[Draft] Basic LDAP/Portunus config #12
34
config/portunus_seeds.json
Normal file
34
config/portunus_seeds.json
Normal file
|
@ -0,0 +1,34 @@
|
||||||
|
{
|
||||||
|
"groups": [
|
||||||
|
{
|
||||||
|
"name": "admins",
|
||||||
|
"long-name": "Portunus Admins",
|
||||||
|
"members": [],
|
||||||
|
"permissions": {
|
||||||
|
"portunus": { "is-admin": true },
|
||||||
|
"ldap": { "can-read": true }
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "ifsr",
|
||||||
|
"long-name": "Mitglieder des ifsr",
|
||||||
|
"members": [],
|
||||||
|
"permissions": {
|
||||||
|
"portunus": { "is-admin": false },
|
||||||
|
"ldap": { "can-read": false }
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "strukturer",
|
||||||
|
"long-name": "Strukturer des ifsr",
|
||||||
|
"members": [],
|
||||||
|
"permissions": {
|
||||||
|
"portunus": { "is-admin": false },
|
||||||
|
"ldap": { "can-read": false }
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"users": [
|
||||||
|
{}
|
||||||
|
]
|
||||||
|
}
|
|
@ -50,15 +50,7 @@ in
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
tls = true;
|
tls = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
# TODO: wohin seed file?
|
seedPath = "../config/portunus_seeds.json";
|
||||||
potential security risk potential security risk
should be nix path should be nix path
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
seedPath = "";
|
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
|
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
# falls wir das brauchen
|
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
# dex = {
|
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
# enable = true;
|
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
# ...
|
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
# };
|
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
# searchUserName = "xxx";
|
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
};
|
};
|
||||||
|
|
||||||
users.ldap = {
|
users.ldap = {
|
||||||
|
@ -68,7 +60,6 @@ in
|
||||||
potential security risk potential security risk
should be nix path should be nix path
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
# useTLS = true; # nicht nötig weil ldaps domain festgelegt. würde sonst starttls auf port 389 versuchen
|
# useTLS = true; # nicht nötig weil ldaps domain festgelegt. würde sonst starttls auf port 389 versuchen
|
||||||
};
|
};
|
||||||
|
|
||||||
# TODO: acme/letsencrypt oder andere lösung?
|
|
||||||
potential security risk potential security risk
should be nix path should be nix path
|
|||||||
services.nginx = {
|
services.nginx = {
|
||||||
enable = true;
|
enable = true;
|
||||||
virtualHosts."${config.services.portunus.domain}" = {
|
virtualHosts."${config.services.portunus.domain}" = {
|
||||||
|
|
||||||
potential security risk potential security risk
should be nix path should be nix path
potential security risk potential security risk
should be nix path should be nix path
|
Loading…
Reference in a new issue
potential security risk
should be nix path