(instanceMappings) : undefined;
|
|
||||||
return localMappings
|
|
||||||
? ([pk, _]: DualSelectPair) => localMappings.has(pk)
|
|
||||||
: ([_0, _1, _2, scope]: DualSelectPair<ScopeMapping>) =>
|
|
||||||
scope?.managed === defaultSelection;
|
|
||||||
}
|
|
46
web/src/admin/providers/ldap/LDAPProviderFormHelpers.ts
Normal file
46
web/src/admin/providers/ldap/LDAPProviderFormHelpers.ts
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
|
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types.js";
|
||||||
|
|
||||||
|
import { LDAPSourcePropertyMapping, PropertymappingsApi } from "@goauthentik/api";
|
||||||
|
|
||||||
|
const mappingToSelect = (m: LDAPSourcePropertyMapping) => [m.pk, m.name, m.name, m];
|
||||||
|
|
||||||
|
export async function propertyMappingsProvider(page = 1, search = "") {
|
||||||
|
const propertyMappings = await new PropertymappingsApi(
|
||||||
|
DEFAULT_CONFIG,
|
||||||
|
).propertymappingsSourceLdapList({
|
||||||
|
ordering: "managed",
|
||||||
|
pageSize: 20,
|
||||||
|
search: search.trim(),
|
||||||
|
page,
|
||||||
|
});
|
||||||
|
return {
|
||||||
|
pagination: propertyMappings.pagination,
|
||||||
|
options: propertyMappings.results.map(mappingToSelect),
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
export function propertyMappingsSelector(instanceMappings?: string[]) {
|
||||||
|
if (!instanceMappings) {
|
||||||
|
return async (transports: DualSelectPair<LDAPSourcePropertyMapping>[]) =>
|
||||||
|
transports.filter(
|
||||||
|
([_0, _1, _2, mapping]: DualSelectPair<LDAPSourcePropertyMapping>) =>
|
||||||
|
mapping?.managed?.startsWith("goauthentik.io/sources/ldap/default") ||
|
||||||
|
mapping?.managed?.startsWith("goauthentik.io/sources/ldap/ms"),
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
return async () => {
|
||||||
|
const pm = new PropertymappingsApi(DEFAULT_CONFIG);
|
||||||
|
const mappings = await Promise.allSettled(
|
||||||
|
instanceMappings.map((instanceId) =>
|
||||||
|
pm.propertymappingsSourceLdapRetrieve({ pmUuid: instanceId }),
|
||||||
|
),
|
||||||
|
);
|
||||||
|
|
||||||
|
return mappings
|
||||||
|
.filter((s) => s.status === "fulfilled")
|
||||||
|
.map((s) => s.value)
|
||||||
|
.map(mappingToSelect);
|
||||||
|
};
|
||||||
|
}
|
@ -1,8 +1,8 @@
|
|||||||
import { BaseProviderForm } from "@goauthentik/admin/providers/BaseProviderForm";
|
import { BaseProviderForm } from "@goauthentik/admin/providers/BaseProviderForm";
|
||||||
import {
|
import {
|
||||||
makeMicrosoftEntraPropertyMappingsSelector,
|
propertyMappingsProvider,
|
||||||
microsoftEntraPropertyMappingsProvider,
|
propertyMappingsSelector,
|
||||||
} from "@goauthentik/admin/providers/microsoft_entra/MicrosoftEntraProviderPropertyMappings";
|
} from "@goauthentik/admin/providers/microsoft_entra/MicrosoftEntraProviderFormHelpers.js";
|
||||||
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
import { first } from "@goauthentik/common/utils";
|
import { first } from "@goauthentik/common/utils";
|
||||||
import "@goauthentik/elements/ak-dual-select/ak-dual-select-dynamic-selected-provider.js";
|
import "@goauthentik/elements/ak-dual-select/ak-dual-select-dynamic-selected-provider.js";
|
||||||
@ -213,8 +213,8 @@ export class MicrosoftEntraProviderFormPage extends BaseProviderForm<MicrosoftEn
|
|||||||
name="propertyMappings"
|
name="propertyMappings"
|
||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${microsoftEntraPropertyMappingsProvider}
|
.provider=${propertyMappingsProvider}
|
||||||
.selector=${makeMicrosoftEntraPropertyMappingsSelector(
|
.selector=${propertyMappingsSelector(
|
||||||
this.instance?.propertyMappings,
|
this.instance?.propertyMappings,
|
||||||
"goauthentik.io/providers/microsoft_entra/user",
|
"goauthentik.io/providers/microsoft_entra/user",
|
||||||
)}
|
)}
|
||||||
@ -230,8 +230,8 @@ export class MicrosoftEntraProviderFormPage extends BaseProviderForm<MicrosoftEn
|
|||||||
name="propertyMappingsGroup"
|
name="propertyMappingsGroup"
|
||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${microsoftEntraPropertyMappingsProvider}
|
