[Draft] Basic LDAP/Portunus config #12
|
@ -1,4 +1,5 @@
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
{config, ...}: let
|
{ config, ... }:
|
||||||
potential security risk potential security risk
should be nix path should be nix path
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
|
let
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
# temporary url, zum testen auf laptop zuhause
|
# temporary url, zum testen auf laptop zuhause
|
||||||
tld = "moe";
|
tld = "moe";
|
||||||
hostname = "eisvogel";
|
hostname = "eisvogel";
|
||||||
|
@ -9,7 +10,8 @@
|
||||||
potential security risk potential security risk
should be nix path should be nix path
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
|
|
||||||
ldapUser = "openldap";
|
ldapUser = "openldap";
|
||||||
ldapGroup = "openldap";
|
ldapGroup = "openldap";
|
||||||
in {
|
in
|
||||||
potential security risk potential security risk
should be nix path should be nix path
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
|
{
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
users.users."${portunusUser}" = {
|
users.users."${portunusUser}" = {
|
||||||
isSystemUser = true;
|
isSystemUser = true;
|
||||||
group = "${portunusGroup}";
|
group = "${portunusGroup}";
|
||||||
|
@ -17,7 +19,7 @@ in {
|
||||||
potential security risk potential security risk
should be nix path should be nix path
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
|
|
||||||
users.groups."${portunusGroup}" = {
|
users.groups."${portunusGroup}" = {
|
||||||
name = "${portunusGroup}";
|
name = "${portunusGroup}";
|
||||||
members = ["${portunusUser}"];
|
members = [ "${portunusUser}" ];
|
||||||
potential security risk potential security risk
should be nix path should be nix path
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
};
|
};
|
||||||
|
|
||||||
users.users."${ldapUser}" = {
|
users.users."${ldapUser}" = {
|
||||||
|
@ -27,7 +29,7 @@ in {
|
||||||
potential security risk potential security risk
should be nix path should be nix path
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
|
|
||||||
users.groups."${ldapGroup}" = {
|
users.groups."${ldapGroup}" = {
|
||||||
name = "${ldapGroup}";
|
name = "${ldapGroup}";
|
||||||
members = ["${ldapUser}"];
|
members = [ "${ldapUser}" ];
|
||||||
potential security risk potential security risk
should be nix path should be nix path
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
};
|
};
|
||||||
|
|
||||||
# TODO: eigenes secrets.yaml für seedfile?
|
# TODO: eigenes secrets.yaml für seedfile?
|
||||||
|
|
||||||
potential security risk potential security risk
should be nix path should be nix path
potential security risk potential security risk
should be nix path should be nix path
|
potential security risk
should be nix path