Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

stages/authenticator_webauthn: Update FIDO MDS3 & Passkey aaguid blobs #10712

Merged
merged 1 commit into from
Aug 1, 2024

Conversation

authentik-automation[bot]
Copy link
Contributor

stages/authenticator_webauthn: Update FIDO MDS3 & Passkey aaguid blobs

Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
@authentik-automation authentik-automation bot requested a review from a team as a code owner August 1, 2024 01:59
@authentik-automation authentik-automation bot enabled auto-merge (squash) August 1, 2024 01:59
Copy link

netlify bot commented Aug 1, 2024

Deploy Preview for authentik-storybook canceled.

Name Link
🔨 Latest commit c2029ec
🔍 Latest deploy log https://app.netlify.com/sites/authentik-storybook/deploys/66aaec16a9374c0008510b0c

Copy link

netlify bot commented Aug 1, 2024

Deploy Preview for authentik-docs canceled.

Name Link
🔨 Latest commit c2029ec
🔍 Latest deploy log https://app.netlify.com/sites/authentik-docs/deploys/66aaec166c6d5b000835ab66

Copy link

codecov bot commented Aug 1, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 91.99%. Comparing base (d54582c) to head (c2029ec).

Additional details and impacted files
@@            Coverage Diff             @@
##             main   #10712      +/-   ##
==========================================
- Coverage   92.51%   91.99%   -0.53%     
==========================================
  Files         720      720              
  Lines       35254    35254              
==========================================
- Hits        32616    32432     -184     
- Misses       2638     2822     +184     
Flag Coverage Δ
e2e 46.22% <ø> (-3.41%) ⬇️
integration 25.35% <ø> (ø)
unit 90.01% <ø> (+<0.01%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@authentik-automation authentik-automation bot merged commit 63ff967 into main Aug 1, 2024
59 of 70 checks passed
@authentik-automation authentik-automation bot deleted the update-fido-mds-client branch August 1, 2024 11:35
kensternberg-authentik added a commit that referenced this pull request Aug 1, 2024
* main:
  root: only load daphne django app in development (#10723)
  web: fix theme not applying to document correctly (#10721)
  stages/authenticator_webauthn: Update FIDO MDS3 & Passkey aaguid blobs (#10712)
  core: bump sentry-sdk from 2.11.0 to 2.12.0 (#10713)
  core: bump uvicorn from 0.30.3 to 0.30.4 (#10714)
  web: bump @sentry/browser from 8.20.0 to 8.21.0 in /web in the sentry group across 1 directory (#10715)
  web: bump @babel/preset-env from 7.25.2 to 7.25.3 in /web in the babel group across 1 directory (#10716)
  core: bump goauthentik.io/api/v3 from 3.2024061.10 to 3.2024062.1 (#10717)
  web: bump @swc/core from 1.7.3 to 1.7.4 in /web/sfe (#10719)
  web: bump API Client version (#10711)
  release: 2024.6.2
  website/docs: add 'Standalone' tap to Paperless-ngx config (#10657)
  website/docs: integrations: add linkwarden integration (#10683)
  providers/saml: remove redundant ACSUrl in POST (#10707)
  providers/radius: fix custom attribute (#10704)
  website/docs: prepare 2024.6.2 (#10697)
  outposts: ensure minimum refresh interval (#10701)
  core: bump google-api-python-client from 2.138.0 to 2.139.0 (#10691)
  web: bump @spotlightjs/spotlight from 2.2.0 to 2.2.2 in /web in the sentry group across 1 directory (#10692)
  web: bump chromedriver from 127.0.0 to 127.0.1 in /tests/wdio (#10693)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant