providers/*: include list of outposts

Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
This commit is contained in:
Jens Langhammer 2021-11-05 01:03:16 +01:00
parent df838a4023
commit 909461e533
4 changed files with 19 additions and 2 deletions

View File

@ -1,5 +1,5 @@
"""LDAPProvider API Views""" """LDAPProvider API Views"""
from rest_framework.fields import CharField from rest_framework.fields import CharField, ListField
from rest_framework.serializers import ModelSerializer from rest_framework.serializers import ModelSerializer
from rest_framework.viewsets import ModelViewSet, ReadOnlyModelViewSet from rest_framework.viewsets import ModelViewSet, ReadOnlyModelViewSet
@ -11,6 +11,8 @@ from authentik.providers.ldap.models import LDAPProvider
class LDAPProviderSerializer(ProviderSerializer): class LDAPProviderSerializer(ProviderSerializer):
"""LDAPProvider Serializer""" """LDAPProvider Serializer"""
outpost_set = ListField(child=CharField(), read_only=True)
class Meta: class Meta:
model = LDAPProvider model = LDAPProvider
@ -21,6 +23,7 @@ class LDAPProviderSerializer(ProviderSerializer):
"tls_server_name", "tls_server_name",
"uid_start_number", "uid_start_number",
"gid_start_number", "gid_start_number",
"outpost_set",
] ]

View File

@ -36,6 +36,7 @@ class ProxyProviderSerializer(ProviderSerializer):
"""ProxyProvider Serializer""" """ProxyProvider Serializer"""
redirect_uris = CharField(read_only=True) redirect_uris = CharField(read_only=True)
outpost_set = ListField(child=CharField(), read_only=True)
def validate(self, attrs) -> dict[Any, str]: def validate(self, attrs) -> dict[Any, str]:
"""Check that internal_host is set when mode is Proxy""" """Check that internal_host is set when mode is Proxy"""
@ -74,6 +75,7 @@ class ProxyProviderSerializer(ProviderSerializer):
"redirect_uris", "redirect_uris",
"cookie_domain", "cookie_domain",
"token_validity", "token_validity",
"outpost_set",
] ]

View File

@ -22168,12 +22168,18 @@ components:
generated from the group.Pk to make sure that the numbers aren't too low generated from the group.Pk to make sure that the numbers aren't too low
for POSIX groups. Default is 4000 to ensure that we don't collide with for POSIX groups. Default is 4000 to ensure that we don't collide with
local groups or users primary groups gidNumber local groups or users primary groups gidNumber
outpost_set:
type: array
items:
type: string
readOnly: true
required: required:
- assigned_application_name - assigned_application_name
- assigned_application_slug - assigned_application_slug
- authorization_flow - authorization_flow
- component - component
- name - name
- outpost_set
- pk - pk
- verbose_name - verbose_name
- verbose_name_plural - verbose_name_plural
@ -28652,6 +28658,11 @@ components:
type: string type: string
description: 'Tokens not valid on or after current time + this value (Format: description: 'Tokens not valid on or after current time + this value (Format:
hours=1;minutes=2;seconds=3).' hours=1;minutes=2;seconds=3).'
outpost_set:
type: array
items:
type: string
readOnly: true
required: required:
- assigned_application_name - assigned_application_name
- assigned_application_slug - assigned_application_slug
@ -28659,6 +28670,7 @@ components:
- component - component
- external_host - external_host
- name - name
- outpost_set
- pk - pk
- redirect_uris - redirect_uris
- verbose_name - verbose_name

View File

@ -173,7 +173,7 @@ A huge shoutout to all the people that contributed, helped test and also transla
- stages/authenticator_*: add default name for authenticators - stages/authenticator_*: add default name for authenticators
- web/admin: only show flows with an invitation stage configured instead of all enrollment flows - web/admin: only show flows with an invitation stage configured instead of all enrollment flows
- web/admin: show warning on invitation list when no stage exists or is bound - web/admin: show warning on invitation list when no stage exists or is bound
- web/flows: fix authenticator_validate not allowing alpha-numeric codes due to empty pattern - web/flows: fix authenticator_validate not allowing alphanumeric codes due to empty pattern
- web/flows: improve display of static tokens - web/flows: improve display of static tokens
- web/user: fix ak-user-settings-password getting wrong configureUrl - web/user: fix ak-user-settings-password getting wrong configureUrl
- web/user: fix device type for static tokens - web/user: fix device type for static tokens