* add meta model to apply blueprint within blueprint for dependencies Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix tests Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * use custom registry Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * fix again Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * move ManagedAppConfig to apps.py Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * rename manager to registry Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> * ci: use full tag in comment Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org> Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
		
			
				
	
	
		
			66 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			YAML
		
	
	
	
	
	
			
		
		
	
	
			66 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			YAML
		
	
	
	
	
	
version: 1
 | 
						|
metadata:
 | 
						|
  name: Default - Authentication flow
 | 
						|
entries:
 | 
						|
- model: authentik_blueprints.metaapplyblueprint
 | 
						|
  attrs:
 | 
						|
    identifiers:
 | 
						|
      name: Default - Password change flow
 | 
						|
    required: false
 | 
						|
- attrs:
 | 
						|
    designation: authentication
 | 
						|
    name: Welcome to authentik!
 | 
						|
    title: Welcome to authentik!
 | 
						|
  identifiers:
 | 
						|
    slug: default-authentication-flow
 | 
						|
  model: authentik_flows.flow
 | 
						|
  id: flow
 | 
						|
- attrs:
 | 
						|
    backends:
 | 
						|
    - authentik.core.auth.InbuiltBackend
 | 
						|
    - authentik.sources.ldap.auth.LDAPBackend
 | 
						|
    - authentik.core.auth.TokenBackend
 | 
						|
    configure_flow: !Find [authentik_flows.flow, [slug, default-password-change]]
 | 
						|
  identifiers:
 | 
						|
    name: default-authentication-password
 | 
						|
  id: default-authentication-password
 | 
						|
  model: authentik_stages_password.passwordstage
 | 
						|
- identifiers:
 | 
						|
    name: default-authentication-mfa-validation
 | 
						|
  id: default-authentication-mfa-validation
 | 
						|
  model: authentik_stages_authenticator_validate.authenticatorvalidatestage
 | 
						|
- attrs:
 | 
						|
    user_fields:
 | 
						|
    - email
 | 
						|
    - username
 | 
						|
  identifiers:
 | 
						|
    name: default-authentication-identification
 | 
						|
  id: default-authentication-identification
 | 
						|
  model: authentik_stages_identification.identificationstage
 | 
						|
- attrs:
 | 
						|
    session_duration: seconds=0
 | 
						|
  identifiers:
 | 
						|
    name: default-authentication-login
 | 
						|
  id: default-authentication-login
 | 
						|
  model: authentik_stages_user_login.userloginstage
 | 
						|
- identifiers:
 | 
						|
    order: 10
 | 
						|
    stage: !KeyOf default-authentication-identification
 | 
						|
    target: !KeyOf flow
 | 
						|
  model: authentik_flows.flowstagebinding
 | 
						|
- identifiers:
 | 
						|
    order: 20
 | 
						|
    stage: !KeyOf default-authentication-password
 | 
						|
    target: !KeyOf flow
 | 
						|
  model: authentik_flows.flowstagebinding
 | 
						|
- identifiers:
 | 
						|
    order: 30
 | 
						|
    stage: !KeyOf default-authentication-mfa-validation
 | 
						|
    target: !KeyOf flow
 | 
						|
  model: authentik_flows.flowstagebinding
 | 
						|
- identifiers:
 | 
						|
    order: 100
 | 
						|
    stage: !KeyOf default-authentication-login
 | 
						|
    target: !KeyOf flow
 | 
						|
  model: authentik_flows.flowstagebinding
 |