.provider=${propertyMappingsProvider}
|
||||||
.selector=${makeMicrosoftEntraPropertyMappingsSelector(
|
.selector=${propertyMappingsSelector(
|
||||||
this.instance?.propertyMappingsGroup,
|
this.instance?.propertyMappingsGroup,
|
||||||
"goauthentik.io/providers/microsoft_entra/group",
|
"goauthentik.io/providers/microsoft_entra/group",
|
||||||
)}
|
)}
|
||||||
|
@ -0,0 +1,48 @@
|
|||||||
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
|
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types.js";
|
||||||
|
|
||||||
|
import { MicrosoftEntraProviderMapping, PropertymappingsApi } from "@goauthentik/api";
|
||||||
|
|
||||||
|
const mappingToSelect = (m: MicrosoftEntraProviderMapping) => [m.pk, m.name, m.name, m];
|
||||||
|
|
||||||
|
export async function propertyMappingsProvider(page = 1, search = "") {
|
||||||
|
const propertyMappings = await new PropertymappingsApi(
|
||||||
|
DEFAULT_CONFIG,
|
||||||
|
).propertymappingsProviderMicrosoftEntraList({
|
||||||
|
ordering: "managed",
|
||||||
|
pageSize: 20,
|
||||||
|
search: search.trim(),
|
||||||
|
page,
|
||||||
|
});
|
||||||
|
return {
|
||||||
|
pagination: propertyMappings.pagination,
|
||||||
|
options: propertyMappings.results.map(mappingToSelect),
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
export function propertyMappingsSelector(
|
||||||
|
instanceMappings: string[] | undefined,
|
||||||
|
defaultSelection: string,
|
||||||
|
) {
|
||||||
|
if (!instanceMappings) {
|
||||||
|
return async (mappings: DualSelectPair<MicrosoftEntraProviderMapping>[]) =>
|
||||||
|
mappings.filter(
|
||||||
|
([_0, _1, _2, mapping]: DualSelectPair<MicrosoftEntraProviderMapping>) =>
|
||||||
|
mapping?.managed === defaultSelection,
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
return async () => {
|
||||||
|
const pm = new PropertymappingsApi(DEFAULT_CONFIG);
|
||||||
|
const mappings = await Promise.allSettled(
|
||||||
|
instanceMappings.map((instanceId) =>
|
||||||
|
pm.propertymappingsProviderMicrosoftEntraRetrieve({ pmUuid: instanceId }),
|
||||||
|
),
|
||||||
|
);
|
||||||
|
|
||||||
|
return mappings
|
||||||
|
.filter((s) => s.status === "fulfilled")
|
||||||
|
.map((s) => s.value)
|
||||||
|
.map(mappingToSelect);
|
||||||
|
};
|
||||||
|
}
|
@ -1,33 +0,0 @@
|
|||||||
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
|
||||||
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types.js";
|
|
||||||
|
|
||||||
import { PropertymappingsApi, ScopeMapping } from "@goauthentik/api";
|
|
||||||
|
|
||||||
export const defaultScopes = [
|
|
||||||
"goauthentik.io/providers/oauth2/scope-openid",
|
|
||||||
"goauthentik.io/providers/oauth2/scope-email",
|
|
||||||
"goauthentik.io/providers/oauth2/scope-profile",
|
|
||||||
];
|
|
||||||
|
|
||||||
export async function oauth2PropertyMappingsProvider(page = 1, search = "") {
|
|
||||||
const propertyMappings = await new PropertymappingsApi(
|
|
||||||
DEFAULT_CONFIG,
|
|
||||||
).propertymappingsProviderScopeList({
|
|
||||||
ordering: "scope_name",
|
|
||||||
pageSize: 20,
|
|
||||||
search: search.trim(),
|
|
||||||
page,
|
|
||||||
});
|
|
||||||
return {
|
|
||||||
pagination: propertyMappings.pagination,
|
|
||||||
options: propertyMappings.results.map((scope) => [scope.pk, scope.name, scope.name, scope]),
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
export function makeOAuth2PropertyMappingsSelector(instanceMappings: string[] | undefined) {
|
|
||||||
const localMappings = instanceMappings ? new Set(instanceMappings) : undefined;
|
|
||||||
return localMappings
|
|
||||||
? ([pk, _]: DualSelectPair) => localMappings.has(pk)
|
|
||||||
: ([_0, _1, _2, scope]: DualSelectPair<ScopeMapping>) =>
|
|
||||||
scope?.managed && defaultScopes.includes(scope?.managed);
|
|
||||||
}
|
|
@ -13,6 +13,7 @@ import "@goauthentik/components/ak-textarea-input";
|
|||||||
import "@goauthentik/elements/ak-array-input.js";
|
import "@goauthentik/elements/ak-array-input.js";
|
||||||
import "@goauthentik/elements/ak-dual-select/ak-dual-select-dynamic-selected-provider.js";
|
