web/flows: bottom-align about text on flows page (#7051)

* web/flows: bottom-align about text on flows page

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* fix a bunch of typos

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

---------

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
This commit is contained in:
Jens L 2023-10-03 14:10:10 +02:00 committed by GitHub
parent a1353d567b
commit a0f607b5ac
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
26 changed files with 38 additions and 38 deletions

View file

@ -141,7 +141,7 @@ class BaseEvaluator:
"""Create event with supplied data and try to extract as much relevant data
from the context"""
context = self._context.copy()
# If the result was a complex variable, we don't want to re-use it
# If the result was a complex variable, we don't want to reuse it
context.pop("result", None)
context.pop("handler", None)
event_kwargs = context

View file

@ -380,7 +380,7 @@ class Outpost(SerializerModel, ManagedModel):
managed=managed,
)
except IntegrityError:
# Integrity error happens mostly when managed is re-used
# Integrity error happens mostly when managed is reused
Token.objects.filter(managed=managed).delete()
Token.objects.filter(identifier=self.token_identifier).delete()
return self.token

View file

@ -21,7 +21,7 @@ class OktaOAuth2Callback(OAuthCallback):
"""Okta OAuth2 Callback"""
# Okta has the same quirk as azure and throws an error if the access token
# is set via query parameter, so we re-use the azure client
# is set via query parameter, so we reuse the azure client
# see https://github.com/goauthentik/authentik/issues/1910
client_class = UserprofileHeaderAuthClient

View file

@ -16,7 +16,7 @@ class TwitterClient(UserprofileHeaderAuthClient):
the access token endpoint for some reason."""
# Twitter has the same quirk as azure and throws an error if the access token
# is set via query parameter, so we re-use the azure client
# is set via query parameter, so we reuse the azure client
# see https://github.com/goauthentik/authentik/issues/1910
def get_access_token(self, **request_kwargs) -> Optional[dict[str, Any]]:

View file

@ -17,7 +17,7 @@ class Migration(migrations.Migration):
help_text=(
"When enabled, the Phone number is only used during enrollment to verify the"
" users authenticity. Only a hash of the phone number is saved to ensure it is"
" not re-used in the future."
" not reused in the future."
),
),
),

View file

@ -56,7 +56,7 @@ class AuthenticatorSMSStage(ConfigurableStage, FriendlyNamedStage, Stage):
help_text=_(
"When enabled, the Phone number is only used during enrollment to verify the "
"users authenticity. Only a hash of the phone number is saved to ensure it is "
"not re-used in the future."
"not reused in the future."
),
)

View file

@ -5884,7 +5884,7 @@
"verify_only": {
"type": "boolean",
"title": "Verify only",
"description": "When enabled, the Phone number is only used during enrollment to verify the users authenticity. Only a hash of the phone number is saved to ensure it is not re-used in the future."
"description": "When enabled, the Phone number is only used during enrollment to verify the users authenticity. Only a hash of the phone number is saved to ensure it is not reused in the future."
},
"mapping": {
"type": "integer",

View file

@ -96,7 +96,7 @@ func attemptProxyStart(ws *web.WebServer, u *url.URL) {
continue
}
// Init tenant_tls here too since it requires an API Client,
// so we just re-use the same one as the outpost uses
// so we just reuse the same one as the outpost uses
tw := tenant_tls.NewWatcher(ac.Client)
go tw.Start()
ws.TenantTLS = tw

View file

@ -65,7 +65,7 @@ def worker_exit(server: "Arbiter", worker: DjangoUvicornWorker):
def on_starting(server: "Arbiter"):
"""Attach a set of IDs that can be temporarily re-used.
"""Attach a set of IDs that can be temporarily reused.
Used on reloads when each worker exists twice."""
server._worker_id_overload = set()
@ -79,7 +79,7 @@ def nworkers_changed(server: "Arbiter", new_value, old_value):
def _next_worker_id(server: "Arbiter"):
"""If there are IDs open for re-use, take one. Else look for a free one."""
"""If there are IDs open for reuse, take one. Else look for a free one."""
if server._worker_id_overload:
return server._worker_id_overload.pop()
@ -90,7 +90,7 @@ def _next_worker_id(server: "Arbiter"):
def on_reload(server: "Arbiter"):
"""Add a full set of ids into overload so it can be re-used once."""
"""Add a full set of ids into overload so it can be reused once."""
server._worker_id_overload = set(range(1, server.cfg.workers + 1))

View file

@ -1857,7 +1857,7 @@ msgstr ""
msgid ""
"When enabled, the Phone number is only used during enrollment to verify the "
"users authenticity. Only a hash of the phone number is saved to ensure it is "
"not re-used in the future."
"not reused in the future."
msgstr ""
#: authentik/stages/authenticator_sms/models.py:68

