From a520a60c82e4e433637528fa20abe8d2bc960f02 Mon Sep 17 00:00:00 2001 From: Jens Langhammer Date: Mon, 8 Aug 2022 20:38:42 +0200 Subject: [PATCH] blueprints: lowercase system blueprints' models Signed-off-by: Jens Langhammer --- blueprints/system/providers-oauth2.yaml | 6 +++--- blueprints/system/providers-proxy.yaml | 2 +- blueprints/system/providers-saml.yaml | 14 +++++++------- blueprints/system/sources-ldap.yaml | 16 ++++++++-------- 4 files changed, 19 insertions(+), 19 deletions(-) diff --git a/blueprints/system/providers-oauth2.yaml b/blueprints/system/providers-oauth2.yaml index 0630a6721..1e905ffdf 100644 --- a/blueprints/system/providers-oauth2.yaml +++ b/blueprints/system/providers-oauth2.yaml @@ -6,7 +6,7 @@ metadata: entries: - identifiers: managed: goauthentik.io/providers/oauth2/scope-openid - model: authentik_providers_oauth2.ScopeMapping + model: authentik_providers_oauth2.scopemapping attrs: name: "authentik default OAuth Mapping: OpenID 'openid'" scope_name: openid @@ -16,7 +16,7 @@ entries: return {} - identifiers: managed: goauthentik.io/providers/oauth2/scope-email - model: authentik_providers_oauth2.ScopeMapping + model: authentik_providers_oauth2.scopemapping attrs: name: "authentik default OAuth Mapping: OpenID 'email'" scope_name: email @@ -28,7 +28,7 @@ entries: } - identifiers: managed: goauthentik.io/providers/oauth2/scope-profile - model: authentik_providers_oauth2.ScopeMapping + model: authentik_providers_oauth2.scopemapping attrs: name: "authentik default OAuth Mapping: OpenID 'profile'" scope_name: profile diff --git a/blueprints/system/providers-proxy.yaml b/blueprints/system/providers-proxy.yaml index a07751d86..cdba7a544 100644 --- a/blueprints/system/providers-proxy.yaml +++ b/blueprints/system/providers-proxy.yaml @@ -6,7 +6,7 @@ metadata: entries: - identifiers: managed: goauthentik.io/providers/proxy/scope-proxy - model: authentik_providers_oauth2.ScopeMapping + model: authentik_providers_oauth2.scopemapping attrs: name: "authentik default OAuth Mapping: Proxy outpost" scope_name: ak_proxy diff --git a/blueprints/system/providers-saml.yaml b/blueprints/system/providers-saml.yaml index 03f025513..8016d6589 100644 --- a/blueprints/system/providers-saml.yaml +++ b/blueprints/system/providers-saml.yaml @@ -6,7 +6,7 @@ metadata: entries: - identifiers: managed: goauthentik.io/providers/saml/upn - model: authentik_providers_saml.SAMLPropertyMapping + model: authentik_providers_saml.samlpropertymapping attrs: name: "authentik default SAML Mapping: UPN" saml_name: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn" @@ -14,7 +14,7 @@ entries: return request.user.attributes.get('upn', request.user.email) - identifiers: managed: goauthentik.io/providers/saml/name - model: authentik_providers_saml.SAMLPropertyMapping + model: authentik_providers_saml.samlpropertymapping attrs: name: "authentik default SAML Mapping: Name" saml_name: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name" @@ -22,7 +22,7 @@ entries: return request.user.name - identifiers: managed: goauthentik.io/providers/saml/email - model: authentik_providers_saml.SAMLPropertyMapping + model: authentik_providers_saml.samlpropertymapping attrs: name: "authentik default SAML Mapping: Email" saml_name: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" @@ -30,7 +30,7 @@ entries: return request.user.email - identifiers: managed: goauthentik.io/providers/saml/username - model: authentik_providers_saml.SAMLPropertyMapping + model: authentik_providers_saml.samlpropertymapping attrs: name: "authentik default SAML Mapping: Username" saml_name: "http://schemas.goauthentik.io/2021/02/saml/username" @@ -38,7 +38,7 @@ entries: return request.user.username - identifiers: managed: goauthentik.io/providers/saml/uid - model: authentik_providers_saml.SAMLPropertyMapping + model: authentik_providers_saml.samlpropertymapping attrs: name: "authentik default SAML Mapping: User ID" saml_name: "http://schemas.goauthentik.io/2021/02/saml/uid" @@ -46,7 +46,7 @@ entries: return request.user.pk - identifiers: managed: goauthentik.io/providers/saml/groups - model: authentik_providers_saml.SAMLPropertyMapping + model: authentik_providers_saml.samlpropertymapping attrs: name: "authentik default SAML Mapping: Groups" saml_name: "http://schemas.xmlsoap.org/claims/Group" @@ -55,7 +55,7 @@ entries: yield group.name - identifiers: managed: goauthentik.io/providers/saml/ms-windowsaccountname - model: authentik_providers_saml.SAMLPropertyMapping + model: authentik_providers_saml.samlpropertymapping attrs: name: "authentik default SAML Mapping: WindowsAccountname (Username)" saml_name: "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname" diff --git a/blueprints/system/sources-ldap.yaml b/blueprints/system/sources-ldap.yaml index f3a43f698..fa0056390 100644 --- a/blueprints/system/sources-ldap.yaml +++ b/blueprints/system/sources-ldap.yaml @@ -6,7 +6,7 @@ metadata: entries: - identifiers: managed: goauthentik.io/sources/ldap/default-name - model: authentik_sources_ldap.LDAPPropertyMapping + model: authentik_sources_ldap.ldappropertymapping attrs: name: "authentik default LDAP Mapping: Name" object_field: "name" @@ -14,7 +14,7 @@ entries: return ldap.get('name') - identifiers: managed: goauthentik.io/sources/ldap/default-mail - model: authentik_sources_ldap.LDAPPropertyMapping + model: authentik_sources_ldap.ldappropertymapping attrs: name: "authentik default LDAP Mapping: mail" object_field: "email" @@ -23,7 +23,7 @@ entries: # ActiveDirectory-specific mappings - identifiers: managed: goauthentik.io/sources/ldap/ms-samaccountname - model: authentik_sources_ldap.LDAPPropertyMapping + model: authentik_sources_ldap.ldappropertymapping attrs: name: "authentik default Active Directory Mapping: sAMAccountName" object_field: "username" @@ -31,7 +31,7 @@ entries: return ldap.get('sAMAccountName') - identifiers: managed: goauthentik.io/sources/ldap/ms-userprincipalname - model: authentik_sources_ldap.LDAPPropertyMapping + model: authentik_sources_ldap.ldappropertymapping attrs: name: "authentik default Active Directory Mapping: userPrincipalName" object_field: "attributes.upn" @@ -39,7 +39,7 @@ entries: return list_flatten(ldap.get('userPrincipalName')) - identifiers: managed: goauthentik.io/sources/ldap/ms-givenName - model: authentik_sources_ldap.LDAPPropertyMapping + model: authentik_sources_ldap.ldappropertymapping attrs: name: "authentik default Active Directory Mapping: givenName" object_field: "attributes.givenName" @@ -47,7 +47,7 @@ entries: return list_flatten(ldap.get('givenName')) - identifiers: managed: goauthentik.io/sources/ldap/ms-sn - model: authentik_sources_ldap.LDAPPropertyMapping + model: authentik_sources_ldap.ldappropertymapping attrs: name: "authentik default Active Directory Mapping: sn" object_field: "attributes.sn" @@ -56,7 +56,7 @@ entries: # OpenLDAP specific mappings - identifiers: managed: goauthentik.io/sources/ldap/openldap-uid - model: authentik_sources_ldap.LDAPPropertyMapping + model: authentik_sources_ldap.ldappropertymapping attrs: name: "authentik default OpenLDAP Mapping: uid" object_field: "username" @@ -64,7 +64,7 @@ entries: return ldap.get('uid') - identifiers: managed: goauthentik.io/sources/ldap/openldap-cn - model: authentik_sources_ldap.LDAPPropertyMapping + model: authentik_sources_ldap.ldappropertymapping attrs: name: "authentik default OpenLDAP Mapping: cn" object_field: "name"