import "@goauthentik/elements/ak-dual-select/ak-dual-select-dynamic-selected-provider.js";
|
||||||
import "@goauthentik/elements/ak-dual-select/ak-dual-select-provider.js";
|
import "@goauthentik/elements/ak-dual-select/ak-dual-select-provider.js";
|
||||||
|
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types";
|
||||||
import "@goauthentik/elements/forms/FormGroup";
|
import "@goauthentik/elements/forms/FormGroup";
|
||||||
import "@goauthentik/elements/forms/HorizontalFormElement";
|
import "@goauthentik/elements/forms/HorizontalFormElement";
|
||||||
import "@goauthentik/elements/forms/Radio";
|
import "@goauthentik/elements/forms/Radio";
|
||||||
@ -35,11 +36,8 @@ import {
|
|||||||
SubModeEnum,
|
SubModeEnum,
|
||||||
} from "@goauthentik/api";
|
} from "@goauthentik/api";
|
||||||
|
|
||||||
import {
|
import { propertyMappingsProvider, propertyMappingsSelector } from "./OAuth2ProviderFormHelpers.js";
|
||||||
makeOAuth2PropertyMappingsSelector,
|
import { oauth2SourcesProvider, oauth2SourcesSelector } from "./OAuth2Sources.js";
|
||||||
oauth2PropertyMappingsProvider,
|
|
||||||
} from "./OAuth2PropertyMappings.js";
|
|
||||||
import { makeSourceSelector, oauth2SourcesProvider } from "./OAuth2Sources.js";
|
|
||||||
|
|
||||||
export const clientTypeOptions = [
|
export const clientTypeOptions = [
|
||||||
{
|
{
|
||||||
@ -119,6 +117,45 @@ export const redirectUriHelp = html`${redirectUriHelpMessages.map(
|
|||||||
(m) => html`<p class="pf-c-form__helper-text">${m}</p>`,
|
(m) => html`<p class="pf-c-form__helper-text">${m}</p>`,
|
||||||
)}`;
|
)}`;
|
||||||
|
|
||||||
|
const providerToSelect = (provider: OAuth2Provider) => [provider.pk, provider.name];
|
||||||
|
|
||||||
|
export async function oauth2ProvidersProvider(page = 1, search = "") {
|
||||||
|
const oauthProviders = await new ProvidersApi(DEFAULT_CONFIG).providersOauth2List({
|
||||||
|
ordering: "name",
|
||||||
|
pageSize: 20,
|
||||||
|
search: search.trim(),
|
||||||
|
page,
|
||||||
|
});
|
||||||
|
|
||||||
|
return {
|
||||||
|
pagination: oauthProviders.pagination,
|
||||||
|
options: oauthProviders.results.map((provider) => providerToSelect(provider)),
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
export function oauth2ProviderSelector(instanceProviders: number[] | undefined) {
|
||||||
|
if (!instanceProviders) {
|
||||||
|
return async (mappings: DualSelectPair<OAuth2Provider>[]) =>
|
||||||
|
mappings.filter(
|
||||||
|
([_0, _1, _2, source]: DualSelectPair<OAuth2Provider>) => source !== undefined,
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
return async () => {
|
||||||
|
const oauthSources = new ProvidersApi(DEFAULT_CONFIG);
|
||||||
|
const mappings = await Promise.allSettled(
|
||||||
|
instanceProviders.map((instanceId) =>
|
||||||
|
oauthSources.providersOauth2Retrieve({ id: instanceId }),
|
||||||
|
),
|
||||||
|
);
|
||||||
|
|
||||||
|
return mappings
|
||||||
|
.filter((s) => s.status === "fulfilled")
|
||||||
|
.map((s) => s.value)
|
||||||
|
.map(providerToSelect);
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Form page for OAuth2 Authentication Method
|
* Form page for OAuth2 Authentication Method
|
||||||
*
|
*
|
||||||
@ -335,10 +372,8 @@ export class OAuth2ProviderFormPage extends BaseProviderForm<OAuth2Provider> {
|
|||||||
</ak-text-input>
|
</ak-text-input>
|
||||||
<ak-form-element-horizontal label=${msg("Scopes")} name="propertyMappings">
|
<ak-form-element-horizontal label=${msg("Scopes")} name="propertyMappings">
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${oauth2PropertyMappingsProvider}
|
.provider=${propertyMappingsProvider}
|
||||||
.selector=${makeOAuth2PropertyMappingsSelector(
|
.selector=${propertyMappingsSelector(provider?.propertyMappings)}
|
||||||
provider?.propertyMappings,
|
|
||||||
)}
|
|
||||||
available-label=${msg("Available Scopes")}
|
available-label=${msg("Available Scopes")}
|
||||||
selected-label=${msg("Selected Scopes")}
|
selected-label=${msg("Selected Scopes")}
|
||||||
></ak-dual-select-dynamic-selected>
|
></ak-dual-select-dynamic-selected>
|
||||||