View file

@ -2,7 +2,7 @@
# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
# This file is distributed under the same license as the PACKAGE package.
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
#
#
# Translators:
# Bastien Germond, 2022
# Phorcys, 2022
@ -12,7 +12,7 @@
# Kyllian Delaye-Maillot, 2023
# Manuel Viens, 2023
# Marc Schmitt, 2023
#
#
#, fuzzy
msgid ""
msgstr ""
@ -2074,7 +2074,7 @@ msgstr "Appareils Duo"
msgid ""
"When enabled, the Phone number is only used during enrollment to verify the "
"users authenticity. Only a hash of the phone number is saved to ensure it is"
" not re-used in the future."
" not reused in the future."
msgstr ""
"Si activé, le numéro de téléphone n'est utilisé que durant l'inscription "
"pour vérifier l'authenticité de l'utilisateur. Seul un hachage du numéro de "

View file

@ -2,14 +2,14 @@
# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
# This file is distributed under the same license as the PACKAGE package.
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
#
#
# Translators:
# Dany Sluijk, 2022
# Alex Kruidenberg <alexkruidenberg@hotmail.com>, 2022
# Melvin Snijders <mail@melvinsnijders.nl>, 2023
# Michel Heusschen, 2023
# ServusNL, 2023
#
#
#, fuzzy
msgid ""
msgstr ""
@ -2057,7 +2057,7 @@ msgstr "Duo-apparaten"
msgid ""
"When enabled, the Phone number is only used during enrollment to verify the "
"users authenticity. Only a hash of the phone number is saved to ensure it is"
" not re-used in the future."
" not reused in the future."
msgstr ""
"Indien ingeschakeld, wordt het telefoonnummer alleen gebruikt tijdens "
"inschrijving om de authenticiteit van de gebruiker te verifiëren. Alleen een"

View file

@ -2,13 +2,13 @@
# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
# This file is distributed under the same license as the PACKAGE package.
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
#
#
# Translators:
# Chen Zhikai, 2022
# 刘松, 2022
# Jens L. <jens@beryju.org>, 2023
# deluxghost, 2023
#
#
#, fuzzy
msgid ""
msgstr ""
@ -1893,7 +1893,7 @@ msgstr "Duo 设备"
msgid ""
"When enabled, the Phone number is only used during enrollment to verify the "
"users authenticity. Only a hash of the phone number is saved to ensure it is"
" not re-used in the future."
" not reused in the future."
msgstr "启用时,电话号码仅在注册期间用于验证用户的真实性。仅保存电话号码的哈希,以确保将来不会重复使用。"
#: authentik/stages/authenticator_sms/models.py:68

View file

@ -2,13 +2,13 @@
# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
# This file is distributed under the same license as the PACKAGE package.
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
#
#
# Translators:
# Chen Zhikai, 2022
# 刘松, 2022
# Jens L. <jens@beryju.org>, 2023
# deluxghost, 2023
#
#
#, fuzzy
msgid ""
msgstr ""
@ -1893,7 +1893,7 @@ msgstr "Duo 设备"
msgid ""
"When enabled, the Phone number is only used during enrollment to verify the "
"users authenticity. Only a hash of the phone number is saved to ensure it is"
" not re-used in the future."
" not reused in the future."
msgstr "启用时,电话号码仅在注册期间用于验证用户的真实性。仅保存电话号码的哈希,以确保将来不会重复使用。"
#: authentik/stages/authenticator_sms/models.py:68

View file

@ -27436,7 +27436,7 @@ components:
type: boolean
description: When enabled, the Phone number is only used during enrollment
to verify the users authenticity. Only a hash of the phone number is saved
to ensure it is not re-used in the future.
to ensure it is not reused in the future.
mapping:
type: string
format: uuid
@ -27493,7 +27493,7 @@ components:
type: boolean
description: When enabled, the Phone number is only used during enrollment
to verify the users authenticity. Only a hash of the phone number is saved
to ensure it is not re-used in the future.
to ensure it is not reused in the future.
mapping:
type: string
format: uuid
@ -34530,7 +34530,7 @@ components:
type: boolean
description: When enabled, the Phone number is only used during enrollment
to verify the users authenticity. Only a hash of the phone number is saved
to ensure it is not re-used in the future.
to ensure it is not reused in the future.
mapping:
type: string
format: uuid

View file

@ -202,7 +202,7 @@ export class ProxyProviderFormPage extends ModelForm<ProxyProvider, number> {
case ProxyMode.ForwardSingle:
return html`<p class="pf-u-mb-xl">
${msg(
"Use this provider with nginx's auth_request or traefik's forwardAuth. Each application/domain needs its own provider. Additionally, on each domain, /outpost.goauthentik.io must be routed to the outpost (when using a manged outpost, this is done for you).",
"Use this provider with nginx's auth_request or traefik's forwardAuth. Each application/domain needs its own provider. Additionally, on each domain, /outpost.goauthentik.io must be routed to the outpost (when using a managed outpost, this is done for you).",
)}
</p>
<ak-form-element-horizontal

View file

@ -79,7 +79,7 @@ html > form > input {
.pf-c-login__footer {
flex-grow: 2;
display: flex;
justify-content: start;
justify-content: end;
flex-direction: column;
}
.pf-c-login__footer ul.pf-c-list.pf-m-inline {

View file

@ -155,7 +155,7 @@ According to the Microsoft team [contributing to Python](https://devblogs.micros
I know migration isnt fun but when youre making tradeoffs, its worth keeping it in mind as a future option. If the choice is to build now and migrate later instead of never building at all, Im going to choose migration every time.
If we start running into truly significant performance issues and I emphasize _if_ we can always migrate critical parts of the application to a different language. This will of course be fully transparent to anyone running authentik, and Id like to think of it as a last-resort, if weve already done all the opitmization possible.
If we start running into truly significant performance issues and I emphasize _if_ we can always migrate critical parts of the application to a different language. This will of course be fully transparent to anyone running authentik, and Id like to think of it as a last-resort, if weve already done all the optimization possible.
### Architect your application well

View file

@ -37,7 +37,7 @@ entries:
# delete the object
state: present
# An optional list of boolean-like conditions. If all conditions match (or
# no condiitons are provided) the entry will be evaluated and acted upon
# no conditions are provided) the entry will be evaluated and acted upon
# as normal. Otherwise, the entry is skipped as if not defined at all.
# Each condition will be evaluated in Python to its boolean representation
# bool(<condition>). Furthermore, complex conditions can be built using

View file

@ -2,7 +2,7 @@
title: "Templates"
---
In technical docuemntation, there are document "types" (similar to how there are data types).
In technical documentation, there are document "types" (similar to how there are data types).
The most common types are:

View file

@ -43,7 +43,7 @@ slug: "/releases/2021.8"
- core: add new token intent and auth backend (#1284)
- core: add token tests for invalid intent and token auth
- core: fix token intent not defaulting correctly
- core: handle error when ?for_user is not numberical
- core: handle error when ?for_user is not numerical
- lib: move id and key generators to lib (#1286)
- lifecycle: rename to ak
- outpost: handle non-existent permission

View file

@ -244,7 +244,7 @@ Changed response : **200 OK**
- providers/oauth2: add x5c (#3556)
- providers/proxy: fix routing based on signature in traefik and caddy
- root: make redis persistent in docker-compose
- root: re-use custom log helper from config and cleanup duplicate functions
- root: reuse custom log helper from config and cleanup duplicate functions
- root: shorten outpost docker healthcheck intervals
- sources/ldap: start_tls before binding but without reading server info
- sources/oauth: use GitHub's dedicated email API when no public email address is configured

View file

@ -48,6 +48,6 @@ On this page:
![Screenshot showing populated GitHub enterprise SAML settings](ghec_saml_settings.png)
Once these fields are populated, you can use the `Test SAML configuation` button to test the authentication flow. If the flow completes successfully, you will see a green tick next to the Test button.
Once these fields are populated, you can use the `Test SAML configuration` button to test the authentication flow. If the flow completes successfully, you will see a green tick next to the Test button.
Scroll down to hit the `Save` button below.

View file

@ -42,7 +42,7 @@ On this page:
- For `Public certificate`, paste the _full_ signing certificate into this field.
- Verify that the `Signature method` and `Digest method` match your SAML provider settings in authentik.
Once these fields are populated, you can use the `Test SAML configuation` button to test the authentication flow. If the flow completes successfully, you will see a green tick next to the Test button.
Once these fields are populated, you can use the `Test SAML configuration` button to test the authentication flow. If the flow completes successfully, you will see a green tick next to the Test button.
Scroll down to hit the `Save` button below.

View file

@ -19,7 +19,7 @@ The following placeholders will be used:
- `organizr.company` is the FQDN of the Service install.
- `authentik.company` is the FQDN of the authentik install.
Create a new user account _(or re-use an existing)_ for organizr to use for LDAP bind under _Directory_ -> _Users_ -> _Create_, in this example called `ldapservice`.
Create a new user account _(or reuse an existing)_ for organizr to use for LDAP bind under _Directory_ -> _Users_ -> _Create_, in this example called `ldapservice`.
Note the DN of this user will be `cn=ldapservice,ou=users,dc=ldap,dc=goauthentik,dc=io`

View file

@ -22,7 +22,7 @@ The following placeholders will be used:
### Step 1 - Service account
Create a new user account _(or re-use an existing one)_ for ProFTPD to use for LDAP bind under _Directory_ -> _Users_ -> _Create_ and give the account a name, such as `ldapservice`.
Create a new user account _(or reuse an existing one)_ for ProFTPD to use for LDAP bind under _Directory_ -> _Users_ -> _Create_ and give the account a name, such as `ldapservice`.
:::note
On default provider settings, the DN of this user will be `cn=ldapservice,ou=users,dc=ldap,dc=goauthentik,dc=io`