Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

root: fix database ssl options not set correctly #12180

Merged
merged 1 commit into from
Nov 25, 2024
Merged

Conversation

BeryJu
Copy link
Member

@BeryJu BeryJu commented Nov 25, 2024

Details

closes #12178


Checklist

  • Local tests pass (ak test authentik/)
  • The code has been formatted (make lint-fix)

If an API change has been made

  • The API schema has been updated (make gen-build)

If changes to the frontend have been made

  • The code has been formatted (make web)

If applicable

  • The documentation has been updated
  • The documentation has been formatted (make website)

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
@BeryJu BeryJu requested a review from a team as a code owner November 25, 2024 13:30
Copy link

netlify bot commented Nov 25, 2024

Deploy Preview for authentik-docs canceled.

Name Link
🔨 Latest commit 88c7556
🔍 Latest deploy log https://app.netlify.com/sites/authentik-docs/deploys/67447bf8ee291500086cf0f8

Copy link

netlify bot commented Nov 25, 2024

Deploy Preview for authentik-storybook canceled.

Name Link
🔨 Latest commit 88c7556
🔍 Latest deploy log https://app.netlify.com/sites/authentik-storybook/deploys/67447bf8392359000858f4a5

Copy link

codecov bot commented Nov 25, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 92.62%. Comparing base (9f82c87) to head (88c7556).
Report is 3 commits behind head on main.

✅ All tests successful. No failed tests found.

Additional details and impacted files
@@           Coverage Diff           @@
##             main   #12180   +/-   ##
=======================================
  Coverage   92.62%   92.62%           
=======================================
  Files         761      761           
  Lines       38025    38025           
=======================================
+ Hits        35219    35221    +2     
+ Misses       2806     2804    -2     
Flag Coverage Δ
e2e 49.12% <ø> (+<0.01%) ⬆️
integration 24.83% <ø> (ø)
unit 90.21% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.


🚨 Try these New Features:

@BeryJu
Copy link
Member Author

BeryJu commented Nov 25, 2024

/cherry-pick version-2024.10

@BeryJu BeryJu merged commit bebd4cd into main Nov 25, 2024
65 of 66 checks passed
@BeryJu BeryJu deleted the root/fix-db-options branch November 25, 2024 13:56
gcp-cherry-pick-bot bot pushed a commit that referenced this pull request Nov 25, 2024
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
BeryJu added a commit that referenced this pull request Nov 25, 2024
…#12183)

root: fix database ssl options not set correctly (#12180)

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Co-authored-by: Jens L. <jens@goauthentik.io>
kensternberg-authentik added a commit that referenced this pull request Nov 25, 2024
* main:
  ci: only mirror if secret is available (#12181)
  root: fix database ssl options not set correctly (#12180)
  core, web: update translations (#12145)
  core: bump tornado from 6.4.1 to 6.4.2 (#12165)
  website: bump the docusaurus group in /website with 9 updates (#12172)
  website: bump typescript from 5.6.3 to 5.7.2 in /website (#12173)
  ci: bump actions/checkout from 3 to 4 (#12174)
  core: bump github.com/stretchr/testify from 1.9.0 to 1.10.0 (#12175)
  core: bump coverage from 7.6.7 to 7.6.8 (#12176)
  core: bump ruff from 0.7.4 to 0.8.0 (#12177)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Django Postgres settings use wrong keys for TLS auth
1 participant