@ -386,12 +421,12 @@ export class OAuth2ProviderFormPage extends BaseProviderForm<OAuth2Provider> {
|
|||||||
<span slot="header">${msg("Machine-to-Machine authentication settings")}</span>
|
<span slot="header">${msg("Machine-to-Machine authentication settings")}</span>
|
||||||
<div slot="body" class="pf-c-form">
|
<div slot="body" class="pf-c-form">
|
||||||
<ak-form-element-horizontal
|
<ak-form-element-horizontal
|
||||||
label=${msg("Trusted OIDC Sources")}
|
label=${msg("Federated OIDC Sources")}
|
||||||
name="jwksSources"
|
name="jwtFederationSources"
|
||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${oauth2SourcesProvider}
|
.provider=${oauth2SourcesProvider}
|
||||||
.selector=${makeSourceSelector(provider?.jwksSources)}
|
.selector=${oauth2SourcesSelector(provider?.jwtFederationSources)}
|
||||||
available-label=${msg("Available Sources")}
|
available-label=${msg("Available Sources")}
|
||||||
selected-label=${msg("Selected Sources")}
|
selected-label=${msg("Selected Sources")}
|
||||||
></ak-dual-select-dynamic-selected>
|
></ak-dual-select-dynamic-selected>
|
||||||
@ -401,6 +436,22 @@ export class OAuth2ProviderFormPage extends BaseProviderForm<OAuth2Provider> {
|
|||||||
)}
|
)}
|
||||||
</p>
|
</p>
|
||||||
</ak-form-element-horizontal>
|
</ak-form-element-horizontal>
|
||||||
|
<ak-form-element-horizontal
|
||||||
|
label=${msg("Federated OIDC Providers")}
|
||||||
|
name="jwtFederationProviders"
|
||||||
|
>
|
||||||
|
<ak-dual-select-dynamic-selected
|
||||||
|
.provider=${oauth2ProvidersProvider}
|
||||||
|
.selector=${oauth2ProviderSelector(provider?.jwtFederationProviders)}
|
||||||
|
available-label=${msg("Available Providers")}
|
||||||
|
selected-label=${msg("Selected Providers")}
|
||||||
|
></ak-dual-select-dynamic-selected>
|
||||||
|
<p class="pf-c-form__helper-text">
|
||||||
|
${msg(
|
||||||
|
"JWTs signed by the selected providers can be used to authenticate to this provider.",
|
||||||
|
)}
|
||||||
|
</p>
|
||||||
|
</ak-form-element-horizontal>
|
||||||
</div>
|
</div>
|
||||||
</ak-form-group>`;
|
</ak-form-group>`;
|
||||||
}
|
}
|
||||||
|
51
web/src/admin/providers/oauth2/OAuth2ProviderFormHelpers.ts
Normal file
51
web/src/admin/providers/oauth2/OAuth2ProviderFormHelpers.ts
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
|
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types.js";
|
||||||
|
|
||||||
|
import { PropertymappingsApi, ScopeMapping } from "@goauthentik/api";
|
||||||
|
|
||||||
|
export const defaultScopes = [
|
||||||
|
"goauthentik.io/providers/oauth2/scope-openid",
|
||||||
|
"goauthentik.io/providers/oauth2/scope-email",
|
||||||
|
"goauthentik.io/providers/oauth2/scope-profile",
|
||||||
|
];
|
||||||
|
|
||||||
|
const mappingToSelect = (s: ScopeMapping) => [s.pk, s.name, s.name, s];
|
||||||
|
|
||||||
|
export async function propertyMappingsProvider(page = 1, search = "") {
|
||||||
|
const propertyMappings = await new PropertymappingsApi(
|
||||||
|
DEFAULT_CONFIG,
|
||||||
|
).propertymappingsProviderScopeList({
|
||||||
|
ordering: "scope_name",
|
||||||
|
pageSize: 20,
|
||||||
|
search: search.trim(),
|
||||||
|
page,
|
||||||
|
});
|
||||||
|
return {
|
||||||
|
pagination: propertyMappings.pagination,
|
||||||
|
options: propertyMappings.results.map(mappingToSelect),
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
export function propertyMappingsSelector(instanceMappings?: string[]) {
|
||||||
|
if (!instanceMappings) {
|
||||||
|
return async (mappings: DualSelectPair<ScopeMapping>[]) =>
|
||||||
|
mappings.filter(
|
||||||
|
([_0, _1, _2, scope]: DualSelectPair<ScopeMapping>) =>
|
||||||
|
scope?.managed && defaultScopes.includes(scope?.managed),
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
return async () => {
|
||||||
|
const pm = new PropertymappingsApi(DEFAULT_CONFIG);
|
||||||
|
const mappings = await Promise.allSettled(
|
||||||
|
instanceMappings.map((instanceId) =>
|
||||||
|
pm.propertymappingsProviderScopeRetrieve({ pmUuid: instanceId }),
|
||||||
|
),
|
||||||
|
);
|
||||||
|
|
||||||
|
return mappings
|
||||||
|
