nuc: add authentik-ldap

This commit is contained in:
Rouven Seifert 2024-05-23 09:25:08 +02:00
parent 657ae1385e
commit 7811c95ecf
8 changed files with 23 additions and 54 deletions

View file

@ -15,7 +15,6 @@
./modules/seafile ./modules/seafile
./modules/torrent ./modules/torrent
./modules/vaultwarden ./modules/vaultwarden
# ./modules/nginx
./modules/caddy ./modules/caddy
./modules/indexing ./modules/indexing
]; ];

View file

@ -3,17 +3,19 @@ let
domain = "auth.${config.networking.domain}"; domain = "auth.${config.networking.domain}";
in in
{ {
age.secrets.authentik = { age.secrets.authentik-core = {
file = ../../../../secrets/nuc/authentik.age; file = ../../../../secrets/nuc/authentik/core.age;
};
age.secrets.authentik-ldap = {
file = ../../../../secrets/nuc/authentik/ldap.age;
}; };
services.authentik = { services.authentik = {
enable = true; enable = true;
environmentFile = config.age.secrets.authentik.path; environmentFile = config.age.secrets.authentik-core.path;
# nginx = { };
# enable = true; services.authentik-ldap = {
# enableACME = true; enable = true;
# host = domain; environmentFile = config.age.secrets.authentik-ldap.path;
# };
}; };
services.caddy.virtualHosts."${domain}".extraConfig = '' services.caddy.virtualHosts."${domain}".extraConfig = ''
reverse_proxy localhost:9000 reverse_proxy localhost:9000

View file

@ -74,7 +74,8 @@ in
# element # element
"${domainClient}".extraConfig = '' "${domainClient}".extraConfig = ''
root '${pkgs.element-web.override { file_server browse
root * ${pkgs.element-web.override {
conf = { conf = {
default_server_config = { default_server_config = {
inherit (clientConfig) "m.homeserver"; inherit (clientConfig) "m.homeserver";
@ -82,7 +83,7 @@ in
}; };
disable_3pid_login = true; disable_3pid_login = true;
}; };
}}' }}
''; '';
}; };
}; };

View file

@ -1,41 +0,0 @@
{ pkgs, lib, config, ... }:
{
# set default options for virtualHosts
options = with lib; {
services.nginx.virtualHosts = mkOption {
type = types.attrsOf (types.submodule
({ name, ... }: {
# split up nginx access logs per vhost
enableACME = true;
forceSSL = true;
# enable http3 for all hosts
quic = true;
http3 = true;
extraConfig = ''
access_log /var/log/nginx/${name}_access.log;
error_log /var/log/nginx/${name}_error.log;
add_header Alt-Svc 'h3=":443"; ma=86400';
'';
})
);
};
};
config = {
networking.firewall.allowedTCPPorts = [ 80 443 ];
networking.firewall.allowedUDPPorts = [ 443 ];
services.nginx = {
enable = true;
package = pkgs.nginxQuic;
recommendedTlsSettings = true;
recommendedProxySettings = true;
recommendedGzipSettings = true;
recommendedOptimisation = true;
};
security.acme = {
acceptTerms = true;
defaults = {
email = "rouven@${config.networking.domain}";
};
};
};
}

View file

@ -35,7 +35,7 @@ in
redir /accounts/login /oauth/login redir /accounts/login /oauth/login
reverse_proxy unix//run/seahub/gunicorn.sock reverse_proxy unix//run/seahub/gunicorn.sock
route /media/* { route /media/* {
root '${pkgs.seahub}' root * ${pkgs.seahub}
} }
route /seafhttp/* { route /seafhttp/* {

View file

@ -22,7 +22,8 @@ in
"secrets/nuc/vaultwarden.age".publicKeys = [ rouven nuc ]; "secrets/nuc/vaultwarden.age".publicKeys = [ rouven nuc ];
"secrets/nuc/mullvad.age".publicKeys = [ rouven nuc ]; "secrets/nuc/mullvad.age".publicKeys = [ rouven nuc ];
"secrets/nuc/keycloak/db.age".publicKeys = [ rouven nuc ]; "secrets/nuc/keycloak/db.age".publicKeys = [ rouven nuc ];
"secrets/nuc/authentik.age".publicKeys = [ rouven nuc ]; "secrets/nuc/authentik/core.age".publicKeys = [ rouven nuc ];
"secrets/nuc/authentik/ldap.age".publicKeys = [ rouven nuc ];
"secrets/nuc/cache.age".publicKeys = [ rouven nuc ]; "secrets/nuc/cache.age".publicKeys = [ rouven nuc ];
"secrets/nuc/borg/passphrase.age".publicKeys = [ rouven nuc ]; "secrets/nuc/borg/passphrase.age".publicKeys = [ rouven nuc ];
"secrets/nuc/borg/key.age".publicKeys = [ rouven nuc ]; "secrets/nuc/borg/key.age".publicKeys = [ rouven nuc ];

View file

@ -0,0 +1,7 @@
age-encryption.org/v1
-> ssh-ed25519 uWbAHQ 3GSNWb2Oly++M5tvybIiDwr2yMJ/1OGDlfXMMsjFkkI
yQpVNnYmv0SOtSy6K6KBuCPpOWJ1D//tWL4QkfbQqCI
-> ssh-ed25519 2TRdXg Eme+V3YHksjnqGsbWILJWyiLyh2EqqZ2VbylKVa9TAY
tJyYG2C6cykSUipTFzbAh5/UkUZ5KOsJjOeis/+sMks
--- tEpEe7Vh4XVOFgAQHCx42pFcx7P2XV4LqFXVJsv/Ug8
%Öºo$û"²øؽ0Ö—2š'¹nÍØHèÙ¶¿£l„Áõæ§7àjŽ nôeˆ¾¥‰/¯-\?·Š3z«GóáꙬ"<22>r£Â*ÅÁÐ0‡¡Ð£ð;meÛ.Ù<>1@9¿…šßê¿ ®¾F!†«Û…*%á>º,Ì<>æRèó)yjU´lœªFݨ÷…ú1ÿ>‡V<>ó p%š¸“çüiM*w»Äß