.filter((s) => s.status === "fulfilled")
|
||||||
|
.map((s) => s.value)
|
||||||
|
.map(mappingToSelect);
|
||||||
|
};
|
||||||
|
}
|
@ -3,6 +3,13 @@ import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types";
|
|||||||
|
|
||||||
import { OAuthSource, SourcesApi } from "@goauthentik/api";
|
import { OAuthSource, SourcesApi } from "@goauthentik/api";
|
||||||
|
|
||||||
|
const sourceToSelect = (source: OAuthSource) => [
|
||||||
|
source.pk,
|
||||||
|
`${source.name} (${source.slug})`,
|
||||||
|
source.name,
|
||||||
|
source,
|
||||||
|
];
|
||||||
|
|
||||||
export async function oauth2SourcesProvider(page = 1, search = "") {
|
export async function oauth2SourcesProvider(page = 1, search = "") {
|
||||||
const oauthSources = await new SourcesApi(DEFAULT_CONFIG).sourcesOauthList({
|
const oauthSources = await new SourcesApi(DEFAULT_CONFIG).sourcesOauthList({
|
||||||
ordering: "name",
|
ordering: "name",
|
||||||
@ -14,17 +21,29 @@ export async function oauth2SourcesProvider(page = 1, search = "") {
|
|||||||
|
|
||||||
return {
|
return {
|
||||||
pagination: oauthSources.pagination,
|
pagination: oauthSources.pagination,
|
||||||
options: oauthSources.results.map((source) => [
|
options: oauthSources.results.map(sourceToSelect),
|
||||||
source.pk,
|
|
||||||
`${source.name} (${source.slug})`,
|
|
||||||
]),
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
export function makeSourceSelector(instanceSources: string[] | undefined) {
|
export function oauth2SourcesSelector(instanceMappings?: string[]) {
|
||||||
const localSources = instanceSources ? new Set(instanceSources) : undefined;
|
if (!instanceMappings) {
|
||||||
|
return async (mappings: DualSelectPair<OAuthSource>[]) =>
|
||||||
|
mappings.filter(
|
||||||
|
([_0, _1, _2, source]: DualSelectPair<OAuthSource>) => source !== undefined,
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
return localSources
|
return async () => {
|
||||||
? ([pk, _]: DualSelectPair) => localSources.has(pk)
|
const oauthSources = new SourcesApi(DEFAULT_CONFIG);
|
||||||
: ([_0, _1, _2, prompt]: DualSelectPair<OAuthSource>) => prompt !== undefined;
|
const mappings = await Promise.allSettled(
|
||||||
|
instanceMappings.map((instanceId) =>
|
||||||
|
oauthSources.sourcesOauthRetrieve({ slug: instanceId }),
|
||||||
|
),
|
||||||
|
);
|
||||||
|
|
||||||
|
return mappings
|
||||||
|
.filter((s) => s.status === "fulfilled")
|
||||||
|
.map((s) => s.value)
|
||||||
|
.map(sourceToSelect);
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
@ -2,8 +2,12 @@ import "@goauthentik/admin/common/ak-crypto-certificate-search";
|
|||||||
import "@goauthentik/admin/common/ak-flow-search/ak-flow-search";
|
import "@goauthentik/admin/common/ak-flow-search/ak-flow-search";
|
||||||
import { BaseProviderForm } from "@goauthentik/admin/providers/BaseProviderForm";
|
import { BaseProviderForm } from "@goauthentik/admin/providers/BaseProviderForm";
|
||||||
import {
|
import {
|
||||||
makeSourceSelector,
|
oauth2ProviderSelector,
|
||||||
|
oauth2ProvidersProvider,
|
||||||
|
} from "@goauthentik/admin/providers/oauth2/OAuth2ProviderForm";
|
||||||
|
import {
|
||||||
oauth2SourcesProvider,
|
oauth2SourcesProvider,
|
||||||
|
oauth2SourcesSelector,
|
||||||
} from "@goauthentik/admin/providers/oauth2/OAuth2Sources.js";
|
} from "@goauthentik/admin/providers/oauth2/OAuth2Sources.js";
|
||||||
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
import { first } from "@goauthentik/common/utils";
|
import { first } from "@goauthentik/common/utils";
|
||||||
@ -30,10 +34,7 @@ import {
|
|||||||
ProxyProvider,
|
ProxyProvider,
|
||||||
} from "@goauthentik/api";
|
} from "@goauthentik/api";
|
||||||
|
|
||||||
import {
|
import { propertyMappingsProvider, propertyMappingsSelector } from "./ProxyProviderFormHelpers.js";
|
||||||
makeProxyPropertyMappingsSelector,
|
|
||||||
proxyPropertyMappingsProvider,
|
|
||||||
} from "./ProxyProviderPropertyMappings.js";
|
|
||||||
|
|
||||||
@customElement("ak-provider-proxy-form")
|
@customElement("ak-provider-proxy-form")
|
||||||
export class ProxyProviderFormPage extends BaseProviderForm<ProxyProvider> {
|
export class ProxyProviderFormPage extends BaseProviderForm<ProxyProvider> {
|
||||||
@ -302,10 +303,8 @@ export class ProxyProviderFormPage extends BaseProviderForm<ProxyProvider> {
|
|||||||
name="propertyMappings"
|
name="propertyMappings"
|
||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${proxyPropertyMappingsProvider}
|
.provider=${propertyMappingsProvider}
|
||||||
.selector=${makeProxyPropertyMappingsSelector(
|
.selector=${propertyMappingsSelector(this.instance?.propertyMappings)}
|
||||||
this.instance?.propertyMappings,
|
|
||||||
)}
|
|
||||||
available-label="${msg("Available Scopes")}"
|
available-label="${msg("Available Scopes")}"
|
||||||
selected-label="${msg("Selected Scopes")}"
|
selected-label="${msg("Selected Scopes")}"
|
||||||
></ak-dual-select-dynamic-selected>
|
></ak-dual-select-dynamic-selected>
|
||||||
@ -390,11 +389,11 @@ ${this.instance?.skipPathRegex}</textarea
|
|||||||
${this.showHttpBasic ? this.renderHttpBasic() : html``}
|
${this.showHttpBasic ? this.renderHttpBasic() : html``}
|
||||||
<ak-form-element-horizontal
|
<ak-form-element-horizontal
|
||||||
label=${msg("Trusted OIDC Sources")}
|
label=${msg("Trusted OIDC Sources")}
|
||||||
name="jwksSources"
|
name="jwtFederationSources"
|
||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${oauth2SourcesProvider}
|
.provider=${oauth2SourcesProvider}
|
||||||
.selector=${makeSourceSelector(this.instance?.jwksSources)}
|
.selector=${oauth2SourcesSelector(this.instance?.jwtFederationSources)}
|
||||||
available-label=${msg("Available Sources")}
|
available-label=${msg("Available Sources")}
|
||||||
selected-label=${msg("Selected Sources")}
|
selected-label=${msg("Selected Sources")}
|
||||||
></ak-dual-select-dynamic-selected>
|
></ak-dual-select-dynamic-selected>
|
||||||
@ -404,6 +403,24 @@ ${this.instance?.skipPathRegex}</textarea
|
|||||||
)}
|
)}
|
||||||
</p>
|
</p>
|
||||||
</ak-form-element-horizontal>
|
</ak-form-element-horizontal>
|
||||||
|
<ak-form-element-horizontal
|
||||||
|
label=${msg("Federated OIDC Providers")}
|
||||||
|
name="jwtFederationProviders"
|
||||||
|
>
|
||||||
|
<ak-dual-select-dynamic-selected
|
||||||
|
.provider=${oauth2ProvidersProvider}
|
||||||
|
.selector=${oauth2ProviderSelector(
|
||||||
|
this.instance?.jwtFederationProviders,
|
||||||
|
)}
|
||||||
|
available-label=${msg("Available Providers")}
|
||||||
|
selected-label=${msg("Selected Providers")}
|
||||||
|
></ak-dual-select-dynamic-selected>
|
||||||
|
<p class="pf-c-form__helper-text">
|
||||||
|
${msg(
|
||||||
|
"JWTs signed by the selected providers can be used to authenticate to this provider.",
|
||||||
|
)}
|
||||||
|
</p>
|
||||||
|
</ak-form-element-horizontal>
|
||||||
</div>
|
</div>
|
||||||
</ak-form-group>
|
</ak-form-group>
|
||||||
|
|
||||||
|
45
web/src/admin/providers/proxy/ProxyProviderFormHelpers.ts
Normal file
45
web/src/admin/providers/proxy/ProxyProviderFormHelpers.ts
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
|
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types.js";
|
||||||
|
|
||||||
|
import { PropertymappingsApi, ScopeMapping } from "@goauthentik/api";
|
||||||
|
|
||||||
|
const mappingToSelect = (s: ScopeMapping) => [s.pk, s.name, s.name, s];
|
||||||
|
|
||||||
|
export async function propertyMappingsProvider(page = 1, search = "") {
|
||||||
|
const propertyMappings = await new PropertymappingsApi(
|
||||||
|
DEFAULT_CONFIG,
|
||||||
|
).propertymappingsProviderScopeList({
|
||||||
|
ordering: "scope_name",
|
||||||
|
pageSize: 20,
|
||||||
|
search: search.trim(),
|
||||||
|
page,
|
||||||
|
});
|
||||||
|
return {
|
||||||
|
pagination: propertyMappings.pagination,
|
||||||
|
options: propertyMappings.results.map(mappingToSelect),
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
export function propertyMappingsSelector(instanceMappings?: string[]) {
|
||||||
|
if (!instanceMappings) {
|
||||||
|
return async (mappings: DualSelectPair<ScopeMapping>[]) =>
|
||||||
|
mappings.filter(
|
||||||
|
([_0, _1, _2, scope]: DualSelectPair<ScopeMapping>) =>
|
||||||
|
!(scope?.managed ?? "").startsWith("goauthentik.io/providers"),
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
return async () => {
|
||||||
|
const pm = new PropertymappingsApi(DEFAULT_CONFIG);
|
||||||
|
const mappings = await Promise.allSettled(
|
||||||
|
instanceMappings.map((instanceId) =>
|
||||||
|
pm.propertymappingsProviderScopeRetrieve({ pmUuid: instanceId }),
|
||||||
|
),
|
||||||
|
);
|
||||||
|
|
||||||
|
return mappings
|
||||||
|
.filter((s) => s.status === "fulfilled")
|
||||||
|
.map((s) => s.value)
|
||||||
|
.map(mappingToSelect);
|
||||||
|
};
|
||||||
|
}
|
@ -1,27 +0,0 @@
|
|||||||
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
|
||||||
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types.js";
|
|
||||||
|
|
||||||
import { PropertymappingsApi, ScopeMapping } from "@goauthentik/api";
|
|
||||||
|
|
||||||
export async function proxyPropertyMappingsProvider(page = 1, search = "") {
|
|
||||||
const propertyMappings = await new PropertymappingsApi(
|
|
||||||
DEFAULT_CONFIG,
|
|
||||||
).propertymappingsProviderScopeList({
|
|
||||||
ordering: "scope_name",
|
|
||||||
pageSize: 20,
|
|
||||||
search: search.trim(),
|
|
||||||
page,
|
|
||||||
});
|
|
||||||
return {
|
|
||||||
pagination: propertyMappings.pagination,
|
|
||||||
options: propertyMappings.results.map((scope) => [scope.pk, scope.name, scope.name, scope]),
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
export function makeProxyPropertyMappingsSelector(mappings?: string[]) {
|
|
||||||
const localMappings = mappings ? new Set(mappings) : undefined;
|
|
||||||
return localMappings
|
|
||||||
? ([pk, _]: DualSelectPair) => localMappings.has(pk)
|
|
||||||
: ([_0, _1, _2, scope]: DualSelectPair<ScopeMapping>) =>
|
|
||||||
!(scope?.managed ?? "").startsWith("goauthentik.io/providers");
|
|
||||||
}
|
|
@ -15,10 +15,7 @@ import { ifDefined } from "lit/directives/if-defined.js";
|
|||||||
|
|
||||||
import { AuthModeEnum, Endpoint, ProtocolEnum, RacApi } from "@goauthentik/api";
|
import { AuthModeEnum, Endpoint, ProtocolEnum, RacApi } from "@goauthentik/api";
|
||||||
|
|
||||||
import {
|
import { propertyMappingsProvider, propertyMappingsSelector } from "./RACProviderFormHelpers.js";
|
||||||
makeRACPropertyMappingsSelector,
|
|
||||||
racPropertyMappingsProvider,
|
|
||||||
} from "./RACPropertyMappings.js";
|
|
||||||
|
|
||||||
@customElement("ak-rac-endpoint-form")
|
@customElement("ak-rac-endpoint-form")
|
||||||
export class EndpointForm extends ModelForm<Endpoint, string> {
|
export class EndpointForm extends ModelForm<Endpoint, string> {
|
||||||
@ -114,8 +111,8 @@ export class EndpointForm extends ModelForm<Endpoint, string> {
|
|||||||
</ak-form-element-horizontal>
|
</ak-form-element-horizontal>
|
||||||
<ak-form-element-horizontal label=${msg("Property mappings")} name="propertyMappings">
|
<ak-form-element-horizontal label=${msg("Property mappings")} name="propertyMappings">
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${racPropertyMappingsProvider}
|
.provider=${propertyMappingsProvider}
|
||||||
.selector=${makeRACPropertyMappingsSelector(this.instance?.propertyMappings)}
|
.selector=${propertyMappingsSelector(this.instance?.propertyMappings)}
|
||||||
available-label="${msg("Available User Property Mappings")}"
|
available-label="${msg("Available User Property Mappings")}"
|
||||||
selected-label="${msg("Selected User Property Mappings")}"
|
selected-label="${msg("Selected User Property Mappings")}"
|
||||||
></ak-dual-select-dynamic-selected>
|
></ak-dual-select-dynamic-selected>
|
||||||
|
@ -1,24 +0,0 @@
|
|||||||
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
|
||||||
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types.js";
|
|
||||||
|
|
||||||
import { PropertymappingsApi } from "@goauthentik/api";
|
|
||||||
|
|
||||||
export async function racPropertyMappingsProvider(page = 1, search = "") {
|
|
||||||
const propertyMappings = await new PropertymappingsApi(
|
|
||||||
DEFAULT_CONFIG,
|
|
||||||
).propertymappingsProviderRacList({
|
|
||||||
ordering: "name",
|
|
||||||
pageSize: 20,
|
|
||||||
search: search.trim(),
|
|
||||||
page,
|
|
||||||
});
|
|
||||||
return {
|
|
||||||
pagination: propertyMappings.pagination,
|
|
||||||
options: propertyMappings.results.map((mapping) => [mapping.pk, mapping.name]),
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
export function makeRACPropertyMappingsSelector(instanceMappings?: string[]) {
|
|
||||||
const localMappings = new Set(instanceMappings ?? []);
|
|
||||||
return ([pk, _]: DualSelectPair) => localMappings.has(pk);
|
|
||||||
}
|
|
@ -19,10 +19,7 @@ import { ifDefined } from "lit/directives/if-defined.js";
|
|||||||
|
|
||||||
import { FlowsInstancesListDesignationEnum, ProvidersApi, RACProvider } from "@goauthentik/api";
|
import { FlowsInstancesListDesignationEnum, ProvidersApi, RACProvider } from "@goauthentik/api";
|
||||||
|
|
||||||
import {
|
import { propertyMappingsProvider, propertyMappingsSelector } from "./RACProviderFormHelpers.js";
|
||||||
makeRACPropertyMappingsSelector,
|
|
||||||
racPropertyMappingsProvider,
|
|
||||||
} from "./RACPropertyMappings.js";
|
|
||||||
|
|
||||||
@customElement("ak-provider-rac-form")
|
@customElement("ak-provider-rac-form")
|
||||||
export class RACProviderFormPage extends ModelForm<RACProvider, number> {
|
export class RACProviderFormPage extends ModelForm<RACProvider, number> {
|
||||||
@ -127,10 +124,8 @@ export class RACProviderFormPage extends ModelForm<RACProvider, number> {
|
|||||||
name="propertyMappings"
|
name="propertyMappings"
|
||||||
>
|
>
|
||||||
<ak-dual-select-dynamic-selected
|
<ak-dual-select-dynamic-selected
|
||||||
.provider=${racPropertyMappingsProvider}
|
.provider=${propertyMappingsProvider}
|
||||||
.selector=${makeRACPropertyMappingsSelector(
|
.selector=${propertyMappingsSelector(this.instance?.propertyMappings)}
|
||||||
this.instance?.propertyMappings,
|
|
||||||
)}
|
|
||||||
available-label="${msg("Available Property Mappings")}"
|
available-label="${msg("Available Property Mappings")}"
|
||||||
selected-label="${msg("Selected Property Mappings")}"
|
selected-label="${msg("Selected Property Mappings")}"
|
||||||
></ak-dual-select-dynamic-selected>
|
></ak-dual-select-dynamic-selected>
|
||||||
|
41
web/src/admin/providers/rac/RACProviderFormHelpers.ts
Normal file
41
web/src/admin/providers/rac/RACProviderFormHelpers.ts
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
import { DEFAULT_CONFIG } from "@goauthentik/common/api/config";
|
||||||
|
import { DualSelectPair } from "@goauthentik/elements/ak-dual-select/types.js";
|
||||||
|
|
||||||
|
import { PropertymappingsApi, RACPropertyMapping } from "@goauthentik/api";
|
||||||
|
|
||||||
|
const mappingToSelect = (m: RACPropertyMapping) => [m.pk, m.name, m.name, m];
|
||||||
|
|
||||||
|
export async function propertyMappingsProvider(page = 1, search = "") {
|
||||||
|
const propertyMappings = await new PropertymappingsApi(
|
||||||
|
DEFAULT_CONFIG,
|
||||||
|
).propertymappingsProviderRacList({
|
||||||
|
ordering: "name",
|
||||||
|
pageSize: 20,
|
||||||
|
search: search.trim(),
|
||||||
|
page,
|
||||||
|
});
|
||||||
|
return {
|
||||||
|
pagination: propertyMappings.pagination,
|
||||||
|
options: propertyMappings.results.map(mappingToSelect),
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
export function propertyMappingsSelector(instanceMappings?: string[]) {
|
||||||
|
if (!instanceMappings) {
|
||||||
|
return async (_mappings: DualSelectPair<RACPropertyMapping>[]) => [];
|
||||||
|
}
|
||||||
|
|
||||||
|
return async () => {
|
||||||
|
const pm = new PropertymappingsApi(DEFAULT_CONFIG);
|
||||||
|
const mappings = await Promise.allSettled(
|
||||||
|
instanceMappings.map((instanceId) =>
|
||||||
|
pm.propertymappingsProviderRacRetrieve({ pmUuid: instanceId }),
|
||||||
|
),
|
||||||
|
);
|
||||||
|
|
||||||
|
return mappings
|
||||||
|
.filter((s) => s.status === "fulfilled")
|
||||||
|
.map((s) => s.value)
|
||||||
|
.map(mappingToSelect);
|
||||||
|
};
|
||||||
|
}
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user